text
stringlengths 32k
189k
| timestamp
stringlengths 20
20
| url
stringlengths 15
660
|
---|---|---|
A survey can be associated with any area. This poll will do the job like a survival instrument which without a doubt will help you to establish the satisfaction level of their shoppers. Such survey assists in suggesting the entire improvement of this scholar.
A poll must be more understandable and simple to use in order individuals are not going to have a truly difficult time replying it. You will find lots of prospective excellent matters a survey can perform, in the contest that you use it based on its functionality. It is a method in applied statistics that addresses all the sampling of either a population or its own members to assemble data and evaluate outputs dependent around the info that has been collected. Obtaining a poll is the most probable not the highlight of somebody daily. Essentially, the sort of questionnaire or survey that you pick will probably likely be tailored for the job.
Surveys are definitely the most interactive and effortless system to addressing learn any man or some residential area or a current market only by way of a typical page of survey. They truly are very crucial instruments for companies, businesses, and research associations to get the data that they need for some objective or even study. It really is useful for many kinds of polls and one can make it’s in shape following generating some critical modifications. This survey is performed by instructors to the students offering them successful rating predicated on their working skills. It’ll assist the individual to produce decisions to get additional progress. A gratification survey could be conducted by applying open closed or closed ended questions dependent on the essentials of the survey. Utilizing those templates that you will readily produce a comprehensive individual satisfaction survey to collect all of the advice that you want before starting with an improvement app.
Survey is an approach employed by selection of different peoples and company associations to have information from the specific portion of a people to be able to gauge people features towards some thing such as a problem, event, incident, product or service or corporation. Apart from reminders and instructions you will find respective forms of surveys utilized for their various purposes. These surveys give accurate data and information in regards to the employee’s condition of intellect and opinions towards the organization. Regular advice of the person that will answer this survey. While these sorts of surveys are well suited for finding out in-depth about the users and their own notions, they are also able to be tricky to interpret and outline. Such surveys have been performed through questionnaire kinds.
If you’re preparing to design a questionnaire, you are going to wish to know a few of the principles regarding survey design. Predicated around the amount of complete inquiries, building a questionnaire can happen long. Questionnaires are frequently used by the government to find more info about geographical spots, the lives of its taxpayers, and also assess that programs become financed. By using a survey to find out more regarding your clients or other stakeholders, for example a organization or company, is essential to decent crowd study.
Each issue has been followed closely by means of a range of alternate options. Based on what customer metrics you mean touse, it is certainly likely to figure out what type of survey questions you need to consult your web visitors. The tough part is understanding just how to compose your buyer care questionnaire questions.
A few templates are only able to be be gotten paid strategies. Some templates with over 10 queries can be seen all options, however you will call for a paid plan therefore as to edit the concerns in the template. Our templates furnish you various selections which are very valuable to your next surveying. All these templates are all available to assist you make individual satisfaction surveys without problem. The poll templates assist in extracting these vital info and data and certainly will be exceedingly valuable to the overall rise of the business. Nearly certainlya pride questionnaire template may be conducted by utilizing closed or open ended queries which obviously, depending on the requirements of the poll or in accordance with the needs of surveyor.
When you’ve decided on a template, you are entirely free of charge to personalize it however you desire. When you find a template you wish to use, click Use this template in the base of this trailer. The large part of the templates are well prepared to make use of and curently have an extended collection of queries encoded inside them. To be sure the research Template gives you the ability to look for a survey most suitably avert making lengthy assortment of alternate options and concepts that are hard to grasp. Obtaining the employee survey template is very easy.
The template is easy and quite user-friendly. Besides the purpose, the templates can be also useful for that role of gauging the workers a reaction to selected requirements and conditions from the business or business enterprise. You might look at our sample product or service Survey Templateand Client Research Template should they truly are the sort of surveys that you need.
Every one who filed a proposition is going to be advised when the choice is taken. It really is most likely a result of careful analysis and formal investigation compiled relating into a brand-new small business that may prove to be lucrative or monetarily favorable. Split up proposals are expected in order to be thought about for programs. Secondly, together side looking professional, your proposition should seem specialist. It doesn’t have to be protracted (some paragraphs will do), but nevertheless, it should be substantive. Incomplete proposals will not be assessed.
To find the eye of this right decisionmakers and reveal that you realize what you are referring to, it’s necessary for you to compose a proposition. Proposals exist for several of particular aspects. Around the flip side, you should decline the firm proposition from various companies as a result of rejection speech.
You should make a powerful connection between your enterprise and the customer’s desires. It will likely soon be more detailed in case you have already landed an client. What’s more, it is fit for your customer to comprehend that the firm’s plan about unusual situations. Show or clarify which sort of outcomes you created to get an alternate client or company. The Proposal Manager really must finalize the things, who, if, and also the method by which the proposition is going to be grown. Our custom creating corporation stipulates the perfect custom research tips online in the most inexpensive rates. If you would like to grow your company by connecting into your state and local government chances, Find RFP is well prepared to provide assist.
The method isalso, fundamentally, a story. In addition, it is dependent upon the use of a streak of persuasion techniques called the weapons of sway. You will find just two common classifications of an organization proposition. Background of the projected search Water is also very crucial abiotic portion of their environment.
The solution or approach to a issue a part of the proposal is important to winning the real proposition. Such matters would be the precise same for the full subject. Currently among the maximum issues of Germany may be the worldwide market that attracted great alterations. At an Proposal to correct a problem, it is necessary to spell the issue namely and globally. The issue is the fact that the pencil sharpeners at the classrooms are extremely old and don’t get the task finished effectively . More significant alterations, including a complete shift in a request drastically varied funding, may require the hours to accept and may require extra documentation. Among the keys of an booming suggestion is realizing possible issues, and solving these.
Study location The proposed research work goes to be run at the metropolitan elements of Tangail. Your investigation which enables you to comprehend the matter and develop a solution necessary which you have an understanding of the justification behind your own solution. The response is like a description of the issue. Seriously regardless of what a starting place we are able to meet you together with trainer that can help you understand your health and fitness targets. The idea of composing a proposition overwhelms lots of women and men, however the duty does not need to become daunting. To start out with, these proposals do not own a name page and page numbers at the peak of the page and also the bibliography web page should adhere to MLA recommendations. Exactly what makes a name good” is dependent upon what sort of session you’re proposing.
The scholar has got the chance to check through a completely free instance study proposal about how people assistance delivery and also have to understand about the method of writing and analysis of this subject matter. The college student who’s writing a study proposal need to look closely in the arrangement of this newspaper and also the justification for the selection of the field. It is important you do your exploration, also also be ready just before you start bidding for the contracts. It is probably that a great deal of the analysis you’ve conducted to date will be classified as secondary. Generally , social science research, an scientific research research, implements very related research methodologies the specific just like different selections of research including promotion research that is inherent with the quantitative strategy and qualitative approach, medical exploration that is emphasized on certain areas like pharmaceutical, compound and healthcare research, etc. Choice of sampling method The study goes to become conducted through the survey from particular interview. Its crucial that you organize your approach to this subject matter precisely the degree to which you need to regain, learn and read the appropriate literature in regards to the subject, the topics you would like to share, and also the way the discussion is going to be framed.
The main reason for obtaining a chair cover would be always to secure your automobile seat and create the auto interior more beautiful. There is still a different form of pool cover that’s solar pool covers. Pool handles are a rather basic and also very economical way as a way in order to add cleanliness and safety on a swimming pool. The pay also functions as a security web site. Silk duvet covers are somewhat naturally pricier compared to some others. Think about decor in your home Choosing duvet handles may possibly be excellent way of incorporating additional elements into your own house decor.
Several forms of child car chair materials the kind of material useful for your auto’s seat will establish precisely the amount of relaxation you’re sitting in the chair. The cloth isn’t really hard to preserve clean and especially the best pick cloth for auto-owners with kiddies and animals. Informational content is protected using a proficient privilege that might be uncovered inside case the materials is important to the opposing party’s case and when the opposing party has no other technique to access the advice. So long when you choose the proper chair cover fabric that you can meet both durability and aesthetics demands for your car or truck. Iff that’s the situation, you might ought to think about getting ny-lon seat cover materials as it is equally lasting and inexpensive.
Mechanically seamed metal, around the flip side, is ideal to gentle slopes. Vinyl is your favorite solution for most auto owners because it is straightforward to wash and sustain. Basically squeegee out the installment fluid and also once the plastic dries, it truly is done and can be grounded.
Seat covers can be found in a large number of substances to fit each life it will be possible to consider. Most luxurious cars chairs have leather materials, of course if you respect that the worth it attracts to your car, you’re want a leather seat if you’re able to find the money for it. Ventilated and comfy chairs might very well correct a few of the drawbacks on the lists previously mentioned! Your present automobile seat most likely comprises a Nylon material.
Eliminating each one the grass and planting a brand new floor covering, in just a little area, isn’t just a little project. So, to appear after the goods especially inside the outer section of your house, acquiring backyard bathroom is quite a thoughtful selection. Even though complete protection can’t be ensured, the auto covercan undoubtedly grow to be a convincing remedy for some level. You’re also anticipated to think about security as a portion of one’s design procedure rather than of just bolt-on some weak safety measures once you build your items. It truly is clearly time consuming since they are preparing and cleaning their tools for use in place of cooking.
Standard marijuana lawns are astoundingly demanding in the environmental surroundings. You’re prepared to obtain pool handles to match, or you might need to have one. Our pool is eco-friendly currently. To find out more concerning the way you may manage your pool and hot tub, visit my website. Green pool does not need to go emptied.
Get an ideal Size quilts arrive in many sizes therefore do cover addresses. Before settling up on one, ensue you’ve got the ideal dimensions in mind. The notebook size is also acutely good for come across the full information without scrolling the web page. It truly is available in assortments of colour making it convenient for all sorts of vehicles whether for private or commercial use.
Since you may notice, castle tattoo layouts are available for particular sexes. Castle tattoo layouts are available in a number of one-of-a-kind manners. Women’s castle tattoo layouts are usually not picture and defines the castle in the viewpoint of a princess. The inner of an auto is the next most desirable portion any auto operator would like to choose after the outer appearance of an automobile attentively. When you’ll find several synthetic cloth designs available on the current sector, the most famous ones feature that the cotton and silk based duvet addresses since they are more comfortable to make use of.
The single purpose it serves would be to furnish a ready material to get a more inexpensive automobile seat conditions. Our usage of Jenkins for steady integration has grown over the past couple of years. Now you are going to have significantly more selections of colors and layouts and layouts to select from. From zippers to buttons and ties, you’ll find lots of options out there to choose from. When picking the cloth of your automobile chair, you need to know there are five exceptional types of alternatives to select from while looking for a vehicle. The quality of cover also has to be taken into account when selecting. You’ll find a number of products on the market which assert to work versus halitosis and assorted types of lung disease.
Your salary requirements shouldn’t be recorded from the resume, if you may prevent it. Additionally it’s imperative which you simply produce the resume dovetail to the demands of the specific job that you’re trying to get this that there’s no extraneous advice there. For those who have college qualifications your senior school credentials aren’t needed. Recently past a high school diploma was all that was necessary to come across a decent paying job that you can use to encourage your family members.
If you are designing your own law student resume, then you need to obey some principles to be certain that its structure isn’t likely to leave anything to be needed. If you’re a high schooler that’s been accepted to some college presently, you can also say your faculty’s name and the date you’re going to start attending. Seeing as you find it possible to see, college students are certain to handle a number of problems if they will need to turn into a portion of the buy essay center. Most high school pupils have a inclination to produce a program for a meals professional services position. Thus, you are at senior school and you also imagine you may necessitate a resume some day. You are able to mention that your upcoming education plans way as well.
Skills resume are ideal to applicants without a lot of education or expertise within their favorite subject. They are things that you are good at. Simply have a couple of minutes to take into account exactly what you are going to wish to include as far as your skills proceed. Plenty of folks possess the skills outlined previously. To get an entry job at a financial institution, money management skills will probably be deemed necessary.
Whenever you can do, you’re in a place to choose the best resume format to your own requirements so you can find the best results. Generally, educational places are those that require CVs. With a tiny bit of imagination and a few idea on your high skills, you are going to come across a great location and begin your own work history.
Under each and every job you have accomplished in yesteryear listing the job tasks and most your teaching fashions you’ve used in every of many task position. It’s likely to also provide info about any professional memberships which you’ve in it. It is essential to add advice concerning the teaching certifications within an instructors resume.
After composing a resume with merely a senior high school degree instruction, it’s crucial that you pay attention to all work encounter. You are able to checklist extra encounter, but only after you have recorded the most relevant experience. Additionally, you might want to incorporate any suitable knowledge you have received while pursuing your hobbies or private interests. Your knowledge and the kind of job which you’re applying for will help to ascertain precisely the design of resume you’re using.
RESUME designs there are tons of styles of resumes using many variants. Your resume will undoubtedly likely be broken into segments. Resumes give potential companies a method to find out about candidates quickly and readily, plus so they’re your very first step toward brand new job opportunities. Teacher Resume needs to become well drafted document. Creating a resume for college might be simplified when you may learn exactly that which you intend to do with the subsequent four years of your own life. When for no other explanation, acquiring the restart may permit you to readily finish all of the online profiles groups need prospects in order to complete. Obviously sayresume designs may vary based on the type of job which you are applying for.
Even if you’ve needed a work before, you can not imagine the way that it is likely to create that 1 job fill an entire webpage. If you are on the lookout for work, you could have pointed out that some companies ask a CV as opposed to the usual resume. Jot down on what expertise you utilized, and the way they can relate into this job that you just would like. It is likely to also go away off some occupations that are fully irrelevant to the job which you desire. Guarantee the skills are about the job which you desire. If you’d like to locate a superb project, do what it could require to be certain you are looked at much more favorably than the contest. If you’d like to locate a wonderful career, you need to do what’s necessary to ensure you are looked at much more favorably compared to competition.
Your faculty work could appear that there is no large matter. If you are now out of job and hunting for a new job, or you’re tired of your current job and would like a shift, developing a leading resume can be just a vital factor to having the task of your dreams. Volunteer function may also be properly used to exhibit techniques and experience, even in the event that you have not acquired them during paid work.
Since you can view, in the event that you should be hunting for a more economical account cover, then Smead has several alternatives to select from. No matter the instance, decide to try and locate the appropriate boat insure, although the easiest cover is able to help you prevent the harm of never having any cover, therefore should you can’t locate the ideal pay in the moment, only purchase something which will secure your ship and earn time to study the options while you’re informed that there is certainly something to accomplish the occupation till you pick. The spare tire cover is a really crucial purchase to keep your spare-tire in wonderful condition and ready for use. The lockable cover may be more expensive, however it could cover off at the very long haul. Simply have patience and purchase the very best ship cover you are ready to. On the list of respective choices in covers, a customized ship cover is the ideal choice. You can also buy your custommade vessel pay from the various shops that are on-line.
With probably the most proper cleaning hints and a little function the boat top or cover could be cleaned to seem new. Don’t don’t write that position you’re applying for. Do not forget to add keywords to your position you’re applying for. That means you might find yourself using for the job of the retail greeter, however, you are wondering exactly what you can do as a way to be sure you get the task. A project could possibly be an experience building stepping stone in the event you already know what kind of livelihood you need to make in the future. Never disclose exactly why you are searching for a brand new endeavor. Figure out the title of whoever will probably undoubtedly likely be reviewing manuals to define that which candidates to interview.
The contact of the customer service section of your insurance company can be found of your insurance policy card. There certainly really are a couple major types of handles for spare tires that are currently on the marketplace. Don’t make the error of believing that because you have spent the last a decade in a particular field, you’re necessarily well versed on that field over a global point. Should you think there is a mutual curiosity, then I’d greet the chance to hook up with you to learn more regarding your own company, the demands of the career, and the way my knowledge would be a superior fit. Cover letters, on the flip side, is going to want to get changed each and every time you ship them out because they should be tailored into your own company and location you are searching for. Not many insurance businesses cover compression stockings when approved by a doctor. If you’re denied telephone the insurance carrier and have to seek advice from a supervisor and ask the reason why.
Choose how big is this paralegal occupation group you will likely target. The most big element which you’ll be working on front cover will eventually be your title text. Regardless of what you can do, don’t not adhere with a phrase template. Utilizing a standard coverletter template may be the best action todo. It is also possible to produce your book cover style with Photoshop alone, nevertheless it goes to be complicated to earn text edits. When it is a specific job you’re applying foryou have to offer precise information on this job. A strong and elastic cloth is a substantial part an customized ship cover.
You imagine you possess a reasonably good handle how a resume and coverletter should be assembled with each other. Sending a letter filled with misspellings and bad grammar would be unprofessional. You will clarify within the correspondence it really is you might be seeking employment using that particular business or you also could possibly be jobless or there’s a difference in job. Your resume cover letter should say temporarily perhaps maybe not exactly everything you’ve performed, your accomplishments, however the sort of placement you are obtaining & most importantly, everything you are able to do in order in order to help the company inside the location you are applying for. When it regards the applying cover letter, a lot of people ponder what to write. A resume cover letter is like wise an exceptional tool for explaining issues which are not evident from the resume. Goal A coverletter ought to be tailored into a specific firm.
If you are uncertain how exactly to write a cover letter, then you are going to notice quite a few free templates online. A cover letter needs to be restricted to two pages accordingly the next paragraph has to be succinct. It employs exactly the same template as a firm letter. You simply have to prepare yourself a fruitful cover letter in the event that you would like to secure a excellent job. Every employment resume cover letter, no matter the type or position interested in, should be compelling! It really is true, you have to tailor your coverletter to get each particular job.
The memo is only one of many classical instruments in delivering the info in a single organization. Besides mails, memos are an basic portion of formal small business communications. Developing an memo to get practically any function is often very tough when you’re not mindful of this format.
If you must send out memos usually for distinct reasons and will need to ease the weight then you may make use of the blank Me Mo templates which can be offered for free and premium download on the net web. Memos are tailored to fulfill the rising demands of fast readers. For instance, a selection memo is utilized by legal and company entity to inform the last decision of their own proceedings.
Find the work which you wish with a Me Mos officecom that highlights your own experience in various ceremony situations. For example, on your office, you will leave a memo reminding some body to execute a specific endeavor. A memo could be transmitted to varied different people within a small business or company. By way of instance, a lawful memo ought to own a format which reflects insulting and professionalism.
You’ll find lots of explanations why it is you might be sending a memo. The Bloomberg is considered only just a little but the most efficient tool to handle the flow of goods and money too. Inter Office memos are frequently employed for things which are really intense and of wonderful importance because it’s the tangible kind of material with less odds to getting ignorance and errors.
After composing a memo, make certain you see what you’re writing. On occasion, a memo has been transmitted to men and women over and above the company. But it isn’t too prevalent and can be typically utilized for company communication within a small business enterprise. You won’t will need to post a memo containing contents that are bogus. If you are sending handwritten memos then you may make duplicates of the template as a way to do not need to publish one whenever you want it.
If you unsure how to earn a memo, then memorandum sample is just a terrific guide to help you in creating your memo. It is a willing touse memo that just require a small editing to bring in message move ahead. A Memo is a concise identify of Memorandum. A exact simple memo is also excessively straightforward and laborious.
Me Mos should be properly used whenever you would love to communicate information to one or more individuals as part of your organization written down. Writing a memo is also a pretty easy task and will not call for any skilled or technical skill. When you have to compose a business memo, then it could be extremely useful to use a fill-in template to start.
You are going to learn different sort of memo templates . If you’re looking to get a memo template (phrase ) then it isn’t hard to use our free memo templates to generate an Word document that might be used to produce memos. You would like to get a more Memo Template which seems stylish, one using a special appearance for this. An memo template might be utilised in court as evidence a certain agreement was made. It might be described as a hand written document or a typed page depending upon the requirements of company. Our Standard Me Mo Templates are the absolute most approved formats all on the planet. You’ll find many Me Mo templates out there.
Sample Memo Template is particularly designed for you to get benefit from its contents and trend. Whenever you’re employing the Memo Template and you also change this up, you may let it be special for the own organization or organization. If you should be looking for high-end Me Mo templates, then we still recommend that you choose premium ones.
Just stop by your house site and also hunt to your particular memo type which you prefer. The memo is just one of many trickiest instruments that have been in operation for centuries. In addition, in contrast to the typical records, a policy stipulates in decision in the start.
Others regularly utilize memos, and will ask the worker to sign up for memo. Memos are very much similar to letters, even with all the major difference being they normally are meant just for associates of one’s own company. Additionally, the memos really are a breeze to disperse messages. Mail is simple, however, you may however must write an official memo now and then.
Memos must be aim and should state facts. Furthermore, other forms of memos are located in outside website. It is very similar to a letter but it’s delivered from 1 worker to the other in just a company. Memos are definitely the very used format in the business world. A sterile memo usually varies dependent on its intent. Under the organization name and logo, there’s a bold correspondence Fax Memo.
Now you need to produce your resume unforgettable, thus opt for a template you may inject your style into. The entire variety of resume templates is composed of an variety of resourceful restart designs. As soon as a resume template has been selected with an individual, it’s readily moved into a individual’s individual computer as soon as the person accomplishes a download of this template by the Microsoft Office on the web site. First thing you should do to effectively use a resume template is always to find a project which you’ll like to possess! By using a resume template is currently a great and intelligent practice for multiple factors. You are going to understand that with a resume template will be able to help you save you a excellent deal of time.
You really don’t need to begin all again if employing for a different type of job or inside another industry. Once you are requesting for work that depends on the strengths of the person, you’re going to need a restart template you might inject slightly more personality into to allow it to pop up’. It’s cool that you’re trying to find a job to have any money, but also you need some difficulties together with resume. Also make certain you tailor the file to this job you’re looking for. In the event that you’d like to locate a new job, the web is a superb source. If you prefer to track down a new job, you need to get a really good proficient and well-written resume to compose.
The most hard step is always to identify which restart format is most effective for you personally. Each resume format has been made to increase your chances to discover the job in 2018. Don’t forget that using the best resume arrangement you’d not just stick out from a crowd of unique applicants, however would draw attention to your candidacy. You ought to comprehend that restart structure is crucial, since it can boost your chances to get invited for an interview. As time passes, quite a few format or even kinds of resumes have been introduced.
Simply comprise each of the relevant skills you’ve got. Subsequently, circle all the abilities you have. Sooner or later, subtract all of the abilities you never actually have but you also can readily map a few of the relevant skills you really do have to. Employed at a company for a definite period of time is simply as organic that you find new talents and test your own limits. An attractive, Mini Mal and user friendly template you could edit depending upon your own expertise and abilities.
Writing your resume never been more simpler. Professionally, our resumes are most often the very first impression a potential employer receives folks. If you should be trying to customize professional, pre-formatted resumes, look at our free downloadable templates. In reality, resume templates are a basic ways to make a restart.
Simple doesn’t will need to me an uninspired and tedious. You’ve got to bear in mind that a restart is an instrument that you use to market and market your capabilities and adventures to an expected employer. In any event, but the application that you wish to set any work hunt going is just really a fantastic restart.
When it’s to perform creating a resume 20-16, the first thing you can do is wanting to locate several resume templates already made by professional research writers. A number of those templates are all special to given industries. You’ll find a great deal of free resume templates quickly on the web but it is often quite tough to choose the optimal/optimally one that’s most suited for your requirements personally. In addition, you will discover free templates using Microsoft Word too.
Professional format and Format It may show up tricky wanting to track down free restart templates that are both easy to browse and professional, but it could be carried out. Before you begin using great resume templates it is critical to understand the way to best make usage of those. It’s also critical to be aware that templates might be reorganized. Every template supplies examples and tips so you won’t will need to begin from scratch after designing your own resume. If you should be on the lookout for the best totally free resume templates on the web to begin on, all you will need todo will be to Google to this and sometimes take those you have about Microsoft Word or any normal wordprocessing program. Our innovative templates enable you to stand out by the audience. All our resourceful model templates offer you a perfectly balanced blend of character style, professionalism and also any style.
A survey might be correlated in almost any area. | 2019-04-25T13:53:06Z | http://minutelynews.com/12-lebenslauf-muster-2016-kostenlos-download/ |
1990-11-27 Assigned to BAUSCH & LOMB INCORPORATED, A CORP. OF NEW YORK reassignment BAUSCH & LOMB INCORPORATED, A CORP. OF NEW YORK ASSIGNMENT OF ASSIGNORS INTEREST. Assignors: VALINT, PAUL L. JR.
A method of modifying surfaces of polymeric objects which comprises immersing the polymeric object in an aqueous dispersion of a polymerizable surfactant, a cross-linking agent, and a free radical initiator and exposing the immersant to ultraviolet light to form a permanent, cross-linked surface coating on the object. Also disclosed are coated objects prepared by this method, which is particularly suited for coating contact lenses.
The present invention is directed to modifying the surfaces of solid materials and more particularly to the use of polymerizable surfactants for such modifications.
Surface structure and composition determine many of the physical properties and ultimate uses of solid materials. Characteristics such as wetting, friction, electrostatic charging, and adhesion are largely influenced by surface characteristics. Of particular concern are the effects of such surface characteristics on biocompatibility. The alteration of surface characteristics is therefore of special significance in biotechnical applications. Improved methods are accordingly sought for modifying solid surfaces, particularly the surfaces of polymeric objects.
Random, grafted, polymerized surfactants have been used to modify the surfaces of hydrophobic polymers by the adsorption of the surfactant onto the surfaces of polymeric objects from an aqueous dispersion. Lee, J. H., Interactions of PEO-Containing Polymeric Surfactants With Hydrophobic Surfaces, The University of Utah (1988)(hereinafter "Lee"). Lee--particularly concerned with reducing the absorption of blood plasma proteins on hydrophobic surfaces--teaches the synthesis of polymeric surfactants by random free radical copolymerization of a hydrophobic methacrylate (hexyl methacrylate or lauryl methacrylate), a hydrophilic methacrylate (polyethylene oxide methacrylate), and methyl methacrylate.
Akashi, M., et al., "Graft Copolymers Having Hydrophobic Backbone and Hydrophilic Branches. IV. A Copolymerization Study of Water-Soluble Oligovinylpyrrolidone Macromonomers," J. Polymer Sci.: Part A: Polymer Chemistry, Vol. 27, pp. 3521-3530 (1989)(hereinafter "Akashi") teaches amphiphiles prepared by random free radical copolymerization of carboxyl group-terminated oligovinylpyrrodidone with methyl methacrylate or styrene. Syntheses of vinylphenyl-terminated and methacryloyl-terminated oligovinylpyrrolidone macromonomers are described.
Polymerizable surfactants have been used to modify the properties of polymers in aqueous solution. For example, Schulz, et al., "Copolymers of Acrylamide and Surfactant Macromonomers: Synthesis and Solution Properties," Polymer, Vol. 28, pp. 2110-2115 (Nov., 1987)(hereinafter "Schulz") describes macromonomer surfactants wherein the surfactant character is achieved by the addition of a small hydrophobic functionality (e.g., nonylphenol) to a water-soluble polyethylene oxide chain. Related materials and methods are disclosed in U.S. Pat. No. 4,075,411.
Polymerizable surfactants have also been used to modify the surface properties of solids. One class of materials used for this purpose are lipids (non-polymeric materials) which are rendered polymerizable by the addition of various functionalities such as methacrylate groups [Ringsdorf, H., et al., "Hydrophilic Spacer Groups in Polymerizable Lipids: Formation of Biomembrane Models form Bulk Polymerized Lipids," J. Am. Chem. Soc., Vol. 107, pp. 4134-4141 (1985)] and various vinyl groups [Ringsdorf, H., et al., "Saturated and Polymerizable Amphiphiles with Fluorocarbon Chains. Investigation in Monolayers and Liposomes," J. Am. Chem. Soc., Vol. 106, pp. 7687-7692 (1984)]. These polymerizable lipid surfactants have been used to prepare liposomes used in the formation and stabilization of biomembrane models (often referred to as polymeric liposomes).
Polyfunctional polymerizable surfactants have also been used in coatings to modify the surface properties of polymeric objects. European Patent Publication No. 153,133 (hereinafter "Regen"). Preferred polymerizable surfactants taught by Regen are polyfunctional lipids. Regen teaches that monofunctional polymerizable surfactants are ineffective for modifying surfaces of polymeric objects. Other polyfunctional polymerizable surfactants are disclosed in U.S. Pat. No. 3,541,138.
An object of Regen was to overcome the limitations of Langmuir-Blodgett processes, especially when applied to more complex surface topographies. Polymerizable surfactants have of course been employed in Langmuir-Blodgett films. These multilayer surfactant assemblies are exploited in microlithography and other opto-electronic systems. Fendler, J.H., "Polymerized Monolayers from a Styrene Functionalized Surfactant," Colloids and Surfaces, Vol. 35, pp. 343-351 (1989).
Contact lenses are conventionally produced by one of three general techniques--lathing, static casting, and spin casting. Combinations are also known. For example, semi-finished buttons (having one final lens surface) may be formed by static or spin casting and the second lens surface may be produced by lathing. Static and spin casting have the advantage of producing lenses with fewer processing steps than lathing. In either of the molding techniques, the anterior and posterior surfaces of the lens may be formed in one step. Static casting does this by providing two mold surfaces; spin casting does this by providing a mold surface to form the anterior surface and by using the forces generated by spinning liquid monomer to form the posterior surface.
One of the challenges faced when producing lenses by molding is achieving release of the lenses from the molds without damaging the lens surfaces. The phenomenon of lens adherence is a consequence of chemical interactions between mold surfaces and monomer mixtures during polymerization. Among the proposals to meet this challenge is U.S. Pat. No. 4,534,916, which teaches adding (nonpolymerizable) surfactants to the monomer mix. The surfactant addition is reported to improve the surface quality of lenses by decreasing the number of surface defects resulting from mold release (especially of xerogel lenses).
The '916 patent seeks improved surface quality by reducing lens damage during demolding. Others have sought to improve surface quality more directly--by surface modifications. For example, U.S. Pat. No. 4,546,123 teaches covalent attachment of (nonpolymerizable) surfactant molecules to a hydrogel lens surface.
The macromonomer technique for preparing graft copolymers of controlled architecture is well known. Macromonomers or macromers are polymers of molecular weight ranging from the hundreds to tens of thousands, with one of the end groups functionalized to enter into further polymerization. Milkovich, Chiang and Schultz demonstrated the synthesis and applications of a variety of macromers. R. Milkovich, M.T. Chiang, U.S. Pat. No. 3,842,050 (1974); Schultz, G. O. and Milkovich, R., J. App. Polym. Sci., 27, 4773 (1982); Schultz, G. O. & Milkovich, R., J. Polym. Sci. Polym. Chem. Ed., 22, 1633 (1984).
Yamashita, Y.; "Synthesis and Application of Fluorine Containing Graftcopolymers," Polymer Bull., 335-340 (1981); "Synthesis and Characterization of Functional Graft Copolymers by Macromonomer Technique", J. Appl. Polym. Sci., 36, 193-199 (1981); "Synthesis of N-Hydroxyethyl-N-Methylmethacrylamide and Its Use in the Macromonomer Synthesis", J. Polym. Sci., Polym. Letters Ed., 19, 629-636 (1981); (hereinafter "Yamashita") teaches a method of making macromers and the use of macromers to make graft copolymers. Yamashita used free radical polymerization in the presence of an effective chain transfer agent which controlled the molecular weight of the final macromer and also provided a functional end group. Thioglycolic acid, for example, is an effective chain transfer agent which provides a carboxylic acid functional end group. The end group can subsequently be reacted with, e.g., glycidyl methacrylate to give a terminal methacrylate polymerizable group. Yamashita used macromers of MMA to prepare graft copolymers of fluoroalkyl acrylates with polyMMA grafts. Yamashita does not teach the synthesis of polymerizable surfactants by the macromonomer technique.
wherein A is at least one ethylenically unsaturated hydrophilic monomer, B is at least one ethylenically unsaturated hydrophobic monomer, C is a functional chain transfer agent, D is an ethylenically unsaturated end group, y is within the range from about 0.1 to about 0.9, and x+y=1.
Notations such as "(meth)acrylate" or "(meth)acrylamide" are used herein to denote optional methyl substitution. Thus, methyl (meth)acrylate includes both methyl acrylate and methyl methacrylate, and N-alkyl (meth)acrylamide includes both N-alkyl acrylamide and N-alkyl methacrylamide.
Polymerizable surfactants useful in the practice of this invention include any of the many polymerizable surfactants known to those skilled in the art. Examples of such surfactants include: monofluoroalkyl esters of alkendioic acids, 2-(meth)acrylamido-2-alkylethane-1-sulfonic acid; α,ω,-(meth)acrylamidoalkanoic acid dimethylhexadecyl[11-(methacryloyloxy)undecyl]ammonium halide; dimethylhexadecyl[11-(methacryloyloxy)undecyl]ammonium dimethyl phosphate; 1-palmitoyl-2-[11-(methacryloyloxy)undecyl]-sn-glycero-3-phosphocholine; 1,2-bis[11-(methacryloyloxy)undecyl]-sn-glycero-3-phosphocholine; 1,2-bis(heptadeca-10,12-diynoyl)-sn-glycero-3-phosphocholine; 1,2-bis(heneicosa-10,12-diynoyl)-sn-glycero-3-phosphocholine; 1,2-bis(hexacosa-10,12-diynoyl)-sn-glycero-3-phosphocholine; bis[10-(methacryloyloxy)decyl] hydrogen phosphate; bis[11-(methacryloyloxy)undecyl]dimethylammonium halide; and bis[11-(methacryloyloxy)undecyl]dimethylammonium dimethyl phosphate.
wherein A is at least one ethylenically unsaturated hydrophilic monomer, B is at least one ethylenically unsaturated hydrophobic monomer, C is a functional chain transfer agent, D is an ethylenically unsaturated end group, y is within the range of about 0.1 to about 0.9, and x+y=1.
Suitable ethylenically unsaturated hydrophilic monomers ("A" in the above formula) include ethylenically unsaturated polyoxyalkylenes, polyacrylamides, polyvinylpyrrolidones, polyvinyl alcohols, poly (hydroxyethyl methacrylate) or poly (HEMA), and N-alkyl-N-vinyl acetamides. Ethylenic unsaturation may be provided by (meth)acrylate, (meth)acrylamide, styrenyl, alkenyl, vinyl carbonate and vinyl carbamate groups. Preferred hydrophilic macromonomers include methoxypolyoxyethylene methacrylates of molecular weights from 200 to 10,000, more preferred are methoxypolyoxyethylene methacrylates of molecular weight range of 200 to 5,000 and most preferred are methoxypolyoxyethylene methacrylates of molecular weight range of 400 to 5,000. Additional preferred hydrophilic macromonomers include poly-N-vinylpyrrolidone methacrylates of molecular weights of 500 to 10,000. More preferred are poly-N-vinylpyrrolidone methacrylates of molecular weights of 500 to 5,000 and most preferred are poly-N-vinylpyrrolidone methacrylates of molecular weights of 1000 to 5,000. Other preferred hydrophilic macromonomers include poly-N,N-dimethyl acrylamide methacrylates of molecular weights of 500 to 10,000. More preferred are poly-N,N-dimethyl acrylamide methacrylates of molecular weights of 500 to 5,000 and most preferred are poly-N,N-dimethyl acrylamide methacrylates of molecular weights of 1000 to 5,000.
Suitable ethylenically unsaturated hydrophobic monomers ("B" in the above formula) include alkyl (meth)acrylates, N-alkyl (meth)acrylamides, alkyl vinylcarbonates, alkyl vinylcarbamates, fluoroalkyl (meth)acrylates, N-fluoroalkyl (meth)acrylamides, N-fluoroalkyl vinylcarbonates, N-fluoroalkyl vinylcarbamates, silicone-containing (meth)acrylates, (meth)acrylamides, vinyl carbonates, vinyl carbamates, styrenic monomers [selected from the group consisting of styrene, alpha-methyl styrene, para-methyl styrene, para-t-butyl monochloro styrene, and para-t-butyl dichloro styrene] and polyoxypropylene (meth)acrylates. Preferred hydrophobic monomers include methyl methacrylate, dodecyl methacrylate, octafluoropentyl methacrylate, perfluorooctyl methacrylate, methacryoyl oxypropyl tris(trimethylsiloxy)silane (TRIS).
The functional chain transfer agent ("C" in the above formula) controls the molecular weight of the copolymer and provides appropriate functionality for subsequent addition of a polymerizable group. Suitable functional chain transfer agents include mercapto carboxylic acids, mercapto alcohols (also known as hydroxymercaptans), and aminomercaptans. Preferred chain transfer agents include thioglycolic acid, 2-mercaptoethanol and 2-aminoethane thiol. The molar ratio of chain transfer agent to total monomer used in the copolymerization is preferably about 0.01 to about 3, more preferably about 0.02 to about 2, and still more preferably about 0.05 to about 1.
Selection of the ethylenically unsaturated end group ("D" in the above formula) is determined by the functional group of the functional chain transfer agent. For example, if the chain transfer agent contains a carboxylic acid group, glycidyl methacrylate can provide a methacrylate end group. If the chain transfer agent contains hydroxy or amino functionality, isocyanato ethyl methacrylate or (meth)acryloyl chloride can provide a methacrylate end group and vinyl chloro formate can provide a vinyl end group. Other combinations will be apparent to those skilled in the art.
Varying the ratio of hydrophilic monomer to hydrophobic monomer changes the surface properties of polymeric objects made from the surface active macromers. For example, when preparing contact lenses containing certain surface active macromers of this invention, it has been found that higher amounts of hydrophilic component optimized mold release characteristics of the lenses but that optimum clinical performance was obtained with a relatively lower amount of hydrophilic component. Accordingly, the selection of a particular ratio will be governed by the particular surface properties ultimately sought for the polymeric object. Generally, however, y is preferably in the range from about 0.1 to about 0.9, more preferably in the range from about 0.3 to about 0.9, and still more preferably in the range from about 0.5 to about 0.8.
The random copolymers, from which the surface-active macromers are derived, are prepared by copolymerizing at least one ethylenically unsaturated hydrophobic monomer and at least one ethylenically unsaturated hydrophilic monomer in the presence of a functional chain transfer agent. The random copolymers are formed by a free radical mechanism using a wide variety of known free radical catalysts such as the diacyl peroxides (e.g., benzoyl peroxide); dialkyl peroxides (e.g., di-tert-butyl peroxides); ketone peroxides (e.g., methylethyl ketone peroxide); and peresters which readily hydrolyze (e.g., tert-butyl peracetate, tert-butyl perbenzoate, di-tert-butyl diperphthalate). A particularly useful class of peroxy initiators are the organic hydroperoxides such as cumene hydroperoxide, methylethyl ketone hydroperoxide, tert-butyl hydroperoxide, etc. The initiators should be used at a concentration of about 0.01 to about 10% by weight of the total formulation, preferably about 0.1 to about 5%. Another class of initiators comprises carbonyl-containing ultraviolet-activated free radical generators, such as acetophenone, benzophenone, and benzoin ethers. Other suitable UV initiators and initiator mixtures will be apparent to one of ordinary skill in the art. Solvents can be used in the process. Solvent choice will depend upon the solubility parameters of the comonomers used and should be chosen to allow full solubilization of all polymerizate components. Preferred solvents include tetrahydrofuran, dioxane, chloroform, dicloromethane, methanol and mixtures of these solvents.
The crosslinking agent employed in the coating method of this invention must be hydrophobic. The purpose of this invention is to render a hydrophobic polymer surface hydrophilic. The use of a hydrophobic crosslinking agent insures maximum coverage of such surface. In addition, the solubilization of a hydrophobic crosslinking agent by the polymerizable surfactant in aqueous solution provides a more intimate mixture of the surfactant and crosslinking agent and, thereby, a more effective surface coating.
Suitable crosslinking agents for this invention are hydrophobic molecules having two or more polymerizable groups. The polymerizable groups will be ethylenically unsaturated. The ethylenic unsaturation may be provided by (meth)acrylate, (meth)acrylamide, styrenyl, vinyl or other alkenyl functionality. Examples of suitable crosslinking agents include: allyl methacrylate, ethylene glycol dimethacrylate, divinyl ethylene urea, neopentyl glycol dimethacrylate, divinyl benzene and 1,3-bis(4-methacryloxybutyl)tetramethyl siloxane.
The polymeric coating of this invention is formed by a free radical mechanism using a wide variety of known free radical catalysts such as the diacyl peroxides (e.g., benzoyl peroxide); dialkyl peroxides (e.g., di-tert, -butyl peroxides); ketone peroxides (e.g., methylethyl ketone peroxide); and peresters which readily hydrolyze (e.g., tert-butyl peracetate, tert-butyl perbenzoate, di-tert-butyl diperphthalate). A particularly useful class of peroxy initiators are the organic hydroperoxides such as cumene hydroperoxide, methylethyl ketone hydroperoxide, tert-butyl hydroperoxide, etc. The initiators should be used at a concentration of about 0.01 to about 10% by weight of the total formulation, preferably about 0.1 to about 5%. Another class of initiators comprises carbonyl-containing ultraviolet-activated free radical generators, such as acetophenone, benzophenone, and benzoin ethers. Other suitable UV initiators and initiator mixtures will be apparent to one of ordinary skill in the art.
Surface coatings of this invention are applied to a polymeric object by immersing the object in an aqueous dispersion of polymerizable surfactant, crosslinking agent, and free radical initiator and exposing the immersion to ultraviolet light. The concentration of polymerizable surfactant in the aqueous dispersion is preferably in excess of the surfactant's critical micelle concentration, CMC. The CMC is the concentration at which the surfactant molecules begin to associate into aggregates in solution [M. J. Rosen, "Surfactants and Interfacial Phenomena", Wiley-Interscience: New York, 1989, p. 109]. Generally that molar concentration is in the range of about 0.1 to about 10-4. The crosslinker concentration in the aqueous dispersion will typically be in the range of about 1 to about 10-4 parts by weight. The free radical initiator concentration in the aqueous dispersion will typically be in the range of about 0.1 to 10-4 parts by weight.
The polymeric objects whose surfaces may be modified by these techniques include polymers having a wide variety of compositions and shapes. Polymeric objects of particular concern in the development of this invention were contact lenses and the particular surface modification sought was to increase surface wettability without sacrificing otherwise beneficial bulk properties of the polymeric material (especially oxygen permeability). Although the utility of the macromonomers of this invention will be further illustrated by referring particularly to their incorporation into contact lenses, it will be understood that the utility of the macromonomers of this invention is not so limited.
One class of contact lenses whose surface may be usefully modified by the macromonomers of this invention are soft hydrogel lenses. Conventional monomer systems for such lenses employ a hydrophilic monoolefinic monomer (i.e., a monoethylenically unsaturated monomer) and a polyolefinic (usually diolefinic) monomer (e.g., a polyethylenically unsaturated compound which functions as a cross-linking agent) in an amount sufficient to insolubilize the resulting hydrophilic hydrogel but insufficient to destroy the hydrophilic properties. Mixtures of hydrophilic monoolefinic monomers are used as well as mixtures of cross-linking agents. Other monomers which are copolymerizable with the hydrophilic monomer are also used to adjust various properties of the polymeric material, as is well known in the art.
Illustrative hydrophilic monomers include water soluble monoesters of (meth)acrylic acid with an alcohol having an esterifiable hydroxyl group and at least one additional hydroxyl group such as the mono- and poly-alkylene glycol monoesters of (meth)acrylic acid, e.g., ethylene glycol mono(meth)acrylate, diethylene glycol mono(meth)acrylate, propylene glycol mono(meth)acrylate, dipropylene glycol mono(meth)acrylate, and the like; the N-alkyl and N,N-dialkyl substituted (meth)acrylamides such as N-methyl (meth)acrylamide, N,N-dimethyl (meth)acrylamide, and the like; N-vinylpyrrolidone and the alkyl substituted N-vinyl pyrrolidones; glycidyl (meth)acrylates; the unsaturated amines; the alkoxy ethyl acrylates; mixtures thereof; and others known to the art.
Illustrative di- or higher polyfunctional species employed as cross-linking agents are divinylbenzene, ethylene glycol di(meth)acrylate, propylene glycol di(meth)acrylate, and the (meth)acrylate esters of polyols such as triethanolamine, glycerol, pentaerythritol, butylene glycol, diethylene glycol, triethylene glycol, tetraethylene glycol, mannitol, and sorbitol. Further illustrations include N,N-methylene-bis-(meth)acrylamide, sulfonated divinylbenzene, and divinylsulfone.
Illustrative of other copolymerizable monomers are hydrophobic (meth)acrylic esters such as alkyl (meth)acrylates wherein the alkyl moiety contains 1-5 carbon atoms.
While soft, hydrophilic, gel-type lenses may be modified by the macromonomers of this invention, of greater interest is the modification of lenses prepared from a formulation including at least one silicone monomer and at least one hydrophilic monomer. Included in this class of materials are soft contact lens formulations (both hydrogel and nonhydrogel) and rigid gas permeable contact lens formulations.
Preferred soft hydrogel formulations are those described in U.S. Pat. application Ser. Nos. 07/363,662 filed Jun. 7, 1989 and 07/364,204 filed May 2, 1989, the entire contents of which are incorporated herein by reference. Other examples of useable formulations are found in U.S. Pat. Nos. 4,136,250; 4,740,533; 4,711,943; 4,189,546; and 4,153,641.
z is 0 or 1.
The isocyanates which can be used in preparation of these urethane prepolymers include toluene diisocyanate, 4,4'-diphenyl diisocyanate, 4,4'-diphenylene methane diisocyanate, p-phenylene diisocyanate, dianisidine diisocyanate, 1,5 napthalene diisocyanate, 4,4'-diphenyl ether diisocyanate, 4,4'(dicyclohexyl)methane diisocyanate, 1,3-bis-(isocyanato methyl)cyclohexane, cyclohexane diisocyanato, tetrachlorophenylene diisocyanate, isophorone diisocyanate, and 3,5-diethyl-4,4'-diisocyanato diphenyl methane.
Other diisocyanates which may be used are higher molecular weight diisocyanate formed by reacting polyamines which are terminally capped with primary or secondary amines, or polyhydric alcohols with excess of any of the above described diisocyanates. In general, these high molecular weight diisocyanates will have the general formula ##STR5## wherein R is a divalent organic radical with 2 to about 20 carbon atoms, X is --O--, or --NR'--, where R is --H or a lower alkyl, and B is a divalent organic radical.
The diisocyanate is reacted with low molecular weight diols or glycols such as 2,2-(4,4'dihydroxydiphenyl)-propane (bisphenol-A), 4,4'-iso-propylidine dicyclohexanol (hydrogenated biphenol-A), ethoxylated bisphenol-A, propoxylated bisphenol-A, 2,2-(4,4'-dihydroxydiphenyl)-pentane, αα'-(4,4'-dihydroxydiphenyl)-p-diisopropyl benzene, 1,3 cyclohexane diol, 1,4-cyclohexane diol-1,4-cyclohexane dimethanol, bicyclic and tricyclic diols such as 4,8-bis-(hydroxymethyl)-tricyclo [5.2.1.02,6 ] decane, neopentyl glycol, 1, 4 butanediol, 1,3-propanediol, 1,5-pentanediol, diethylene glycol, triethylene glycol and the like.
These hard segments form hard domains in the final polymer or copolymer by association via hydrogen bonding with other rigid segments. The degree of association within the hard domain can be modified by controlling the amount of hydrogen bonding between the segments by either 1) decreasing the overall weight content of the hard segment in the prepolymer by increasing the molecular weight of the soft segment or 2) by decreasing the amount of hydrogen bonding density in the hard segment by either using relatively soft, longer chained diols, or by using primary amines or secondary amines capped low molecular weight compounds in conjunction with the diisocyanates rather than the diols.
b) HO (CH2) (RP O)m (CH2) OH; and ##STR6## Formulae a) represents polyoxyalkyleneglycols. These diols include polymers prepared from the epoxides: ethylene oxide 1,2-propylene oxide, 1,2-butylene oxide, 2,2 epoxydecane, 1,2-epoxyoctane, 2,3-epoxy norborane, 1,2-epoxy-3-ethoxy propane, 2,2-epoxy-3-phenoxypropane, 2,3-epoxypropyl-4-methoxy phenyl ether, tetrahydrofluran, 1,2-epoxy-3-cyclohexyloxy propane, oxetane, 1,2-epoxy-5-hexene, 1,2-epoxyethylbenzene, 1,2-epoxy-1-methoxy-2-methylpropane, benzyloxy propylene oxide, the like and combinations thereof.
The preferred polymers of this class are polypropylene glycols of molecular weights, 2000, 3000 and 4000 and more and polyoxyethylene polyoxypropylene block copolymers with molecular weight greater than 2000.
Formulae b) represents polyfluoroethers with α,ω- active hydrogens. This class of polymers can be synthesized as taught in U.S. Pat. No. 3,810,874. Generally, these polymers should have molecular weights between 400 and 10,000.
Formulae c) represents α,ω- dihydroxyl alkyl endblocked polysiloxane which for the purpose of the present invention should have a molecular weight in the range of 400 to 10,000. These polysiloxanes can be synthesized by reacting a disiloxane of the general formula ##STR7## with cyclopolydimethyl siloxane under acidic conditions.
Alternately, the disiloxane can be replaced with dimethoxydimethylsilane or diethoxy dimethyl silane to produce the α,ω-dihydroxy endcapped polysiloxanes.
The endcapping monomers used in the prepolymer are generally represented by the formula ##STR8## as defined supra. The Stage B reaction product is reacted with an excess of suitable acrylate or methacrylate esters containing a hydroxy or amine group on the non-acrylate or non-methacrylate portion of the monomer to form the endcaps of the above formula. Suitable endcap monomers include hydroxyethyl acrylate, hydroxyethyl methacrylate, aminoethyl methacrylate, 3 hydroxypropyl methacrylate, amino propyl methacrylate, hydroxyhexylacrylate, t-butylaminoethyl methacrylate, monoacrylate or monomethacrylate esters of bisphenol-A and/or bisphenol-B.
The urethane prepolymers are formed by two general synthetic approaches. One approach produces the hard-soft-hard prepolymer while the second approach produces the soft-hard-soft prepolymer.
where * denotes a urethane or a ureido linkage. STAGE A produces a so-called "Hard" segment. As is known to those skilled in polymer chemistry, the product •D*G*D• is the mathematical average of all reaction product molecules. The reaction product of the actual reaction will contain •O• and •D(*G*D)c *G*D with c≧2. Again, the formulas are numerical averages.
Optionally, STAGE B can be run with molar excess of A to produce multiblock polymers of the general formula •(D*G*D*A)a *D*G*D• where a is at least 1. This reaction product would be endcapped in STAGE C above.
In general, each of the reaction stages is run until the reactive step is complete. Reaction progress in STAGES A and B reactants can be monitored by acid base titration. The isocyanate content was calculated by the difference of acid equivalents between a stock solution dibutylamine and its reaction product with the diisocyanate reaction intermediate. The reaction was also monitored by ATR-IR for the appearance/disappearance of peaks at 1700 cm-1, which indicated the presence of ##STR9## and 2250 cm-1 which indicated consumption of --N═C═O.
The synthesis of the prepolymer may be run neat or in solution. A wide range of aprotic solvents can be used to synthesize the prepolymers of the present invention. Solvents useful in the synthesis include toluene, methylene, chloride, benzene, cyclohexane, hexane, heptane and the like. Preferred solvents are toluene, methylene chloride and mixtures thereof.
Reaction of the prepolymer precursors may be accomplished in the presence or absence of catalysts for urethane reactions, such catalysts being well known in the art. The first step of prepolymer synthesis where diisocyanate is first reacted with a short carbon chain (2 to 30 carbon atoms) diol, particularly where an aromatic diisocyanate is used, proceeds very rapidly, even in the absence of any catalyst. In fact, during the step of reacting diisocyanate and short chain diol, temperature control may be required in order to avoid/minimize side reactions.
Preferably, the first step of prepolymer synthesis in accordance with the present invention is carried out below about 100° C., most suitably within the range of from about 60° C. to about 90° C. Thereafter, the second step of the reaction is carried out at comparable temperatures, preferably within the range of from about 40° C. to 70° C. The final step of prepolymer formation suitably is effected at temperatures of from about room temperature to about 100° C., with a narrow range of from about 40° C. to about 50° C. being most preferred. As will be apparent to those skilled in the art, optimal reaction conditions, such as temperatures and duration, are selected for each individual reaction system to achieve conditions that produce a favorable rate of reaction without fostering undesirable side reactions.
Among the suitable catalysts for use in prepolymer formation are tin salts and organic tin esters, such as dibutyl tin dilaurate, tertiary amines, such as triethyl diamine and other recognized catalysts, such as 1,4-diaza (2.2.2)-bicyclooctane (DABCO).
These silicone-containing prepolymers may be copolymerized with a wide variety of hydrophilic monomers to produce soft hydrogel contact lenses. Hydrophilic monomers suitable for this use include 2-hydroxyethylmethacrylate, N-vinyl pyrrolidone, (meth)acrylamide, vinyl acetamide, and other ethylenically unsaturated hydrophilic monomers. Further comonomers may also be added to enhance wetting or to modify other properties as is generally known to those skilled in the art.
b is 0 or 1.
where n is 1, 2, 3, or 4, and m is 0, 1, 2, 3, 4, or 5.
2,2,2-trifluoro-1-phenylethyl vinyl carbonate; 1-adamantane vinyl carbonate, 1-adamantanethyl vinyl carbonate, 1-adamantaneethyl vinyl carbonate; and 1-adamantane vinyl carbamate.
Preferred nonhydrogel soft contact lens formulations are mixtures of polymerizable polysiloxanes containing fluorinated side chains and internal wetting agents. Further components such as toughening agents, crosslinking agents, and other auxiliary modifiers are desirably present as taught in U.S. Pat. No. 4,810,764, the entire content of which is incorporated herein by reference.
Polymerizable, fluorinated polysiloxanes employed in this embodiment of the invention are described by the general formula: ##STR12## where A denotes an activated unsaturated group, --R1 and R2 independently denote alkyl radicals with 1 to 6 carbon atoms or phenyl radicals; R3 and R4 independently denote alkyl radicals with 1 to 6 carbon atoms, phenyl radicals, or fluorinated alkyl radicals with 1 to 6 carbon atoms, provided that at least one of R3 or R4 is a fluorinated alkyl radical with 1 to 6 carbon atoms; m+n is at least 1; and n is at least 1.
R3 and R4 independently denote methyl or cyclohexylradicals.
These preferred internal wetting agents specifically include 2-isopropenyl-4,4-dimethyl-2-oxazolin-5-one (IPDMO), 2-vinyl-4,4-dimethyl-2-oxazolin-5-one (VDMO), cyclohexane spiro-4'-(2'isopropenyl-2'-oxazol-5'-one) (IPCO), cyclohexane-spiro-4'-(2'-vinyl-2'-oxazol-5'-one) (VCO), and 2-(-1-propenyl)-4,4-dimethyl-oxazol-5-one (PDMO).
These preferred internal wetting agents have two important features which make them particularly desirable wetting agents: (1) They are relatively non-polar and are compatible with the hydrophobic monomers (the polysiloxanes and the toughening agents), and (2) They are converted to highly polar amino acids on mild hydrolysis, which impart substantial wetting characteristics. When polymerized in the presence of the other components, a copolymer is formed. These internal wetting agents result through the carbon-carbon double bond with the endcaps of the polysiloxane monomers, and with the toughening agents to form copolymeric materials particularly useful in biomedical devices, especially contact lenses.
These oxazolones are prepared by the general reaction sequence ##STR14## The first step being a Shotten-Bauman acrylation of an amino acid. Upon completion of this step the polymerizable functionality is introduced by using either acryloyl or methacryloyl chloride.
Rigid gas permeable contact lens formulations which are suitable for the practice of this invention are silicone-based copolymers prepared from siloxanylalkyl esters of methacrylic acid and other acrylate, methacrylate, or itaconate monomers in many known formulations. See U.S. Pat. Nos. 4,424,328; 4,463,149; 4,664,479; and 4,686,267.
This invention is further described by the following Examples which are intended to be illustrative, not limiting.
Distilled 1-vinyl-2-pyrrolidinone, (NVP) 40 g, 2-mercaptoethanol, 2.80 g and azobisisobutyronitrile (AIBN, recrystallized from ethanol) 0.59 g were combined with 100 mL of anhydrous tetrahydrofuran (THF) in a 250 mL three neck flask. The flask was also fitted with a mechanical stirrer and a reflux condenser. A slow stream of nitrogen was used to deoxygenate the solution for 15 minutes. After 24 hours of reflux under a nitrogen atmosphere, no vinyl protons could be detected in the 60 Mhz NMR spectra (6.5-7.0 ppm). The hydroxy-terminated polymer was precipitated from 2 L of anhydrous ethyl ether. The solid was dissolved in 200 ml of THF and the precipitation repeated twice. The white solid, 29.37 g (69% yield), was dried under reduced pressure.
Hydroxy-terminated PVP, 9.0 g (from Example 1), was dissolved in 90 mL of chloroform, in a 250 mL 3-neck flask fitted with a magnetic stirrer, a reflux condenser, and an addition funnel. Dibutyltin dilaurate, 32.5 mg, and butylated hydroxy toluene, 2.1 mg (BHT), were added. Isocyanatoethyl methacrylate, 0.86 g (ICEM) in 10 mL CHCl3, was added dropwise. Following the addition the solution was heated to reflux. After 3 hours no ICEM could be detected by infrared analysis. The reaction mixture was then slowly added to 6 L of anhydrous ethyl ether and the solid collected. Precipitation of the PVP macromer was repeated, from ethanol into 4 L of ethyl ether. After drying at 30° C. under reduced pressure the yield of macromer was 7.1 g (78%). The Mn (number average molecular weight) and Pd (polydispersity) values were 1,986 and 1.4 (vs. polyethylene glycol standards).
1H,1H,5H Octafluoropentylmethacrylate, (OFPMA) 0.75 g, PVP macromer (Example 2), 5.0 g, 2-mercaptoethanol, 105 uL, and AIBN (recrystallized from ethanol), 8.2 mg, were combined with 100 mL of anhydrous tetrahhdrofuran (THF) in a 250 mL three neck flask. The flask was also fitted with a mechanical stirrer and a reflux condenser. A slow stream of nitrogen was used to deoxygenate the solution for 15 minutes. After 20 hours of reflux under a nitrogen atmosphere the hydroxy terminated polymer was precipitated from 2 L of anhydrous ethyl ether. The solid was dissolved in 200 ml of THF and the precipitation repeated once. The white solid was dried under reduced pressure leaving 4.14 g, a 72% yield.
Distilled DMA, 20 g, 2-mercaptoethanol, 280 uL, and AIBN (recrystallized from ethanol), 0.33 g, were combined with 100 mL of anhydrous tetrahhyrofuran (THF) in a 250 mL three neck flask. The flask was also fitted with a mechanical stirrer and a reflux condenser. A slow stream of nitrogen was used to deoxygenate the solution for 15 minutes. After 20 hours of reflux under a nitrogen atmosphere no vinyl protons could be detected in the 60 Mhz NMR spectra (6.5-7.0 ppm). The hydroxy terminated polymer was precipitated from 2 L of anhydrous ethyl ether. The solid was dissolved in 100 ml of THF and the precipitation repeated. The white solid was dried under reduced pressure at 30° C. The yield was 15.5 g and the Mn (number average molecular weight), Mw (weight average molecular weight) and Pd (polydispersity) values were 6,700, 11,318 and 1.7 (vs. polyethylene glycol standards).
Hydroxy terminated copolymer, 12 g (from Example 4) was dissolved in 90 mL of chloroform, in a 250 mL 3-neck flask fitted with a magnetic stirrer and a reflux condenser and an addition funnel. Dibutyltin dilaurate, 36.9 mg, and butylated hydroxy toluene (BHT), 10.2 mg, were added. Isocyanatoethyl methacrylate, 0.30 g (ICEM) in 10 mL CHCl3, was added dropwise. Following the addition the solution was heated to reflux. After 48 hours no ICEM could be detected by infrared analysis. The reaction mixture was then slowly added to 2 L of anhydrous ethyl ether and the solid collected. The precipitation was repeated a second time followed by drying at 30° C. under reduced pressure. The yield of macromer was 8.6 g. The Mn, Mw and Pd values were 4,400, 7,900 and 1.8 (vs. polyethylene glycol standards).
OFPMA, 1.2 g, DMA macromer (Example 5), 6.7 g, 2-mercaptoethanol, 105 uL, and AIBN (recrystallized from ethanol), 8 mg, were combined with 100 mL of anhydrous tetrahhdrofuran (THF) in a 250 mL three-neck flask. The flask was also fitted with a magnetic stirrer and a reflux condenser. A slow stream of nitrogen was used to deoxygenate the solution for 15 minutes. After 72 hours of reflux under a nitrogen atmosphere the conversion to copolymer was 44%, (by NIR analysis). Addition of 25 mg AIBN and 48 hours refluxing, (120 hours total) gave a 60% conversion to copolymer. Precipitation into 2 L of anhydrous ethyl ether, followed by drying at reduced pressure left 6 g of copolymer with Mn, Mw, and Pd values of 4,600, 8,100, and 1.8 (vs. PEG standards).
A solution was prepared by dissolving 9.1 g of methoxy polyethylene glycol 1,000 monomethacrylate in 100 mL of toluene. The solution was carefully transferred to a 250 mL three neck flask fitted with a magnetic stirrer and a condenser. To this, 9.1 g of 1H,1H,5H Octafluoropentylmethacrylate (OFPMA), 1.26 g of distilled thioqlyoolic acid (TGA) and 0.071 g of azobisisobutyronitrile (AIBN) were added. AIBN was recrystallized from ethanol before use. The solution was then deoxygenated using nitrogen for 15 minutes and then placed under a passive nitrogen blanket. After stirring for 16 hours at 60° C. the percent conversion was determined to be 95-98% by near infrared (NIR) analysis. The number average molecular weight was determined by size exclusion chromatography ("SEC") vs. polystyrene and by end group titration. The Mn values were 2,902 and 1,815 respectively. Results are shown in Table I.
The procedure of Example 7 was repeated using higher relative amounts of methoxy polyethylene glycol 1000 monomethacrylate. THF replaced toluene as the solvent in Example 9. Results are shown in Table I.
The procedure of Example 7 was repeated using methoxy polyethylene glycol 5000 monomethacrylate and using THF as the solvent. Results are shown in Table I.
A solution was prepared by dissolving 7.1 g of methoxy polyethylene glycol 1,000 monomethacrylate in 100 ml of toluene. The solution was carefully transferred to a 250 ml three-neck flask fitted with a magnetic stirrer and a condenser. To this, 12.8 g of 3-methacryloyloxypropyltris(trimethylsiloxy)silane (TRIS), 1.0 g of distilled thioglycolic acid (TGA) and 0.059 g of azobisisobutyronitrile (AIBN) were added. AIBN was recrystallized from ethanol before use. The solution was then deoxygenated using nitrogen for 15 minutes and then placed under a passive nitrogen blanket. After stirring for 16 hours at 60° C. the percent conversion was determined to be 95-98% by near infrared (NIR) analysis. The number average molecular weight was determined by size exclusion chromatography vs. polystyrene and by end group titration. The Mn values were 2,895 and 2,083 respectively. The polydispersity of the copolymer was 1.5.
OFPMA, 15 g, methoxy polyethylene glycol 1,000 monomethacrylate, 50 g, 2-mercaptoethanol, 2.34 g, and AIBN (recrystallized from ethanol), 0.164 g, were combined with 500 mL of a 1:1 mixture of THF and methanol(MEOH) in a 1 L, three-neck flask. The flask was also fitted with a magnetic stirrer and a reflux condenser. The mixture was stirred until all reagents were in solution. A slow stream of nitrogen was then used to deoxygenate the solution for 15 minutes. After 72 hours of reflux under a nitrogen atmosphere the conversion to copolymer was 99+% (by NIR analysis). Solvent was removed by flash evaporation leaving a viscous oil, which upon standing formed a wax-like solid. Values for Mn, Mw and Pd were determined vs. polystyrene, (Mn=3,700, Mw=6,300 and Pd=1.72). Results are shown in Table II.
The procedure of Example 12 was repeated using methoxy polyethylene glycol monomethacrylate in different molecular weights and relative amounts as indicated in Table II which also summarizes the results obtained.
Distilled glycidyl methacrylate, 1.83 g, p-methoxyphenol, 2.5 mg (MEHQ), and two drops of N,N-dimethyldodecylamine were added to the solution from Example 7. The mixture was allowed to reflux under a nitrogen atmosphere for 5 hours. The solution was washed 3 times with dilute sodium carbonate solution and once with water. The organic layer was dried over magnesium sulfate, and toluene removed by flash evaporation at reduced pressure. The residue, 18.12 g (85% yield), of viscous yellow macromonomer had Mn values of 3,353 (by SEC vs. polystyrene) and 3,416 (by vapor phase osmometry,vpo). The polydispersity (Pd) of the macromonomer was 1.9. Results are summarized in Table III.
The procedure of Example 18 was repeated using the solutions from Examples 8-10. The copolymers of Examples 9-10 were isolated and redissolved in dioxane for surface active macromonomer preparation. Results obtained are shown in Table III.
Hydroxy terminated copolymer, 41.744 g (from Example 12), was dissolved in 225 mL of THF, in a 500 mL 3-neck flask fitted with a magnetic stirrer, a reflux condenser, and an addition funnel. Dibutyltin dilaurate, 1.57 g, and butylated hydroxy toluene, 10 mg, were added. Isocyanatoethyl methacrylate, 1.98 g (ICEM) in 25 mL CHCl3, was added dropwise. Following the addition the solution was heated to reflux. After 16 hours 0.2% ICEM was detected by infrared analysis. Methanol, 5 mL, was added to react with the slight excess of ICEM. Chloroform was then removed by flash evaporation. The residue was left under high vacuum overnight to remove residual solvent leaving 42.4 g of wax-like semisolid. Values for the Mn, Mw, and Pd were determined vs polystyrene standards. Results are summarized in Table IV.
The procedure of Example 22 was repeated using hydroxy terminated copolymers (dissolved in chloroform) from Examples 13-17. Results are shown in Table IV.
Distilled glycidyl methacrylate, 1.58 g, p-methoxyphenol, 2.8 mg (MEHQ), and two drops of N,N-dimethyldodecylamine were added to the solution from Example 11. The mixture was allowed to reflux under a nitrogen atmosphere for 5 hours. The solution was washed 3 times with dilute sodium carbonate solution and once with water. The organic layer was dried over magnesium sulfate, and toluene was removed by flash evaporation at reduced pressure. The residue, 17.64 g (84% yield), of viscous semi-solid macromonomer had Mn values of 1,593 (by SEC vs. polystyrene) and 1,918 (by vapor phase osmometry,vpo). The polydispersity of the macromonomer was 1.6.
Hydroxy terminated copolymer, 3.14 g (from Example 3), was dissolved in 90 mL of chloroform, in a 250 mL 3-neck flask fitted with a magnetic stirrer, a reflux condenser, and an addition funnel. Dibutyltin dilaurate, 3 drops and butylated hydroxy toluene, 3 mg, were added. Isocyanatoethyl methacrylate, 89 uL (ICEM) in 10 mL CHCl3, was added dropwise. Following the addition the solution was heated to reflux. After 12.5 hours no ICEM could be detected by infrared analysis. The reaction mixture was then slowly added to 2 L of anhydrous ethyl ether and the solid collected. After drying at 30° C. under reduced pressure the yield of macromer was 3 g. The Mn, Mw and Pd values were 4,900, 5,900 and 1.2 (vs. polyethylene glycol standards).
Hydroxy terminated copolymer, 4.5 g, (from Example 6) was dissolved in 90 mL of chloroform in a 250 mL 3-neck flask fitted with a magnetic stirrer, a reflux condenser, and an addition funnel. Dibutyltin dilaurate, 2 drops and butylated hydroxy toluene, 3 mg, were added. Isocyanatoethyl methacrylate, 93 uL (ICEM) in 10 mL CHCl3, was added dropwise. Following the addition the solution was heated to reflux. After 20 hours a trace of ICEM could be detected by infrared analysis. The reaction mixture was then slowly added to 2 L of anhydrous ethyl ether and the solid collected. After drying at 30° C. under reduced pressure the yield of macromer was 3.14 g. The Mn, Mw and Pd values were 4,900, 8,900 and 1.8 (vs. PEG standards).
The data was analyzed using WETTEK 12 software. Results are shown below in Table V.
A urethane prepolymer prepared from isophorone diisocyanate, diethylene glycol, polysiloxanediol (molecular wt. 3,000) and endcapped with 2-hydroxyethyl methacrylate was combined with the following; methacryloyloxypropyl tris(trimethylsiloxy)silane (TRIS), N,N-dimethylacrylamide (DMA), N-hexanol, benzoin methyl ether (BME). The proportions are given below.
The resulting clear mix was then filtered through a 1.2 micron filter into a clean glass vial.
Anterior and posterior mold surfaces were cleaned by electrostatic deionization in air and transferred to an inert (nitrogen) atmosphere. The mold anterior was then filled with 40-80 uL of monomer mix, (Example 43) in the inert atmosphere and placed on a casting plate. The mold posterior was then positioned. Once the casting plate was full the top plate was aligned and tightened down to 18 inch-pounds. Casting plates were then placed under ultraviolet light at 4,000 u watts/cm2, (oxygen level was <50 ppm), for one hour. Following separation the mold halves containing lenses were placed in a 70/30 volume by volume solution of ethanol and water or 100% ethanol. Lenses and solution were placed in an ultrasonic bath at 50° C. and allowed to release. Lenses were then transferred to absolute ethanol. After one hour the solvent was exchanged with fresh ethanol and allowed to stand for 48 hours. Ethanol was then removed by water extraction.
A solution of 0.1 mmol surface-active macromer of Example 18, 0.007 g of neopentyl glycol dimethacrylate, and 0.0038 g of BME in 100 mL of deoxygenated, distilled water was prepared by stirring at room temperature for one hour. One contact lens prepared as described in Example 44 was placed in a 10 mL lens vial and the vial was filled with the solution under a nitrogen atmosphere in a glove box. The vial was sealed with a Teflon lined stopper and crimp seal, placed on its side and irradiated with 2500 uW/cm2 of UV light for 2 hours. The lens was removed from the vial, washed with distilled water, extracted in ethanol for 2 hours and boiled in distilled water for 2.5 hours. The lens was then sealed in a vial in buffered saline solution.
A solution of 0.1 mmol surface-active macromer of Example 20, 0.01 g of neopentyl glycol dimethacrylate and 0.003 g of BME in 100 mL of deoxygenated, distilled water was prepared by stirring at room temperature for one hour. One contact lens prepared as described in Example 44 was placed in a 10 mL lens vial and the vial was filled with the solution under a nitrogen atmosphere in a glove box. The vial was sealed with a Teflon lined stopper and crimp seal, placed on its side and irradiated with 2500 uW/cm2 of UV light for 2 hours. The lens was removed from the vial, washed with distilled water, extracted in ethanol for 2 hours and boiled in distilled water for 2.5 hours. The lens was then sealed in a vial in buffered saline solution.
A solution of 0.1 mmol surface-active macromer of Example 18, 0.007 g of neopentyl glycol dimethacrylate, and 0.003 g of BME in 100 mL of deoxygenated, distilled water was prepared by stirring at room temperature for one hour. A SiL-TECH silicone elastomer contact lens (available from Bausch & Lomb Incorporated) was placed in a 10 mL lens vial and the vial was filled with the solution under a nitrogen atmosphere in a glove box. The vial was sealed with a Teflon lined stopper and crimp seal, placed on its side and irradiated with 2500 uW/cm2 of UV light for 2 hours. The lens was removed from the vial, washed with distilled water, extracted in 1:1 ethanol:isopropanol for 3 hours. The lens was then sealed in a vial in buffered saline solution.
The contact angle of the surface coated lenses of Example 47 was measured and compared to an untreated lens (control). The average contact angle of three coated lenses was 38° versus 46° for the control sample.
Five subjects wore one contact lens of Example 45 and one control contact lens (the uncoated lens of Example 44) in the other eye. The lenses were analyzed after one hour of wear for surface characteristics of wettability and surface deposition. The wettability rating scale was 0-4, where 0 was more than 2/3 of the anterior lens surface unwetted by tear film and 4 represented complete (100%) wetting by tear film. The deposition scale was 0-4 where 0 represented no surface deposits and 4 was multiple deposits of 0.5 mm diameter or larger. The results were wettability 2.8 and deposits 1.2 which compares favorably to values of 1.0 and 1.8, respectively for wettability and deposits for uncoated control lenses of Example 44.
1. A method of modifying the surface of a polymeric object which comprises immersing the polymeric object in an aqueous dispersion of a surface active macromer described by the formula: DC wherein A is at least one ethylenically unsaturated hydrophobic monomer, B is at least one ethylenically unsaturated hydrophilic monomer, C is a functional chain transfer agent, D is an ethylenically unsaturated end group, y is within the range from about 0.1 to about 0.9, and x+y=1, a hydrophobic cross-linking agent, and a free radical initiator and exposing the immersed polymeric object to ultraviolet light to form a permanent, cross-linked surface coating on the polymeric object.
2. The method of claim 1 wherein the aqueous dispersion contains a surface active macromer at a molar concentration of about 0.1 to 0.001, from about 1 to about 10-4 parts by weight of a cross-linking agent, and from about 0.1 to about 10-4 parts by weight of a free radical initiator.
3. The method of claim 1 wherein A is selected from the group consisting of ethylenically unsaturated polyoxyalkylenes, polyacrylamides, polyvinylpyrrolidones, polyvinyl alcohols, poly (HEMA), and N-alkyl-N-vinyl acetamide.
4. The method of claim 1 wherein A is an ethylenically unsaturated polyoxyalkylene selected from the group consisting of (meth)acrylated polyoxyalkylenes, (meth)acrylamido polyoxyalkylenes, styrenyl polyoxyalkylenes, alkenyl polyoxyalkylenes, vinyl carbonate polyoxyalkylenes and vinyl carbamate polyoxyalkylenes.
5. The method of claim 4 wherein the polyoxyalkylene is polyethylene oxide.
6. The method of claim 1 wherein A is (meth)acrylated polyethylene oxide.
7. The method of claim 6 wherein A is methoxy polyethylene glycol methacrylate.
8. The method of claim 3 wherein A is a methacrylate endcapped poly-N-vinylpyrrolidinone.
9. The method of claim 3 wherein A is a methaorylate endcapped poly-N,N-dimethylacrylamide.
10. The method of claim 1 wherein B is selected from the group consisting of alkyl (meth)acrylates, N-alkyl (meth)acrylamides, alkyl vinylcarbonates, alkyl vinylcarbamates, fluoroalkyl (meth)acrylates, N-fluoroalkyl (meth)acrylamides, N-fluoroalkyl vinylcarbonates, N-fluoroalkyl vinylcarbamates, silicone-containing (meth)acrylates, (meth)acrylamides, vinyl carbonates, vinyl carbamates, styrenic monomers and polyoxypropylene (meth)acrylates.
11. The method of claim 10 wherein the styrenic monomers are selected from the group consisting of styrene, alpha-methyl styrene, paramethyl styrene, para-t-butyl monochloro styrene, and para-t-butyl dichloro styrene.
12. The method of claim 10 wherein B is 1-H,1-H,5-H-octafluoropentyl methacrylate.
13. The method of claim 1 wherein C is selected from the group consisting of mercapto carboxylic acids, mercapto alcohols, and aminomercaptans.
14. The method of claim 13 wherein C is thioglycolic acid.
15. The method of claim 13 wherein C is 2-mercaptoethanol.
16. The method of claim 13 wherein C is 2-aminoethane thiol.
17. The method of claim 14 wherein D is a (meth)acrylated hydroxy ester moiety derived from glycidyl (meth)acrylate.
18. The method of claim 15 wherein D is a (meth)acrylated ester moiety derived from (meth)acryloyl chloride.
19. The method of claim 15 wherein D is a (meth)acrylated urethane moiety derived from (meth)acrylated isocyanate.
20. The method of claim 16 wherein D is a (meth)acrylated urea moiety derived from (meth)acrylated isocyanate.
21. The method of claim 15 wherein D is a vinylcarbonate moiety derived from vinyl chloroformate.
22. The method of claim 16 wherein D is a (meth)acrylated amide moiety derived from (meth)acryloyl chloride.
23. The method of claim 16 wherein D is a vinylcarbamate moiety derived from vinyl chloroformate.
24. The method of claim 1 wherein the polymeric object is a contact lens.
25. The method of claim 24 wherein the contact lens is a hydrogel contact lens.
26. The method of claim 24 wherein the contact lens is a rigid gas permeable lens.
27. The method of claim 24 wherein the contact lens is a silicone elastomer contact lens.
28. The method of claim 1 wherein the cross-linking agent is selected from the group consisting of hydrophobic molecules having two or more polymerizable groups.
29. The method of claim 28 wherein the cross-linking agent is selected from the group consisting of hydrophobic molecules having two or more (meth)acrylate groups.
30. The method of claim 28 wherein the cross-linking agent is selected from the group consisting of hydrophobic molecules having two or more (meth)acrylamide groups.
31. The method of claim 28 wherein the cross-linking agent is neopentyl glycol dimethacrylate.
32. A surface-modified polymeric object prepared by immersing the polymeric object in an aqueous dispersion of a surface active macromer described by the formula: DC wherein A is at least one ethylenically unsaturated hydrophobic monomer, B is at least one ethylenically unsaturated hydrophilic monomer, C is a functional claim transfer agent, D is an ethylenically unsaturated end group, y is within the range from about 0.1 to about 0.9, and x+y=1, a hydrophobic cross-linking agent, and a free radical initiator and exposing the immersed polymeric object to ultraviolet light to form a permanent, cross-linked surface coating on the polymeric object.
33. The surface-modified polymeric object of claim 32 wherein the object is a contact lens.
ES92902675T ES2113941T3 (en) 1990-11-27 1991-11-20 surface treatment of objects polymer.
"Copolymers of Acrylamide and Surfactant Macromonomers: Synthesis and Solution Properties," Polymer, vol. 28, pp. 2110-2115 Nov., 1987), Schulz, et al.
"Graft Copolymers Having Hydrophobic Backbone and Hydrophilic Branches, IV, A Copolymerization Study of Water-Soluble Oligonvinyl Pyrrolidone Macromonomers," J. Polymer Sci.: Part A: Polymer Chemistry, vol. 27, pp. 3521-3530, M. Akashi, et al.
"Graft polymers With Macromonomer, II. Copolymerization Kinetics of Methacrylate-Terminated Polystyrene and Predicted Graft Copolymer Structures," J. Polym. Sci. Polym. Chem. Ed., 22, 1633 (1984), G. O. Schutz and R. Milkovich.
"Graft Polymers With Macromonomers, I. Synthesis From Methacrylate-Terminated Polystyrene," J. App. Polym. Sci., 27 4773 (1982), G. O. Schultz and R. Milkovich.
"Hydrophilic Spacer Groups in Polymerizable Lipids: Formation of Biomembrane Models From Bulk Polymerized Lipids," J. Am. Chem. Soc., vol. 107, pp. 4134-4141 (1985), H. Ringdorf, et al.
"Monomeric Surfactants for Surface Modification of Polymers," Macromolecules, vol. 23, pp. 126-132 (1990), B. Ranby, et al.
"Polymerized Monolayers From a Styrene Functionalized Surfactant," Colloids and Surfaces, vol. 35, pp. 343-351 (1989), J. H. Fendler.
"Saturated and Polymerizable Amphiphiles With Fluorocarbon Chains, Investigation in Monolayers and Liposomes," J. Am. Chem. Soc., vol. 106, pp. 7687-7692 (1984), H. Ringdorf, et al.
"Surfactants and Interfacial Phenomena," by M. J. Rosen, Wiley-Interscience: New York, p. 109 (1989).
"Synthesis and Application of Fluorine Containing Graft Copolymers," Polymer Bull., 5, 335-340 (1981), Y. Yamashita.
"Synthesis and Characterization of Functional Graft Copolymers by Macromonomer Technique," J. Appl. Polym. Soc., 36, 193-199 (1981), Y. Yamashita.
"Synthesis of N-Hydroxyethyl-N-Methylmethacrylamide and Its Use in the Macromonomer Synthesis," J. Polym. Sci., Polym. Letters Ed., 19, 629-636 (1981).
Interactions of PEO-Containing Polymeric Surfactants With Hydrophobic Surfaces, J. H. Lee, Univ. of Utah (1988). | 2019-04-25T12:46:51Z | https://patents.google.com/patent/US5135297A/en |
I’ve been asked to speak this evening about “Why Buddhism?” which is of course a valid question, especially in the West, where we have our own religions, so why do we need Buddhism?
When we speak about Buddhist science, this is referring to things like logic, how we know things, and basically the view of reality – how the universe has come about, etc., these type of things – the relation between mind and matter. All of this is dealing with scientific topics, and Buddhism has a lot to offer in these areas.
Then Buddhist psychology deals with various emotional states, especially disturbing emotions that cause us a great deal of unhappiness (anger, jealousy, greed, etc.). And Buddhism is very rich in methods for how to deal with the problems that come up from these disturbing emotions.
Buddhist religion, on the other hand, deals with various ritual aspects, prayers; it deals with topics like rebirth. And that also is a very rich area.
So when we ask, “Why Buddhism? What need do we have for Buddhism in the West in the contemporary world?” then I think we need to look specifically at Buddhist science and Buddhist psychology. If people are interested in the more religious aspects of Buddhism, that’s very good; no problem. But in general it is not very easy if you are brought up in one religion to change to another religion, and for most people it causes conflict within themselves, loyalty conflict, and particularly can cause problems at the time of death – you’re very confused about what to actually believe.
So we need to be very careful about being Western people growing up in Western traditions and turning to the religious aspects of Buddhism, because there are additional problems that can be there, such as superstition coming in and expecting miracle things from the Buddhist rituals. So it is much better, much more recommended, at least in the beginning, to focus on Buddhist science and Buddhist psychology. These are areas that can be integrated very well into our Western traditions without conflict. So let’s look at some of these aspects of Buddhist science and psychology.
Logic is a very important part of the Buddhist training, and the way that it is studied is in terms of debating. So what’s the purpose of debate? The purpose of debate is not to win over your opponent, to prove that the opponent is wrong. But rather the whole point of the debate is that there’s somebody who is the proponent, and they state a certain position or certain understanding of one of the Buddhist teachings, and the other person challenges their understanding and is trying to test the other person to see how consistent they are in their understanding. So if you believe this or that, then logically something else follows from it. And if what follows from it is nonsense, doesn’t make any sense, then there’s something wrong with your understanding. So this is very important because if we’re going to try to understand something deeply concerning basic facts of reality, let’s say, such as impermanence, then we want to – what’s called meditation – we want to think deeply about it and make it a part of the way that we view the world.
Everything is changing moment to moment to moment, and that’s something which is important to understand in terms of our general mental peace. For instance, you buy a new computer, and eventually it breaks, and you get all upset about it: “Why should it break?” and so on. But if you think about it logically, the reason that it broke was that it was made in the first place. Because it was made from so many different parts and so many different things that are interconnected, then it’s very unstable, and of course at some point it’s going to break.
Even when we meet somebody and we develop a strong friendship or even a partnership, eventually it ends. So why did it end? Why did we break up? We broke up because we met. Every moment after we met, the circumstances and the conditions changed in this person’s life and in my life. The circumstances that supported our initial friendship are no longer there, and the friendship is dependent on all these conditions, so when it ends – well, of course it’s going to end, because the conditions supporting it have changed. So the final event which seems to us to cause the breakup – an argument, let’s say – is only the condition for the friendship to end. If it wasn’t this condition, it would have been something else. But the actual cause for it to end was because it began.
So like that, through logic, through debate, one comes to a definite understanding without any indecision (“Is it like this, or is it like that?”). That way, our understanding becomes very firm, very stable. And whether we’re doing meditation after that or whatever, it becomes much more effective. So this type of discussion, debate, logic, is very helpful for anybody in any situation. Very often we think in ways which are very unclear; we don’t think of the consequences of our actions or the consequences of our way of thinking. So if we can learn to think logically, then we’ll have far less trouble in our lives.
So this is one aspect of Buddhist science.
Then in terms of reality, one point we already discussed is in terms of impermanence. Everything is changing moment to moment to moment and coming closer and closer each moment to its end. This is reality. It’s true about our age. We can think, “Oh, every day I’m getting older” and think, “Well, okay,” but how many of us think every day that: “I’m getting closer to my death. That’s just reality”? But if we are aware of that, that each day we’re getting closer to our death and that death can happen at any time, which is true, then we don’t waste our time. We don’t put things off until tomorrow, tomorrow, tomorrow, but we use our lives in as meaningful a way as we can. And what’s most meaningful is to try to be of benefit to others. So this is reality. And it’s very helpful to think, “If this was my last day, what would I want to do in this last day? How would I use it in a meaningful way?” Because we never know when our last day will be. We could be hit by a car when we leave this room. This is not meant to make us depressed; it’s meant to make us use our time much more meaningfully.
Let’s take another example in terms of reality. Imagine being in an elevator with ten other people, and the elevator gets stuck. The electricity goes off, and you’re stuck in this elevator with these ten people for a whole day. How would you deal with each other? If you start to fight, if you start to argue, and so on, it’s going to be like a hell in this elevator. The only way that you can survive is if everybody is helpful, friendly, and kind to each other, because you’re all stuck in this elevator together; you’re all stuck in the same situation. So this is logical. This is reasonable, isn’t it? So then we extend this to the whole planet: The whole planet is like a big elevator, and we’re all stuck on this planet together. If we argue and fight with each other, it just becomes absolutely miserable for everybody. So the only way that we can survive is by everybody being friendly and kind and helpful to each other, because we’re all here together and we’re all in the same situation. We breathe the same air; we share the same ocean, water, land. We’re all in the same elevator. So like this. This is reality together with logic.
Also we have many fantasies and projections. We imagine that we and others and the world exist in all sorts of impossible ways. We project that, and it seems as though this is the way things exist, but it doesn’t correspond to reality; it’s just our fantasy, our projection.
For example, I might think that I can act in a certain way and it doesn’t have any consequences. So, “I can not get a good education, I can be lazy, and somehow this isn’t going to have any effect on my life; I’ll still be successful.” Or that “I can be late, or I can say cruel things to you, and it won’t have consequences.” A lot of people regard other people as not really having feelings. They never think that what they say might hurt the other person. So “I can be late, and it doesn’t matter.” Well, this is not reality. This is a projection of fantasy about cause and effect. But the reality is that everybody has feelings, just as I do, and what I say and how I act with you is going to affect your feelings, just as the way that you treat me and speak to me affects my feelings. So that’s reality, isn’t it? And the more that we understand that and keep mindful of that, the more considerate we are of others. We care about how we affect them, and we modify our behavior accordingly.
Or I could imagine that I exist independently of everybody else. This also is not reality, is it? If I think like that, then I’d think, “I should always get my way. I’m the most important. So I should always be served first before everybody else in the restaurant,” and if we don’t get our way, we get very upset, very angry. But the problem of course is that everyone else thinks that they’re the most important person and nobody will agree that we’re the most important. So this is our projection. This is our fantasy. This is not reality. Nobody is the center of the universe. Nobody is the most important. We’re all equal in the sense that everybody wants to be liked, nobody wants to be disliked. Everybody in the restaurant waiting to be served wants to have their meal, not just me. Everybody waiting in a doctor’s office wants to have their turn, not just me. So we’re all equal. This is again reality.
This is part of Buddhist science, to understand reality and to modify our behavior accordingly. There are of course other aspects of the teachings about reality. And it’s very interesting how Western scientists are starting to find that many of the points made in Buddhist science are correct – different ways of looking at things which they had not considered before.
For instance, we have in Western science the law of conservation of matter and energy: matter and energy can be neither created nor destroyed, only transformed. If we think in terms of that, what follows logically is that there’s no beginning and no end. So when we think in terms of the Big Bang, then we might think the Big Bang came from nothing – it started from nothing – but the Buddhist point of view is that there was something before the Big Bang. Buddhism has no problem with the Big Bang as the start of this particular universe, but there have been countless universes before, and there’ll be countless universes after. And Western science is slowly starting to think in these terms as well. And also it’s logical from a basic Western scientific point of view. So here again we come to logic. If you believe that matter and energy can neither be created nor destroyed but only transformed, then it is totally inconsistent logically to assert, “But it had a beginning with the Big Bang.” So this is a clear example of the application of this Buddhist logic and debate to positions that we have in Western science.
One of the main assertions in Buddhist science is the relation between mind and matter. Mind and matter are interrelated. You can’t reduce mind to just the brain or some chemical process. You see, the problem is when you use the word mind you tend to think of it as being some sort of thing, but that’s not the Buddhist concept. The Buddhist concept is speaking about mental activity. And mental activity – which means knowing things – we can describe it by some chemical or electrical process in the brain, but we can also describe it from an experiential point of view, and it’s this experiential point of view that we’re talking about when we speak about mind.
And the medical scientists are discovering that it’s true what Buddhism says, that our state of mind, the quality of our experiencing life, will affect our physical health. So if we have peace of mind, inner calm... That means being free of always worrying and complaining and thinking in a very negative, pessimistic way. If we think in these negative ways, it is harmful to the health. Whereas if we are optimistic, kind, thinking of others, friendly, calm – this strengthens the immune system, and it is conducive to better health. So medical science, in various centers around the world, is doing research about this, and they’re finding that what Buddhism says is true, that our state of mind affects the body, so it affects matter. And we have many programs in the West now using what’s known as “mindfulness” meditation for control of pain to help people to deal with stress, pain, difficult situations. This is basically staying focused on the breath, which keeps us calm. It connects us to earth, in a sense, to a physical element, so that you’re not so upset about thinking, “Me, me, me and my pain and my worry” and “I’m so upset.” So it calms one down and is very, very helpful for pain management. So we certainly don’t have to follow Buddhist religion in order to benefit from such methods.
So this is Buddhist science.
Now, Buddhist psychology deals with how we know things, so in other words cognitive science (the difference between psychology and science is not so strict). So we have the study of ways of knowing – how do we know things? – and we also have how we deal with emotional problems. These are the two areas of Buddhist psychology.
So what are the valid ways of knowing things? We can have what’s known as bare perception. This is seeing, hearing, smelling, tasting, and feeling some physical sensation (and we can also have these in dreams, and then it’s mental). So when we see someone, this needs to be valid. It’s not always valid: “I thought I saw something over there, but I’m not quite sure.” “I thought I saw you in the crowd, but I’m not quite sure. I thought I saw you, but actually it was somebody else.” “I thought you said this, but maybe I was wrong and I heard differently.” That’s not valid, is it? This isn’t accurate and decisive.
And there can be a lot of causes for distortion. Like I take off my glasses and I see just a blur in front of me. But you don’t exist as a blur, do you? There’s something wrong with my eyes, and that’s why it looks distorted. If I asked somebody else, “Do you see a blur over there?” they would say no, so I would know that this was wrong.
So we have bare perception, and here we’re talking about accurate, decisive perception.
And also valid is inferential understanding. It has to be a valid one though, not an incorrect one. Inference. Reasoning. “Where there’s smoke there’s fire” is the classic example. You see smoke coming from a chimney on the far mountain. So we have a valid perception – you see the smoke – and we can infer a fire (we don’t actually see the fire). Where there’s smoke, there must be a fire. So that’s valid.
But there are some things that you can’t even know by logic, like the name of the person who lives in that house, and for that you need a valid source of information. That’s also a type of inference – that this person is a valid source of information, therefore what they say is true. The best example for that is: “When is my birthday?” There’s no way that we could know our birthday by ourselves. The only way we can know our birthday is by asking our mother or seeing the records, so a valid source of information.
There are many forms of inference. There’s inference based on well-known conventions: You hear a sound. How do you know that it’s a word? And how do you know what meaning it has? That is quite an amazing process if you think about it. We’re just hearing sounds, basically, but because we have learned certain conventions, we infer when we hear this sound that it is the sound of a word, and we infer that it has a certain meaning. Of course we have to check because sometimes we think that a person means something by what they say when they actually mean something completely different.
So this is what we’re talking about when we talk about this aspect of Buddhist psychology, cognitive science. We have to check. “I infer from what you said that this is what you mean, but is that correct or not?” Very often we misunderstand what the other person’s meaning is, don’t we? Somebody says, “I love you,” and we could think that means that they are sexually interested in us, whereas that’s not at all their meaning. A lot of misunderstanding can come because of that incorrect inference.
So if it is valid inference, it is accurate and decisive.
Presumption is invalid. “I presume that you mean this, but I’m not sure.” Presumption is a guess basically. “I guess this is what you mean.” It could be right, it could be wrong, but it’s indecisive. “I think that this is what you mean.” That’s presumption. But we’re not sure.
Then there’s indecisive wavering: “Do you mean this, or do you mean that?” We go back and forth.
And then there’s distorted cognition, where we think something completely incorrect. This isn’t at all what the other person meant.
So this is how cognition works, and Buddhism speaks a great deal about this. It’s very, very helpful for us to understand, from any type of background, “Is my way of knowing this correct or incorrect?” If I’m still not sure, then I need to recognize that and try to correct it, try to find out again what is reality. So this is helpful for anybody. You don’t need Buddhist religion and rituals for this.
Then the other main topic in Buddhist psychology has to do with emotions. We have both positive and negative emotions. These negatives ones are disturbing emotions; they disturb our peace of mind. We’re talking about things like anger. The definition is that this is a state of mind which, when it arises, causes us to lose our peace of mind – so we become a little bit upset, a little bit nervous – and it causes us to lose self-control. So when we get angry, our energy – you can feel it, it’s disturbed. And we say and do things that later we might regret. We just act compulsively.
We hear a lot in Buddhism about karma. And what karma is talking about is this compulsive aspect of our behavior based on previous habit. So when we have great attachment or desire or greed, then again we’re not calm – we are upset because we want to have something – and again we have no self-control, like with that chocolate, that I just have to eat it.
So these are disturbing emotions. But on the other hand, there are positive ones. Buddhism isn’t saying to get rid of all your emotions. There are things like love, which is the wish for others to be happy and to have the causes of happiness regardless of what they do, regardless of how they treat me or my loved ones. And there’s compassion, the wish for others to be free from suffering and the causes of suffering. There’s patience. There’s respect. So there are many positive emotions as well. So we need to learn to be able to differentiate between what is constructive and what is destructive in our emotions and in our way of acting. And Buddhism is very rich in teaching not only all these different emotional states so that we can recognize them, but also rich in methods for helping us to get rid of these disturbing states of mind.
So you remember we were speaking about misconceptions, about projections of what’s just not real? One of the most prominent projections is about how we exist. As I was saying, in very simple style, we think that we’re the most important one, that we exist solidly, by ourselves, and we should always have our way, and everybody should like us. What’s very interesting is to think in terms of: “Not everybody liked the Buddha, so why should I expect that everybody’s going to like me?” A very helpful statement to remember.
So, anyway, we think in terms of: “I am this solid thing sitting inside my head, the author of the voice going on in my head, worrying about What should I do? What do people think of me?” As if there’s a little me sitting in the head seeing all the information coming in on a screen and loudspeaker from the senses and pushing the buttons that make the body move or the speech work: “Now I’ll do this. Now I’ll say that.” So this is a disturbing misconception about ourselves. How do we know it’s disturbing? Because we all feel insecure. Thinking like that, there’s this insecurity and worry about myself: “What do people think of me?” etc., etc.
So what happens is that we have these projections not only about ourselves but then about everything around us. We see various objects, and we exaggerate the good qualities that they have. We project even good qualities that they don’t have. Like when we fall in love with somebody, “They’re the most wonderful person in the world.” We totally ignore any shortcomings they might have. “They’re the most beautiful, desirable person I’ve ever seen.” And then if we don’t have them, longing desire: “I’ve got to get them as my partner, as my friend.” And if we have them as our friend, attachment (we don’t want to let go) and greed (we want more and more of their time).
So this is a disturbing state of mind, isn’t it? We need to see reality: everybody has strong points, weak points. We often think, and this is completely unreal, that: “I’m the most important one. So I’m the only one in your life. You should give all your time to me,” and we forget completely that they have other people in their lives, other things that they’re involved with, not just us. So we get angry. We feel insecure. And if they don’t call us, we exaggerate the negative quality of that, and we don’t want to see any of the good qualities of our relation with this person. And we get angry; we want to get this away from us, so we yell at them, “Why didn’t you call me? Why didn’t you come?” So that’s based on there’s a little me, that I should always have my way, I should be the most important one, and the unreality that I am the only one in this person’s life.
Buddhism gives a very clear analysis of what is upsetting, what is incorrect, in this way of thinking and feeling. Because, you see, our minds make things appear like that, and the problem is that we believe that it corresponds to reality. So we have all these methods to, in a sense, pop the balloon of our fantasy. It may feel as though I’m the only one who exists, because when I close my eyes I don’t see anybody else anymore and there’s still the voice in my head. But this is silly. That’s not reality. That doesn’t correspond to reality. You don’t stop existing when I close my eyes. So this is basic Buddhist psychology.
Or in terms of love and compassion. We have many methods for developing these that are taught in Buddhism, and anybody can benefit from them (again without following the religious aspects of Buddhism). Love and compassion is based on everybody being equal: everybody wants to be happy; nobody wants to be unhappy. Everybody likes to be happy. Nobody likes to be unhappy. We’re all the same.
We’re all interconnected. My whole life depends on the kindness and work of others. We think of all the people involved in growing the food that we eat, transporting it, bringing it to our stores. Then there are people who built the roads and the people who built the trucks that carry the food. And where did the metal come from? Somebody had to mine the metal to make the trucks. What about the rubber for the tires? Where did that come from? So many people involved in that industry as well. And what about the petrol and the dinosaurs and so on whose bodies decomposed and made this petrol? So if we think like that, then we see that we are totally interconnected and dependent on everybody else. And this becomes even more evident in terms of our global economy.
So on the basis of understanding that equality of everyone and our interdependence with everyone, then we think in terms of: “Whatever problems there are, they have to be solved.” Because as one great Indian Buddhist master said, “Problems and suffering do not have an owner; suffering needs to be removed, not because it’s my suffering or your suffering – it has to be removed just because it hurts.” So when there’s a problem with the environment, let’s say, it’s not just my problem or your problem; it’s everybody’s problem. There’s no owner to the problem. It has to be solved because it’s a problem, simply because it’s a problem and causes trouble to everyone.
So like that, we develop love and compassion in a method that has nothing to do with religion, but is totally based on logic and reality.
So when we ask, “Why Buddhism?” these are the aspects that make Buddhism relevant for us in the Western world, the scientific aspects and the psychological aspects. Then for a few of us Westerners, we might find in addition the religious aspects of Buddhism beneficial – the rituals, the teachings about rebirth, the prayers, and so on. But as I said, it’s very important to examine very carefully what is our reason for this attraction. Is it just fascination with the exotic? Are we looking for some sort of miracles? Are we doing it as a rebellion against our parents or our traditions? Are we doing it just because it’s the present trend; it’s so-called “cool” to be involved with Buddhism? These are not valid reasons, because they don’t last; they’re not stable. If we are attracted and we find that it is beneficial for us (it helps me to be a kinder, more compassionate person), and it supplements the scientific and psychological aspects – and that’s very important, that it needs to supplement the science and psychology and not substitute for it – but if the religious aspects have those characteristics for us, then fine.
So like that we differentiate Buddhist science, psychology, and religion.
When we speak about rebirth, we use the notion of a mind. How much does it overlap with the idea of a soul?
When we talk about rebirth, we speak about mind. How much does that overlap with soul? We have to understand what we mean by mind and what we mean by soul.
Rebirth is speaking about continuity. Just as matter and energy can neither be created nor destroyed but only transformed, similarly our individual, subjective mental activity can neither be created nor destroyed. It’s illogical for it to start from nothing. And if each moment generates a next moment in the continuity, then it’s illogical for it to just come to an end and turn to nothing. Of course there’s always some physical support for the mental activity, but it can be very, very subtle energy; it doesn’t have to be a gross body with a brain. So this is what goes from lifetime to lifetime to lifetime, even into Buddhahood, the continuity of individual, subjective mental activity, which can be very subtle or very gross, many different levels of it, but it continues moment to moment to moment without a break.
Now, when we talk about soul, of course it’s a Western word. And in different languages – Western languages as well – we have words for mind, we have words for spirit, we have words for soul. They don’t correspond to each other, even in our Western languages, and different religions are going to define soul differently in different languages. And then in Western religions there’s the relation between the soul and God. And then in Indian religions we have atman, and again with different ideas about atman. So it’s hard to just generalize in terms of the word soul.
But what is much more easy to discuss is me – not the concept of me, but what is me? The me or the self is something that we all have, but we project onto it ways in which it exists which do not correspond to reality. Like there’s some sort of solid me, like a piece of luggage on a conveyor belt, that goes through our whole life and into our next life as well. It’s very interesting: You look at a picture of yourself as a baby, and you say, “That’s me.” What’s me about that? Every cell in the body has changed. The way of thinking, the way of knowing things, is completely different from when we were a baby. And yet we say, “That’s me.” So what is me? Me is a word which is labeled onto all these changing instances in our life. And me is not any of these pictures, but the word me refers to something on the basis of all these different moments of my life, which is changing from moment to moment to moment.
The example that I always use is a movie, let’s say Star Wars. What is Star Wars? We say, “I saw Star Wars,” but can we see the whole movie in one moment? No. Any one moment of the movie, is that Star Wars? Well, yes. It’s a moment of the film Star Wars. So Star Wars is not the same as each moment of the film. Star Wars is not just the title “Star Wars.” The name “Star Wars” does refer to a movie – there is a movie Star Wars, it exists – but you can’t find it in any piece of the plastic of the film, you can’t find it in any scene, but it exists as changing from moment to moment to moment.
So the me or the self is like that. There’s the word me. It refers to something – I’m sitting here; I’m doing this; I’m talking to you. But it’s not identical with my mind or with my body or any moment of it. But on the basis of the continuity of body and mind, we can label it me. It’s not you. It’s changing moment to moment, and it’s nothing solid. So do you want to call it soul? What do you want to call it?
What was the term that Buddha Shakyamuni used in Sanskrit or Pali about this same thing?
The term that Buddha used was anata in Pali or anatman in Sanskrit, which is “not the atman” asserted by the other schools of Indian philosophy. The other schools of Indian philosophy assert the atman as being something which is static (it never changes and is not affected by anything), partless (which means it’s either the size of the universe, atman is the same as Brahma, the whole universe, or the atman is like some tiny spark of life), and which can exist totally separately from a body and mind in a state of liberation.
Some Indian philosophies assert that that type of atman has consciousness. That’s the Samkhya school. And the Nyaya school says that it doesn’t have consciousness. The one that says it has consciousness says that it just inhabits this body and uses the brain. And the one that says it doesn’t have consciousness says that it enters the body and says that consciousness just arises from the physical basis of the body.
If somebody believes in rebirth and they say they will be reborn, how certain can they be that all the characteristics and all the information stored in their consciousness will go on into their next life?
First of all, Buddhism asserts that rebirth is beginningless – no beginning – which means that we have habits and instincts from endless lifetimes. So, depending on many, many different factors, only some of these instincts and tendencies will manifest in any particular lifetime. It’s certainly not the case that all one’s instincts and learning from the immediately preceding life are going to manifest again in the next lifetime even if we are reborn as a human with a precious human rebirth, which is rare. A lot depends on what we were thinking and our state of mind when we died. And then all the circumstances and conditions of our next lifetime, which aren’t limited to just the conditions of our family, but there could be a famine in the country, there could be a war – there could be so many things that are going to affect what becomes manifest.
It’s very important, then, to try to put the main emphasis in our life into positive thoughts, not negative thoughts or behavior, and to die with calm, peace of mind, and positive thoughts and intentions to be able to continue on the spiritual path.
Maybe this is a good place to end. So we think whatever understanding, whatever positive force has come from this, may it go deeper and deeper.
That might sound like Buddhist religion, but it’s also quite scientific as well. If you have a nice meeting with somebody, and you are having a meaningful, positive conversation, and it ends with the telephone ringing, then the energy just drops completely and you completely forget about the positive conversation you had before. But if we end an interaction with thinking “May this make a positive influence on me,” then that positive feeling, that understanding, comes with us and can help us in our lives. So that’s how we end our discussion, and that’s a very helpful way of ending any positive interaction with anyone. | 2019-04-19T12:47:42Z | https://studybuddhism.com/en/advanced-studies/science-of-mind/emotional-hygiene/buddhist-science-psychology-and-religion |
To manage occasion allocation letters carefully you have to find any on-line templates or samples. An occasion snowball template can be a record which may be utilised to serve the purpose because some other investment document that is normal. You can find many sorts of property ask templates readily available via the web. Sponsorship proposal format will assist in making the request letter at a way.
When you have a goal, it ought to be easy you just consider the measures that are significant to be ahead of this bunch. You have to have a targets. Your principal aim is always to supply sufficient explanations for the reason you deserve a 28, when producing a sponsorship suggestion, it is very important to stay in your mind.
The procedure can be quite intimidating. It is the toughest percentage of the property clinic. Choose a subject that you’ve learned by means of your confirmation preparation.
You have must make certain you recognize everything it is you’re searching for when creating a property suggestion. There’s one additional answer, however, and that’s to write a sponsorship suggestion. Your allocation proposition should provide sponsorship levels to prospective private and corporate sponsors, therefore they can pick on the degree of payoff that suits their budget and level of interestrates. Developing an excellent content could possibly be job. The sponsorship proposals that are standard are throughout sporting occasions and business suggestion. Make sure the rule, Whenever you are aiming to help make the ideal sponsorship proposal.
The letter is the only real way by which you may outwit the rest of the applicants. Be reminded that may or may possibly not have seen you in person. Sponsorship suggestion letters need to be well written. Celebration sponsorship proposal letter should comprise a few things you ought to comprehend. It’s necessary for you to compile the paperwork that are crucial, like an Event Planner kind before you commence drafting your proposition. Composing a suggestion may be an important job. Distinct entities predicated onA the form of occasion can produce An business event proposal you’ve got on the job.
Wait for contributions. The host should have the option to either devote money right to the bride or donate services. Your sponsors are going to have their needs met in addition to the bundles take into consideration efficiency indexes and their organization goals. In order be able to compose occasion sponsorship proposals, you ought to be mindful with correspondence producing approach for the patrons that are prospective. Event sponsorship is sort of market approach attained by businesses. Explain that you’re getting so are currently seeking sponsorship to pay for the expense and married. Getting personal in your business proposition letters can be a method.
Events are planned and desired. This occasion can be actually a landmark and ought. If we are reduced on our financing Maintaining a event might be described as a touch much for several us specially. Events such as sports and charity need a lot of money to become utilized in lots of tactics.
Measure the type of function wherever your solutions have been required and align. Generating a successful exemptions suggestion ought to be unquestionably the main facet to look at if you would like to purchase your business sponsored. Although generally in many cases, a part of the marketing application of the corporation will be to sponsor an occasion, but it really is even now a prerogative to write an appealing proposal. Make certain you’re selecting the perfect companion for the event. Estimate the value of social networking exposure your brand receives as a consequence of the sponsorship. The assortment of times people will be vulnerable to your own new to get a effect of the exemptions and gauge how much you would ordinarily spend to accomplish similar numbers with your marketing and marketing methods.
Once it will likely be downloaded, it is possible to make changes init in accordance. Limit the quantity of money you’re needing of whether or not it really is regarded. Explain the form of sponsorship you’re needing of. Looking for a host might become a contest among event hosts. In a variety of ways, attempting to discover an company or event host will be a lot like looking for the employment. One among the methods that are best to cover the charges of the wedding is to receive it sponsored by loved ones as well as close friends. So you’ll get yourself a belief of what statements ought to be included to please the patrons, See our Sample function Forms.
You can find several different types of conditions. It might be handy to spell out the provisions for expenditures even though you aren’t anticipating any. If you are a company proprietoryou must build. The landlord could use the letter against you personally as a portion of the flooding strategy. You have to include the fundamental terms on the debt assumption letter that causes it to be clear to all parties what you intend to do.
Consequently there isn’t any confusion within the speech at the correspondence you also might opt to take into account typing the letter. You ought to do it, although it isn’t compulsary that you introduce your landlord a letter on paper telling him that the rent will be overdue. Payment announcements will also be referred to as check ups. They are an equally significant part tackling payroll. Keep a listing of this amount you paid with your charge card statement.
You will probably be told into the charge card payment page. Many charge payment internet sites provide you having the equilibrium an option to pay for the amount due or perhaps a certain sum, which you find it possible to input. Mail the payment, when you have set up your account information. Provide put instructions on how you’re handle checks and control cards. In the event the credit history check gets the client appear to be risky, question to get paid upfront in money.
Publish a check in the sum you’re very likely buy or to pay a money purchase to pay for the money. When cost must be produced, to shield finances, a day decide on, like Mondays. Now enter the knowledge, like credit card number and press .
When a invoice is legal is dependent on several factors, thus it’s vital that they each wind up at the right location. No cost can possibly be produced from a test. Describe the way the debtor is very probably going to make payments as well as the sum of every single and every repayment. To stop problems in the first place, set ground rules for the payment has to be manufactured and also adhere with them. Don’t confine the kinds of cost you take in to the conventional ones. If you want to submit your payment on line by check select the check choice. Additionally, it might be extremely alluring in the event you end up missing your statement, to earn a payment, or no payment whatsoever or without a postage when it is the time to trade your charge card.
Nearly all banks, lenders along with payment internet websites that are internet ensure it is easy that you pay your invoices utilising the possibility. If you’re prepared to suppose the other’s loan, you’re saying that you’re prepared to keep up payments with this mortgage until it’s paid . A loan is likewise an option you will get even when you have bad creditscore. The lender must inform the borrower that the assumption has occurred, and normally the terms are only precisely exactly the same. It is currently looking to find you just started to fight with your mortgage repayment about enough time your revenue was paid off. Lenders give you a verification number that indicates a payment that is thriving, after building an internet payment.
Have your credit card ready when you must deliver the system the info from the card, as an example, charge card number, expiration date and security code on the rear of your credit card. Luckily, for people with a niche creditcard you have a good deal of possibilities out there to you to help to get your instalments . You will need to demo your identification card and make your cost through check or cash.
Find out the client yourself if you should be self-employed. In the event the client is the perfect method to de-fuse the circumstance is to take the very best part out of this. Most clients pay to the products and products and services which you receive, but should you remain in operation long you’ll come off. Not many clients wish to have intouch with you at the specific same way, so of accomplishing your own company that the further options you give individuals, the more opportunities you will have. In the event the purchaser is just one you want to maintain and will be worth trying to keep, utilizing this kind of intermediary will permit it to become simpler to keep up a great partnership soon after the invoices get paidoff. Possess a great offer of selections on how to make the payment. Verizon mobile service exists in most areas of the country.
Look into your options to get what you are looking for. Payment Alternatives This really is the place you’re in a position to outline the manner you would like to simply accept cost (for example, checks or income ) and when payment needs to be made. You may want to get started looking at alternatives that are several to pay for your hire, like a inadequate credit , a cash advance or an free credit personal loan. There really are a couple unique options.
You also could need to erase painful and sensitive information including a Social Security amount. The next time you occur across a site that you just enjoy the design, you are able to just save it just like an HTML file, then utilize it. The way of locating a website is to ask friends and family about it. Pick and then manually draw on it. You have to add extra pages following the 1 that is original. Adding webpages with text messages on every webpage each may help save you a fantastic deal of time from incorporating the written text box to every page. Employ the links beneath if you’d really like to find out.
The PDF file type has been a format for submitting material. The fdf data document is made. It’s potential to double any place from the record for entering the area to automatically set the cursor. It needs to stay glued into a typical As you may not format a formal record in casual manner. Not merely is it that the ability certification an doc it communicates the simplest work ethics after it concerns that the closing measures of an individual using a particular organization and advantages of the individual to his future companies. A fdf data file can be made by you, if you own Adobe applications and a pdf file. PDFs allow the transformation of a selection of file formats which would keep to maintain the font style, color and images the applications used to produce it.
There are lots of things to consider when picking a template to make an Ezine like size (quantity of webpages, margins, headings, subheadings, and so on ) and simply how much place you would like for graphics and graphics. Additional templates are all offered through the Office Community site. You might find an decent group of invitation templates atdo-it-yourself-invitations.
Opt for the kind of file file you want to store since the own template. You own an example template and also a notion of it, you’ll maintain a posture to create one in accordance with your requirements. It’s far better to generate the template initially and then it will be potential to reuse the template. Among these websites you’ll be in a position to track down Inkscape business card templates that might assist you to generate the image you have to market your own organization your self, and your goods as well as remedies.
In any case , the procedure may function exactly the exact same. It is important that you simply employ it diligently so all your endeavors are finished punctually. It will be possible to easily rely on her in order to complete the actions assigned to her properly in a deadline, and using solutions also. You are able to also categorize the activities that ought to be done to the lands of your residence’s rooms. Hence, you’d be in a situation to accomplish tasks inside the period limitation that is specified. The tool permits one to insert shapes and images which will improve the overall look of your kind. The operation of word extends beyond that, but also can assist you to earn stuff.
You have the capability to coordinate with the background coloring of one’s PDFwhitened, or maybe you select a color to earn the redaction be noticeable, such as for instance black. Leave any one of these images you prefer touse. The film will appear from the template.
An dialogue box appears asking for the kind of advice the signer has to leave to finish the email signature, like their email address along with title. If you would like insert one text box on every page, then simply click within the tiny circle in the front of Insert one text box. Delete any logos or clipart that you never need to seem to the inside of the table . This can help you sail via a complicated period tide.
It’s a lot more applications while lots of folks utilize Word to get simple tasks such as writing letters. Understand that you are supposed to write a letter, not an essay. The exact very same arrangement is followed by an adventure letter to get a certification and serves exactly the exact same function. Be sure to clearly specify the basis for being absent, therefore your circumstance is known of by that the recipient of this letter. There is An example letter offered in the content under. It’s also helpful in case someone who has understood the suspect for a certain time writes the correspondence. If you’d like to use there, you need to write a program letter into the university.
Certification samples could possibly be located around the web, as well as publicly available advice, it wouldn’t be really difficult to make” such a certification. In the event that you would like a photo, look at purchasing one on still another internet site or eBay attempting to sell photos. Magazines possess this problem.
In the event the gift features a validity subsequently don’t forget to mention. Recognition app and A benefit does not will need to be complicated or expensive to work. Outstanding success that is todayas could look like nothing whatsoever at all just about any manner in a week. Sharing your capabilities can be actually a issue that is remarkable. Not all of us have the capacity of templates from scratch. It needs just a little creativity.
Creating a gift certificate is actually really a. The aforementioned template is ideal to be utilized in the formal setting and is both appropriate. Perhaps not merely is it the ability certificate an vitally important document once it regards the closing measures of an person using a specific company, it communicates the simplest work integrity and advantages of this man or woman to his future employers. This certification includes a pro-forma that may be molded based on this convention of a particular company. Make certain the level has been entered on the certificate. It is likely to personalize the above mentioned certifications depending on specifications and your requirements.
Simply since they have moved many instances TVI communicate has lots of difficulties using individuality, plus they appear to do business underneath names. It ergo far don’t have any discuss this issue. When you get an autograph during the mail, have time since I’ve clarified in a preceding section and energy for you to do a bit very simple research. Make certain you’re sending your petition to an tackle that is suitable. Present notes are now common therefore a certification would be a pleasure along with distinguishing and one-of-a-kind notion. It functions like a reminder to allow your client.
In all honesty, even in the event you’ve retained your guarantee and also provided worth it can be complicated to have people to rekindle. This really is lifetime for almost all people in real everyday life. I haven’t had children. Whatever rules you pick to for kid or the son, ensure that to publish them down! My kid, by way of example, loves soccer, plus it’s performed for a number of years, but there is not a time if he would obtain the following foot-ball or soccer boots that were new. You may gift a certificate to your best friend together with a talent you’ve acquired for him or her. At the event of income voucher, make sure that you have place the name of the appropriate personal.
1 wall within the firm has got the images of all employees who have worked over five years. Once you’ve got a membership foundation that is amazing and Help it become easy to devote your subscription application, concentrate on strengthening your loved ones to keep them from your app. Just considering the aim of the two of these systems, you understand what’s led to things.
Spend the test and see if your organization requires a subscription application. Maybe not each and just about every membership program has to be multi-level including those from the cases however they need to provide a distinctive set of advantages that aren’t readily available to customers that are routine. The disability savings strategy may be the idea at which the govt extends to a pension to you, it is the the first of its’ type in the universe that is entire. First things first, you want to pick a budget.
Regardless of whether you’ve just begun your company or are trying to improve the number of clientele, the ideas discussed from this article will aid you. The Sony Corporation is famed for the capability to generate and produce products that are advanced and new. Truly, businesses are based to assist organizations to keep a higher renewal rate up. I’ve understood lots of scam organizations in my private time, and these sort of companies answer forum accusations to alleviate buyer concerns as opposed to looking to eventually become on together with their own business, together with delivering valid explanations for individuals to question the business enterprise in the exact first location. Every firm may benefit and ought to establish some sort of membership advertisements. They’ll often look at yearsif that the deal will be right As your buyer was well prepared to purchase the phase. Offering an credit history card additionally makes it easier for the members to buy your products by giving installment payments.
Adhere to lots of principles in case you be requested to place this letter to help somebody demonstrate alongside side residency letter of recommendation. So dependent around the reason one ought to compose the letter. Should you will not compose a letter that might be an matter. A touch of suggestion should be one of the sections of correspondence. A character reference correspondence (also at times known as a correspondence of personal reference or personal suggestion ) is utilised to urge somebody to get a placement within a organization or for some capacity in an company. When a person you’re uneasy with asks one to compose a character reference letter or whether you can’t consider enough wonderful ideas to say about the individual, then it goes to become better in case it is likely to locate a way to flee from writing it. Stick to the 6 steps and you’re able to compose a personality reference correspondence free of moment!
Third, the individual must be prepared to place the hard time and effort to create an fantastic outcome. He also has to be prepared to set the effort and time into the correspondence. Maybe perhaps not from 5 or 10 years so comprise this day and the reading that the correspondence might need to be aware that this mention is now current.
Find strategies to emphasize in meeting their goals, the characteristics and credentials which will help the primary when looking to obtain a job to get a teacher. In addition, and most of all, today that is principals must function as the building’s tutorial leader. Larger school principals face stress to increase graduation rates and college admissions, also keep maintaining fantastic sports clubs and other extracurricular pursuits.
In the very first instance, the correspondence might possibly even be called a personalized reference letter. It’s much more advisable to seek out somebody who is perhaps not related to compose the letter. The large part of the minute, composing that minimal hazard is included by correspondence. So, to continue to continue to keep your correspondence credible, you should offer proof your view of the individual is legitimate. Regrettably it isn’t feasible to comprehend exactly if your given correspondence is going to be in receiving to a school, the gap or not. What’s more, an excellent correspondence will have important information regarding the applicant. Be certain to tailor to meet your requirements when you search for other sample individual letters of recommendation.
You will be astonished how people are hungry to get advice, whatever topic or niche you’re providing advice about, there’s always a person who wants your advice, or who would benefit from your experience. As stated by the experts’ suggestion, the advice plays a critical function within the work decision method. You have to get information. Thank goodness there is the web today where information is easy to discover! Be certain to verify that you’ve got the proper contact info all. It’s likely to utilize a sample reference page for helpful information.
Customers who rave on your merchandise or agency are all really powerful and ought to become included in most letter. For a excellent offer of business owners, even to choosing the very most effective ways of promoting and advertising their business in regards it could be difficult to comprehend what the techniques are. To take one example,, together with all the massive part of the traditional marketing techniques, it may be debatable for a business to monitor the development of their campaigns to learn what exact impact they had in growing inquiries or sales for your corporation. Inquire if the reason why is because it employed men and women who’ve bad lifestyles if your company might take a wellness program. Since you amuse organizations the better prospects will probably operate to get an understanding of what exactly is essential to you personally and things you need so you receive a return on the investment decision you’ve created on your pc.
Nearly all suggestion writers can adhere to the sort. For that reason expert CV authors are currently offering their own services that are professional. Letter-writing is actually a approach to get complete or closure unfinished enterprise. You’re called to do the complicated work of determining what type and present your skills and resume. Should is searching for a job, sample letters of advice may be. While it really is correct that sometimes after you get employed for a specific job, you might detect the work is different than the job description. Locating a excellent job is definitely an exceptionally hard undertaking.
Folks be expecting a personality certifying letter to secure a position in a specific company or, to get a pupil or admission in a college that is trustworthy. It’s possible that you spell out his personality as this will produce a personal touch within your own impression. In literature, when a character makes a statement which has an underlying meaning in contrast with all the sentence’s literal significance, the writer is supposed to possess used profiling. He needs to be witty and inconsistent sufficient to create humor. The characters that you used in creating a mockumentary, if interest the viewers in order that they see your movie with attention.
The paragraph to reveal also a petition and also your opinion to seem positive on the person. Composing it really isn’t as tough as it’s made out to become, however you’ll want to make sure that you do not go over board understanding the man or woman who you are advocating, however offer a fantastic personality evaluation. So say who you’re the duration of time you understand the individual, what kind of romantic connection you’re using with this particular each, how long you have invested together, etc.. In the paragraph set your own introduction and also the way just the average person is known by you and out of when. You are uncomfortable writing this recommendation, if you actually don’t believe you’re able to tell the man.
There are a great deal of explanations. Once you’re at a romantic partnership That you really don’t will need to stop obtaining friends. You may be capable of using a buddy for an benchmark for employment. Then that is certainly your choice now if you chosen to stay friends with this particular specific individual, but nevertheless, it wont be described as a very simple road to hoe in the event that you anticipate staying with your partner. These friends aren’t necessarily good to Ziggy and at times may gain from his kindness. Friends are an outlet for feelings there is a youngster experiencing trouble calling.
In case you might have any questions, don’t be afraid to get in touch with me. If you might have questions, please feel free to get in contact with me personally by either phone or emailaddress. Once in the dream of the youngster, you then are able to ask issues regarding their friend.
A character reference is a mention from a individual who that you comprehend , in place of an former employer. Periodically, personality references are additionally utilized by men and women if they worry their bosses are not going to write references that are optimistic. Furthermore, you may possibly be requested to publish a character testimonials one of your school application records or any subscription within a specialist team. It’s much better to receive.
In the event you were requested to write a reference letter rest assured that it’s a responsibility that ought to really be fulfilled in a suitable technique. Personality reference letters might be advantageous in obtaining. Whenever you’re requested to compose a character reference letter depends largely on the purpose of the letter.
The letter need not be from somebody who is’essential’ each se however it needs to be from some one who’s a character opinion that is fantastic and it has something constructive to express concerning the defendant. Some letters could be joined for the reference letters or pay letters. A character reference letter needs to be clear and most importantly, plausible. It needs to be prepared attentively. This really is but one among the most essential letters which you want when you are asking for a job, that loan, faculty entrance, etc.. Character reference letters are meant for supporting an individual’s facets, and are usually used by employment reasons. For this reason, you will then be in a posture to compose a ideal personality reference letter to get unique requirements.
If you are sending the letter to the first time, then subsequently a launch is going to be properly used to introduce the sender. Only speaking, the correspondence must contain length, details about who you are, what’s your connection with the individual and your understanding of the personality of the individual. A suggestion letter will be written in order to recommend a person where as, a reference correspondence is more on the subject of the factual information regarding the average person . It’s been seen that lots of women and men grow to be perplexed between an benchmark letter along with correspondence of advice, and also frequently look at them of the same. Private reference letters of recommendation are a mirror of your naturel and skills since you may notice.
This letter can be a superb case of the recommendation letter for a scenario when a reference letter must be composed by you for a person who is applying to get work. It is required to compose an persuasive and extremely wonderful hint to assist your own buddies, coworkers, deputies, and superiors. A specialist reference letter needs to be certainly created and precise. Then it’s possible to split the letter 3 parts, In the event you have got to write a letter with reference for this particular intention.
Focus only on a single idea a card so that you don’t get tempted to incorporate a whole lot of advice. The rest of the information has to be included in your marketing and marketing bits. Listed below are a few tips for start-ups who seek to obtain yourself a site. To understand that your individual consumer security office of your nation, you may go to consumer action internet site, from where you are ready to find the important points of the neighborhood consumer security office. In addition, you will should ship a quarterly newsletter. Besides the mentioned communications you’re also going to be sending out of your regular promotional postings and routine reminders of the benefits of conducting business along with you and your enterprise.
You need to modify the content according to this routines. The content of the letter should be well looked outside after which should be presented properly. Direct advertisements in place of advertising else like a method to push visitors into their site will be your next method that website developers use who’d want to market a mobile site.
The conventional could fluctuate with selections of instances. Perfect structure and layout are features in a report, as it contains the detailed data of any project. Then you are regarded as bloated if you should be mindful that the documents have been forged plus it’s really still true that you simply produce a bid to apply it. If you intentionally create writing or documents you will be posed as guilty plus it’s considered being a felony.
To give it a personal touch, make certain you write the letter in your words. Always make sure that the correspondence consists of your enterprise letter thoughts. In the event you have not been in an posture to produce that type of rapport and require the letter, do not stress. You can find two kinds of query letters.
Technology and also this web’s use has changed my organization is promoted. The exact very same thing is true for any industry also. The blood sport industry is very tricky for regulation enforcers and is closed to discontinue. Really, organizations are based to support distinctive businesses to keep a high renewal price . Proceed for a superior company providing website designing that is very good for small company, if you are inexperienced. Because your purchaser was ready to obtain the very first period, they’ll have the inclination take into account yearsif. Offering a credit score history card also makes it easier for the members by supplying payments to purchase your merchandise.
The function of the app is always to enable the boss to work out work to be done, as stated by the period of deliverables. The worth of proof throughout trial was upheld by conclusions. Among the other facet of the restart where most women and men come to be stuck will be the relevant skills. The point to do is to inform the man about the intention supporting the meeting and also the topics which are very likely to become covered. Whether an individual, by way of instance, hinting that you’re suffering from a sure disorder, you can offer records which encircle his allegation.
The very following thing you ought to own on your outline is exactly what you intend to promote. 4 webpages is thought to be the perfect length to start with, the list must perhaps not be too long. For those who are not sure about composing a proposal yourself, it is advised that you just simply search to find the services of an expert. The outline just gives the principles regarding the business model Even though a extensive business plan extends to you the specific particulars about the method by which the company is going to be run and the anticipated inflow of earnings. Take the evaluation and determine if your business would like a membership program. For example, a student submits a mission in time, also also contains some excess advice that she accumulated on the discipline. Teachers can be certain that pupils know the significance of behavior that is excellent, and due to this, instead of hammering it through regulations and rules act effectively.
At the event the address serves to present an individual guarantee that you simply refer to how the experience in his particular capacities of a individual is appropriate, to case he is invisibly above and you will have to bring private advice into this address. It ought to be heart felt and drafting it isn’t difficult as long as you add the essential and key pointers that you feel provides the character of stuff you need to convey . Generally, an award acceptance address needs to be given straight from the center. The speech utilized in CV or restart composing is ordinarily formal and it’s really a good idea to maintain it this fashion. | 2019-04-23T02:20:34Z | http://reflectionsonacreativescotland.com/16-list-motywacyjny-przedszkolanka/ |
In summer of 2017, Avant Assessment was approached by various district supervisors in Texas who wanted to use Avant’s standards-based language proficiency assessments to award credit-by-exam (CBE) in Texas. The Texas Essential Knowledge and Skills (TEKS) for Languages Other Than English (LOTEs) regulations established that starting in the 2017-2018 year and subsequent years, all districts in Texas offering foreign language classes would have to adhere to the guidelines established in Chapter 114 of the Texas Administrative Code.
Chapter 114 outlines the range of proficiency required of students in levels I – VII of foreign language courses, as well as exceptions that are made to the requirements depending on whether students have had prior formal education in the language and whether the language being assessed is a non-logographic language (i.e, Spanish, French, German, etc) or a logographic language (i.e, Mandarin Chinese, Russian, Hebrew, Japanese, etc). Students with prior formal instruction in the language they are testing in need only score 70% or above in order to be awarded credit for a certain level, whereas students with no prior education in the language must attain 80% or more in order to earn credit for a given level. For non-logographic languages, all four skills (Reading, Writing, Speaking, and Listening) are required to be at the same proficiency range for a given level, whereas the requirements for Reading and Writing are lower than for Speaking and Listening for logographic languages.
After several months of mathematical pondering, of very close readings of the TEKS documentation, as well as of many conversations with the district supervisors, Avant’s team of assessment experts developed the two official Avant matrices for TEKS for LOTEs in Texas; one for non-logographic languages and one for logographic languages. We call them the Avant – TEKS matrices. The version of the TEKS for LOTEs credit-by-exam matrices developed by Avant, as well as their accompanying software implementation in Excel that automatically calculates whether students have qualified for CBE credit or not, make it very easy for teachers, schools, and districts to use scores on Avant’s assessments to award CBE credit in Texas. Avant’s Excel implementation of our matrices will automatically display which TEKS CBE level(s) each student qualifies for given their STAMP or WorldSpeak scores across the four skills. Avant’s solution is fully aligned with the TEKS for LOTEs regulations and is in operational use across several districts in Texas.
To hear how Stephany Sipes (World Language Coordinator in PLANO ISD) has successfully used Avant’s STAMP 4S and WorldSpeak tests to recognize the language proficiency of hundreds of students in her district, click here. To see an example of our matrices for non-logographic and logographic languages, please see the documentation below or download it here.
If you are a district supervisor of LOTEs and would like to know more about how Avant’s credit-by-exam solution can benefit your own district in Texas, we look forward to hearing from you. If you would like to discuss how Avant’s assessments can be used for credit-by-exam purposes in states other than Texas, we will be glad to discuss this with you as well.
Has prior instruction in the language?
STAMP/WS level 4 = Intermediate-Low, STAMP/WS level 5 = Intermediate-Mid, STAMP/WS level 6 = Intermediate-High, STAMP/WS level 7 = Advanced-Low, STAMP/WS level 8 = Advanced-Mid, STAMP/WS level 9 = Advanced-High.
Interpretive Mode of Communication (Reading) Does not comprehend sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level I. Minimally comprehends sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level I. Adequately comprehends sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level I. Adequately comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II.
Interpretive Mode of Communication (Listening) Does not comprehend sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level I. Minimally comprehends sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level I. Adequately comprehends sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level I. Adequately comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II.
Presentational Mode of Communication (Speaking) Does not present information orally using a mixture of words and phrases and some simple sentences with appropriate and applicable grammar structures and processes at level I. Presents information orally using a minimal mixture of words and phrases and some simple sentences with minimally appropriate and minimally applicable grammar structures and processes at level I. Adequately presents information orally using a mixture of words and phrases and some simple sentences with appropriate and applicable grammar structures and processes at level I. Adequately presents information orally using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II.
Presentational Mode of Communication (Writing) Does not present information in writing using a mixture of words and phrases and some simple sentences with appropriate and applicable grammar structures and processes at level I. Presents information in writing using a minimal mixture of words and phrases and some simple sentences with minimally appropriate and minimally applicable grammar structures and processes at level I. Adequately presents information in writing using a mixture of words and phrases and some simple sentences with appropriate and applicable grammar structures and processes at level I. Adequately presents information in writing using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II.
*These include English, French, German, Italian, Spanish, Filipino, Portuguese, Polish, Somali Maay, Somali Maxaa, Vietnamese, Yup’ik, and others.
Interpretive Mode of Communication (Reading) Does not comprehend simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II. Minimally comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level II. Adequately comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II. Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III.
Interpretive Mode of Communication (Listening) Does not comprehend simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II. Minimally comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level II. Adequately comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II. Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III.
Presentational Mode of Communication (Speaking) Does not present information orally using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II. Presents information orally using a minimal mixture of phrases and sentences with minimally appropriate and minimally applicable grammar structures and processes at level II. Adequately presents information orally using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II. Adequately presents information orally using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III.
Presentational Mode of Communication (Writing) Does not present information in writing using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II. Presents information in writing using a minimal mixture of phrases and sentences with minimally appropriate and minimally applicable grammar structures and processes at level II. Adequately presents information in writing using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II. Adequately presents information in writing using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III.
Interpretive Mode of Communication (Reading) Does not comprehend connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III. Minimally comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level III. Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III. Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV.
Interpretive Mode of Communication (Listening) Does not comprehend connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III. Minimally comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level III. Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III. Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV.
Presentational Mode of Communication (Speaking) Does not present information orally using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III. Presents information orally using a minimal mixture of phrases, sentences, and strings of sentences with minimally appropriate and applicable grammar structures and processes at level III. Adequately presents information orally using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III. Adequately presents information orally using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV.
Presentational Mode of Communication (Writing) Does not present information in writing using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III. Presents information in writing using a minimal mixture of phrases, sentences, and strings of sentences with minimally appropriate and applicable grammar structures and processes at level III. Adequately presents information in writing using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III. Adequately presents information in writing using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV.
Interpretive Mode of Communication (Reading) Does not comprehend connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV. Minimally comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level IV. Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV. Adequately uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes in the target language at level V.
Interpretive Mode of Communication (Listening) Does not comprehend connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV. Minimally comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level IV. Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV. Adequately uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes in the target language at level V.
Presentational Mode of Communication (Speaking) Does not present information orally using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV. Presents information orally using a minimal mixture of sentences and connected discourse with minimally appropriate and applicable grammar structures and processes at level IV. Adequately presents information orally using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV. Adequately communicates orally using appropriate and applicable grammatical structures and processes in the target language at level V.
Presentational Mode of Communication (Writing) Does not present information in writing using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV. Presents information in writing using a minimal mixture of sentences and connected discourse with minimally appropriate and applicable grammar structures and processes at level IV. Adequately presents information in writing using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV. Adequately communicates in writing using appropriate and applicable grammatical structures and processes in the target language at level V.
Has prior instruction in the langauge?
Interpretive Mode of Communication (Reading) Does not comprehend sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level I.
- 5 points Minimally comprehends sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level I.
20.5 points Adequately comprehends sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level I.
24.5 points Adequately comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II.
Interpretive Mode of Communication (Listening) Does not comprehend sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level I.
19 points Adequately comprehends sentence-length information from culturally authentic print, digital, audio, and audiovisual materials as appropriate within highly contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level I.
Presentational Mode of Communication (Speaking) Does not present information orally using a mixture of words and phrases and some simple sentences with appropriate and applicable grammar structures and processes at level I.
- 5 points Presents information orally using a minimal mixture of words and phrases and some simple sentences with minimally appropriate and minimally applicable grammar structures and processes at level I.
19 points Adequately presents information orally using a mixture of words and phrases and some simple sentences with appropriate and applicable grammar structures and processes at level I.
24.5 points Adequately presents information orally using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II.
Presentational Mode of Communication (Writing) Does not present information in writing using a mixture of words and phrases and some simple sentences with appropriate and applicable grammar structures and processes at level I.
- 5 points Presents information in writing using a minimal mixture of words and phrases and some simple sentences with minimally appropriate and minimally applicable grammar structures and processes at level I.
20.5 points Adequately presents information in writing using a mixture of words and phrases and some simple sentences with appropriate and applicable grammar structures and processes at level I.
24.5 points Adequately presents information in writing using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II.
*These include Arabic, Hebrew, Hindi, Japanese, Russian, Chinese, and others. For these languages, a proficiency level in the lower level of the range noted above is sufficient to meet the requirements in Reading and Writing for this level.
- 5 points Does not comprehend simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II.
16 points Minimally comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level II.
21 points Adequately comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II.
24.5 points Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III.
- 6 points Does not comprehend simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources.Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II.
- 5 points Minimally comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level II.
18.5 points Adequately comprehends simple connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level II.
-6 points Does not present information orally using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II.
- 5 points Presents information orally using a minimal mixture of phrases and sentences with minimally appropriate and minimally applicable grammar structures and processes at level II.
18.5 points Adequately presents information orally using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II.
24.5 points Adequately presents information orally using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III.
- 5 points Does not present information in writing using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II.
16 points Presents information in writing using a minimal mixture of phrases and sentences with minimally appropriate and minimally applicable grammar structures and processes at level II.
21 points Adequately presents information in writing using a mixture of phrases and sentences with appropriate and applicable grammar structures and processes at level II.
24.5 points Adequately presents information in writing using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III.
- 5 points Does not comprehend connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III.
16 points Minimally comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level III.
21 points Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III.
24.5 points Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV.
- 6 points Does not comprehend connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III.
- 5 points Minimally comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level III.
18.5 points Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level III.
-6 points Does not present information orally using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III.
- 5 points Presents information orally using a minimal mixture of phrases, sentences, and strings of sentences with minimally appropriate and applicable grammar structures and processes at level III.
18.5 points Adequately presents information orally using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III.
24.5 points Adequately presents information orally using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV.
- 5 points Does not present information in writing using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III.
16 points Presents information in writing using a minimal mixture of phrases, sentences, and strings of sentences with minimally appropriate and applicable grammar structures and processes at level III.
21 points Adequately presents information in writing using a mixture of phrases, sentences, and strings of sentences with appropriate and applicable grammar structures and processes at level III.
24.5 points Adequately presents information in writing using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV.
- 5 points Does not comprehend connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV.
16 points Minimally comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level IV.
21 points Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV.
24.5 points Adequately uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes in the target language at level V.
- 6 points Does not comprehend connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Does not use the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV.
- 5 points Minimally comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with minimally appropriate and applicable grammatical structures and processes at level IV.
18.5 points Adequately comprehends connected statements from culturally authentic print, digital, audio, and audiovisual materials as appropriate within contextualized situations and sources. Uses the interpretive mode in communication with appropriate and applicable grammatical structures and processes at level IV.
-6 points Does not present information orally using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV.
- 5 points Presents information orally using a minimal mixture of sentences and connected discourse with minimally appropriate and applicable grammar structures and processes at level IV.
18.5 points Adequately presents information orally using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV.
24.5 points Adequately communicates orally using appropriate and applicable grammatical structures and processes in the target language at level V.
- 5 points Does not present information in writing using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV.
16 points Presents information in writing using a minimal mixture of sentences and connected discourse with minimally appropriate and applicable grammar structures and processes at level IV.
21 points Adequately presents information in writing using a mixture of sentences and connected discourse with appropriate and applicable grammar structures and processes at level IV.
24.5 points Adequately communicates in writing using appropriate and applicable grammatical structures and processes in the target language at level V. | 2019-04-26T16:25:29Z | https://avantassessment.com/texas-cbe-documents |
Life is too short to wash dishes by hand, why not use the time for something productive and let the best dishwashers clean all the dishes for you.
If you are looking for a new dishwasher in the market, the process can be an intimidating one; especially if you are buying one for the first time.
The moment you step into a store or browse for them on the internet, you will be given so many options to choose from that will be different, and at the same time, they will have similarities.
With that said, if you are the first timer, then you are certainly going to have a hard time finding the best possible dishwasher for you, then this buying guide is going to help you pick the best viable option.
We have already reviewed the best dishwashers in this article, and this buying guide is just there to help make things easier.
Below, you will find some of the best dishwashers of 2019 that we have rounded up and reviewed for you. In addition to that, if you think you might have some issues buying the best possible dishwasher for you, we have a very handy buyer’s guide for you.
Does not need any tools.
Dishes come out without any streaks.
The dishwasher of the future. Economic, environmentally concious, and beautiful.
hOmeLabs is another company famous for their kitchen expertise and have been for a long time now. Since we were reviewing the best dishwashers; we thought we should look at what hOmeLabs has to offer.
We are reviewing the hOmeLabs Compact Countertop Dishwasher; it is a portable, mini dishwasher that is small enough to comfortably sit on the countertop without any issues whatsoever.
Additionally, it is pretty cohesive in design as well, so it will not make your kitchen look odd or anything even remotely close to that.
As far as the features are concerned, all the dishwashers that we are reviewing are pretty good with features.
User-Friendly: Over time, I have heard a lot of people talk to me about how dishwashers are becoming more and more difficult to use. However, the good news about the hOmeLabs Compact Countertop Dishwasher is that it is user-friendly.
Tool-Less Design: Another great thing about this particular dishwasher is its tool-less Everything is based on quick assembly, and disassembly, making the whole experience great.
Small Form Factor: Small kitchens are still a thing, and if your kitchen is on the smaller side, this dishwasher will fit perfectly fine in your kitchen.
What makes hOmeLabs the # 1 best seller in Countertop Dishwashers ?
I have reviewed many dishwashers, and I can tell you when a dishwasher is good and when it is not.
Using the hOmeLabs Compact Countertop Dishwasher has been a treat, it is user-friendly, super convenient for quick cleaning, and it comes with a plethora of accessories of its own.
The dishwasher is lightweight and easy to move, has a nice sturdy nylon rack and most importantly it’s incredibly quiet.
The digital display offers different cycles for running your dishes and they all work wonderfully.
Additionally, if you are worried about streaks on your dishes, then the good news is that the hOmeLabs Compact Countertop Dishwasher offers streak-free cleaning, which is great because a lot of people have shown concerns over this issue beforehand.
With that out of the way, there are no glaring issues with the hOmeLabs Compact Countertop Dishwasher.
It is a pretty complete dishwasher, but it lacks in one area, dishes do not come out dry.
But it’s not a big deal at all, to counter this issue you can simply open the door, and the dishes dry very quickly.
It fits a decent amount of dishes, great for one or two people to use. Definitely not for larger families.
Why are you still reading? Buy the thing!
Easy to set-up, fits in small space.
Dishes do not come out dry.
Users can choose from six place settings.
You can choose from six different wash cycles.
Comes with a durable exterior and interior construction.
Has a separate basket for silverware, and a dedicated dish rack.
The dishwasher we are going to review comes from a company called SPT. Despite having a generic, confusion name.
The good news is that the company has been around for a long time, and have been providing some great lifestyle products to their users.
With that said, the model we are reviewing is the famous SPT SD-2201W Countertop Dishwasher. I love the countertop dishwashers because they can easily fit on most counters, and additionally, they are compact as well, and still manage to deliver a lot of power.
The SPT SD-2201W that we have comes in white color and looks great with almost every interior. However, if you do want a different color option, the company does sell a silver color as well that should be more than enough for you.
Size: The good news about the SPT SD-2201W is that it is a full sized dishwasher, meaning that you will not run into any issues as far as the size is concerned. A lot of people have voiced this before, but I can assure you that you will not run into any issues with the size.
High Water Temperature: Another great thing about the SPT SD-2201W is that it reaches a maximum water temperature of 148 degrees Fahrenheit, which is pretty great for cleaning dishes with a lot of oily residue on them.
Can Connect to Aerator Openings: The dishwasher does come with an adapter that allows you to connect it to the aerator openings.
Easy to Use: The great thing about the SPT SD-2201W is that it happens to be one of the easiest to control.
Those are some of the highlights of the SPT SD-2201W dishwasher; additionally, the great thing is that it comes with a stainless steel interior which is great because you will not have to worry about rust or any corrosion.
You also get multiple wash cycles; a feature that is great when you thoroughly want to clean the dishes and does not create any issues whatsoever either.
Lastly, one of my favorite things about the SPT SD-2201W is the fact that it can raise the water temperature to 148 degrees Fahrenheit. This temperature is best in situations when there is too much grease on the plates.
The only two gripes I have with the dishwasher is the fact that it is a bit louder, and additionally, the dry cycle is on the weaker side.
It’s perfect for apartments, office kitchens or any small-sized kitchens; offers full-size power in a compact design. With a height of only 17.24-inch, this dishwasher will fit between most countertop and cabinetry.
In short, this is a beautiful countertop dishwasher, the value/functionality for the price, and the size and I would say it’s worth every penny!
Perfect for two person households.
Does not require fancy/new plumbing.
Not the best choice for more than two people, if you only want to run it once a day (or less).
Six place setting in a small package.
Quiet operations at just 52 decibels.
Compact enough to fit under a cabinet.
Digital controls with dedicated LED display.
Six wash cycles for granular cleaning controls.
Next up, we are going to take a look at another excellent countertop dishwasher by the name Danby DDW621WDB.
I know these dishwashers have odd names, but that is how things work with these companies. Is the Danby DDW621WDB a worthy dishwasher to be on the list? Let’s find out.
The thing with most dishwashers in the market is that they are so similar to each other, it becomes a chore to distinguish them from one or the other.
As far as the Danby DDW621WDB, it does come with some features that make it stand apart, but aside from that, almost all of it is mostly the same.
Electronic Controls: While most of the dishwashers in the market are still using analog controls, the Danby DDW621WDB comes with electronic controls coupled with an LED screen for easier access.
Reduced Water Consumption: If you are worried dishwasher consuming too much water, then the good news is that the Danby DDW621WDB comes with reduced water consumption.
Stainless Steel Interior: I know it might be surprising to some of you as to how something like this can be a feature, but if you have used a steel interior before, you know that rust can be a huge issue.
Detergent Support: If you want to ensure that your dishes are clean properly, then the good thing is that this dishwasher also supports detergent for maximum cleaning potential.
Although you do get a lot of other features as well, the main highlights have been listed above. Additionally, I have to say that my time with the Danby DDW621WDB was an absolute treat.
I mean, I have used dishwashers that had some major flaws, and comparatively, the Danby DDW621W is much better.
However, that is not to say that there are no issues at all. During my use, I realized that there is no wash timer available on this dishwasher and this is odd considering how the dishwasher is packed with features.
Additionally, another thing that I would like to address here is that you might need to rinse the dishes just a little bit before putting them into the dishwasher, this can be an inconvenience for a lot of people.
What sets this model apart from other high range dishwashers?
If you are looking for a quality dishwasher for an inexpensive price, look no further. The inside is stainless steel with plastic coated metal wire trays that seem very high quality.
Cleaning quality is on par with $4-500 price range standard dishwashers.
The water consumption is on the lower side.
This is the only model with a heater built in.
You can use all the detergents without any issue.
The electronic controls and LED display are a blessing.
You might have to rinse some dishes.
Comes with a time delay feature.
Solid interior made out of stainless steel.
Connect it with ease using the included faucet adapter.
You can adjust the upper rack to put larger plates or pots.
Has six different washing programs for proper control over cleaning.
SPT is back with another fantastic dishwasher offering that is going to be the grace of our list. SPT as a brand has been pretty consistent, and I love that about them.
With that said, the SPT SD-9241SS is a great dishwasher, mainly because it is the smallest that I have reviewed so far.
Do not let the size fool you though; it still comes with a great capacity that should make it fit for any small household.
This dishwasher also happens to be one of the less boring options available in the market, thanks to the black and silver color.
Not to forget, this dishwasher comes with small wheels on the bottom that will allow you to move it around.
Time Delay: For a lot of people, this feature is an absolute treat because they do not have to worry about selecting a time.
Multiple Washing Programs: If you are worried that you might not get the ideal results because of heavier dishes, don’t worry as the multiple washing programs should be enough.
Stainless Steel Interior: SPT did not cut any corners, and included a great stainless steel interior to avoid any damage.
Extremely Portable: Probably the biggest selling points of this dishwasher is the fact that it is incredibly portable, and can easily be moved around thanks to the wheels attached below.
As far as the downsides are concerned, I did not find any major or minor flaws. However, I must tell you that the dishwasher does not dry dishes.
Now it would have been an issue for a larger dishwasher, but considering the size of the SD-9241SS, it is more than understandable.
You need to dry the dishes afterward, which I believe is perfectly fine if you have some time.
Why SPT SD-9241SS is the best and portable dishwasher?
I have used some great SPT SD-9241SS dishwashers, but I have to tell you that as far as the portability is concerned, it is hard to beat the SD-9241SS.
In conclusion, I love the SPT SD-9241SS simply because it is so small, and not just that, it does come with a list of features that people usually look for in a dishwasher.
Small and portable, with wheels at the bottom.
Can use detergents without any issue whatsoever.
Due to a small size, the dishwasher does not dry dishes.
Can hold larger plates with ease.
Low noise level of just 52.3 decibels.
Comes with stainless steel construction.
Offers 7 wash cycles with 6 place setting.
Has separate compartments for dishes, cusk, as well as cutlery.
EdgeStar is a company that has been around for some time. They are known for producing some great appliances that people have been using for some time, and the best part is that they are packed with just the right amount of features to have people stick around.
Today, we look at the EdgeStar DWP62SV 6; their countertop dishwasher that is small, easy to use, and most importantly, very efficient.
Usually, when people are buying a good dishwasher, they do look for features as you would see in our buying guide at the end of the article.
Built-in Water Heater: One of the best features of this dishwasher is the built-in water heater. Great for cleaning dishes with oily residue, harder to remove stains.
Child Lock: If you are worried that children might tinker with the dishwasher, then there is a child lock that you can use to prevent that from happening.
Digital Controls: You get granular digital controls with an LED display that is easy to read.
Dish Dryer: The EdgeStar DWP62SV 6 comes with internal dish drying capabilities that ease up the job by a greater degree.
Compact: Another great thing about the EdgeStar DWP62SV 6 is that it is one of the most compact dishwashers available. Very easy to carry around as well.
Honestly, there are so many likable factors about the EdgeStar DWP62SV 6 that you would almost overlook the flaws if any.
The 5-foot long hose, the LED display, along with the water heater, and not to mention, a good design are just some of the great things about this dishwasher.
Not to mention, for those with kids who like to tinker with everything, there is a child lock available on the dishwasher that will prevent that from happening.
Holds a decent amount for the size.
The internal water heater is great.
Digital controls and an easy to read LED display.
Take up a lot of counter space .
The interior is stainless steel.
Digital controls, with a display.
Comes with a delay start feature.
Has a handy dispenser for detergent and rinse aid.
You can remove the filters and clean them with ease.
Comes with all the indicators for proper understanding.
Magic Chef is a company who has been serving loyal customers for some time now. The good thing about them is that they are constantly trying to improve on what they are offering, and not just that, they are bringing some significant improvements.
Today, we look at the Magic Chef MCSCD6W5 6. A 6 place setting countertop dishwasher that has been making some waves in the home appliance market.
Now the good thing about this dishwasher is that it is incredibly easy to use with no complexities.
With that out of the way, there are enough features to keep everyone occupied, and provide a great user experience as well.
Easy to Maintain: The good thing about Magic Chef MCSCD6W5 6 is that it is easy to clean; the filters can easily be removed.
6 Place Settings: Just like any standard, high-end dishwasher, this one comes with a standard six place setting that should be more than enough for day to day use.
Drying System: I believe that a dishwasher with a drying system is the one that I would consider complete. Thankfully, the Magic Chef MCSCD6W5 6 does come with one.
Digital Controls and a Display: Most older dishwashers do not come with this feature, but the Magic Chef MCSCD6W5 6 has digital controls coupled with a good Led display that is clear to read.
Above are some of the features about the Magic Chef MCSCD6W5 6 that I love. Additionally, you should know that the dishwasher is extremely compact and portable.
During my testing, I also revealed that this is perhaps one of the most potent dishwashers available in the market.
If you are worried that it might be a bit difficult to use, do not worry as the Magic Chef MCSCD6W5 6 comes with a comprehensive, yet easy to understand manual that should be enough to get the job done.
There is one minor inconvenience that might bug some people; during my usage, I found out that the tub itself is not big enough for holding pans and pots. This might not be that big of an issue for some, but still, an important thing to point out.
The Magic Chef MCSCD6W5 6 is a pretty fantastic dishwasher that should get the job done for most of the people looking for a good experience.
Comes with five wash cycles.
Modern design that looks great.
Much larger on the inside than you would expect.
Great performance regardless of the utensil types.
The tub is not big enough for pots and pans.
Comes with six different wash options.
Has an automatic detergent and rinse aid dispenser.
The upper basket can be adjusted to put larger dishes.
You can install it quickly and easily with faucet dispenser.
If you are wondering why SPT is such a famous company, there are all the right reasons behind that. For starters, they have a great range of dishwashers, and while people do think that most dishwashers are mostly the same, that is not entirely the case, and you can see that with SPT SD-9241W.
The SPT SD-9241W is an 18-inch dishwasher, which means that it is on the smaller side as compared to some of the counterparts. This is not a bad thing at all, as I have reviewed some of the best dishwashers that have been on the smaller side.
Time Delay: This is perhaps a standard for the majority of dishwashers available in the market. The SPT SD-9241W uses a time delay feature that will allow you to adjust the time on your dishwasher.
Adjustable Racks: Have larger than usual dishes that need more space? Do not worry as this dishwasher comes with adjustable racks that are there to help you put larger pans and pots into the dishwasher.
Quick and Simple Installation: If you are worried that you might spend a lot of time installing the dishwasher, do not be, as it comes with adapters that are quick, simple, and easy to attach without much hassle.
For starters, the connection that leads from drain to the faucet is on the smaller side, meaning that you will have to put the dishwasher closer.
The SPT SD-9241W is excellent when it comes to installing as it is small and lightweight. You get six wash cycles that has become a standard for great dishwashers.
One thing that I love about this dishwasher is the fact that it is very quiet when it comes to operating. It’s pretty fast when it comes to cleaning, providing you clean utensils in no time.
In conclusion, the SPT SD-9241W is a great, compact dishwasher that gets the job done for the majority of users.
Can easily fit in tight spaces.
Easy to move around without any issues.
The faucet to drain connection is on the smaller side.
The space on the lower rack is on the smaller side.
Has a 4 level washing mechanism.
Quiet operations at just 59 decibels.
The interior is made out of high-quality stainless steel.
Although we are closing into the last of the list, we still have some impressive products to look at. Just take a look at a company that is named Frigidaire; this is one of the best companies when it comes to home appliances and reviewing their dishwasher should be a treat.
The model we are looking at right now is Frigidaire FFBD1821MS; a small and compact, 18-inch model that is built for people who want to move the dishwasher from one place to another easily. Additionally, the Frigidaire FFBD1821MS is a lot easier to use.
Different Cleaning Methods: Whether you are washing utensils that need extra cleaning, or the ones that need light amount of cleaning; the Frigidaire FFBD1821MS comes with different cleaning methods.
Removable Filter: Another redeeming feature of the Frigidaire FFBD1821MS is that it comes with a removable filter that you can quickly clean and without any issue.
Portable: Thanks to its small size, the great thing about Frigidaire FFBD1821MS is that it is extremely easy to carry. So much so that you can easily place it anywhere, you want without any issues.
There are some issues though; due to the small size of the dishwasher, if you have a larger family, or you use more utensils than usual, you might need a bigger option.
Additionally, despite being relatively small, it is on the heavier side because of the interior and exterior being made out of stainless steel and not just plastic.
Testing the Frigidaire FFBD1821MS has been an absolute joy, for starters, it fits without any issue in smaller kitchens.
The interior and exterior of the dishwasher are made out of high-quality material, ensuring that there is no corrosion or rusting.
I also noticed that the Frigidaire FFBD1821MS is very quiet, and only lets out a beep once the cleaning is done.
Speaking of cleaning, it is fast and efficient and does leave any dirty spots on the utensils. You also have a feature that delays the start, something that is becoming more and more important.
May be pricey for some users.
Compact dishwasher for tight spaces.
Comes with eight placement settings.
Has a full set of controls for easier access.
Six wash cycles allow you to wash the dishes with ease.
We are gradually moving towards the end of the list, and there are still some fantastic dishwashers left to review. This is great because this way, we can give the readers more option to check out.
As for right now, the EdgeStar is making a return with the EdgeStar BIDW1801SS. Now for those who do not know, the previous EdgeStar dishwasher that I reviewed was a full size.
Large Capacity: Do not let the small size fool you as the EdgeStar BIDW1801SS comes with eight place setting as compared to the six place setting that is more common.
Number of Wash Cycles: You also get a total of 6 wash cycles based on what type of utensils you are trying to wash.
Enough Place: The dishwasher comes with two pull out racks for dishes, a basket for silverware, as well as a tray for cups.
Aside from the view features that we have listed above, there are a lot of good things about the EdgeStar BIDW1801SS.
For starters, the lightweight of the dishwasher makes it easy to carry around and store in whatever place you want.
Additionally, it is cost effective thanks to premium construction and quality materials. You will not need to replace the machine in the future. It is also really easy to use for those wondering.
There is no denying that this machine is an absolute champion when it comes to great performance, and more importantly, it offers a great price to performance ratio.
There are some things about this dishwasher that are not good. For starters, despite the small size, the machine is not movable at all. Which means that once you do install it, there is no way to easily move it around without disconnecting it.
Additionally, users who are looking to buy this machine will have to buy the dishwasher’s connection kit separately. This is a major let down considering how you are paying a good price for the machine, so you would expect it to have the best possible features, but it is sadly a letdown.
All in all, the EdgeStar BIDW1801SS is a great dishwasher that is marred by some minor inconvenience that can be a problem for most of the buyers.
However, let’s not forget that it Is still a very capable dishwasher that is well worth your money.
You will have to buy the dishwasher’s connection kit separately.
It is great for smaller kitchens.
The dishwasher is easy to install.
The controls are easy to understand.
You can use it without having much knowledge.
Solid build quality with a great interior made out of solid stainless steel.
We are about done with the list, with the last dishwasher being from a company called DELLA. Now I know that it might sound strange to some, but the company has been producing some great products for the customers, and so far, has not disappointed anyone.
Today, we look at the DELLA 032-DW-909WT. I know the name is long and possibly a challenge to remember, but we do have links for all the products we are reviewing. This makes things easier for people to just shop through this round up.
Available in Three Colours: I know this is not a feature per say, but so many people have complained about how dishwashers are usually limited in colours. The DELLA 032-DW-909WT comes in white, silver, and black for the best possible choosing experience.
Great for Small Kitchens: Thanks to its compact design, you can easily place it in a smaller kitchen and forget about space issues.
User Friendly Controls: Although the controls are still analogue, the good thing about the DELLA 032-DW-909WT is that the controls are user friendly, and easily identifiable.
To be honest, from the face alone, the DELLA 032-DW-909WT looks like a very simple dishwasher, and the one that does not have a lot of standout features.
That might be true as well, especially when you consider the fact that dishwashers are slowly modernizing.
But if one thing is for sure, then it is the fact that when it comes to sheer performance, the DELLA 032-DW-909WT is not easy to beat.
As a matter of fact, it contains every single feature that people normally look for in a reliable dishwasher.
In conclusion, the DELLA 032-DW-909WT is a great option for those who are looking for an extremely practical dishwasher, but don’t mind a few setbacks.
Cleans dishes without any issue.
One of the biggest factors that you should be considering is the cleaning power of a dishwasher. Now the main thing that you need to know here is that the cleaning power of a dishwasher does not exponentially grow with the price of the dishwasher.
You can see it clearly in our reviews that there are cheaper dishwashers that scored better in terms of cleaning as compared to some of the higher end ones.
Therefore, yes, as far as the cleaning power is concerned, the best way to determine is by going through our reviews rather than telling yourself that if you spend more money, the dishwasher you are going to buy will be more powerful.
Since the cleaning power is not price dependent, it also serves as good news, and it simply means that you will not have to spend a lot of money finding a dishwasher that has the best cleaning power.
While the cleaning power of a dishwasher never directly correlates with the price; the noise level does. For anyone who is looking for a whisper quiet dishwasher, be prepared to spend more than you would on a cheaper dishwasher.
However, there is a silver lining here, which means that the newer, entry level dishwashers are often quieter as compared to the ones that we have been used to.
PRO TIP: The quietest dishwasher in our list is Magic Chef MCSCD6W5 as it operates quietly at 52 decibels to avoid disrupting other areas.
To make things easier, we have made sure to mention the sound level of all the dishwashers we have reviewed, this will help you make the best possible purchase.
In addition to that, you can also hit up the manufacturer’s website for the specific model, and check out the noise level of the specific dishwasher you are thinking of buying. The process is that easy.
The lower end models that are available in the market have a sound rating in the 50-decibel range. These models cost between $400 to $500. Now the thing is that 50-decibel is not loud, to begin with, you can easily have a conversation in the room even when the dishwasher is on, and if you happen to have a sleeping baby nearby, we can assure you that there will not be any sleep disturbance.
If you, your family, and friends have a habit of talking in the kitchen while doing the chores, then investing in a mid-range model would make more sense because, with this range, you will not have to worry about a lot of noise.
The mid-range models run for around $600 and go all the way to $900, and as far as the sound rating is concerned, you get the 40-decibel sound range that you need to keep in mind.
If you want an even better experience with the dishwasher, and you are looking for something that does not make a lot of noise, then the higher end options are even better. Sure, these cost you around $800 to $900 for the models that have a sound rating in their lower 40s, and if you cross into the 4-digit price range, then you can find models that have a sound rating in the high 30s.
Indeed impressive, but they do come with a price tag.
The cycles and speed is another important factor that needs to be put into consideration whenever you are buying a dishwasher.
Regular/Standard: This type of cycle is perhaps the most common one when it comes to dishwashers; it is used for a full load of dishes that are moderately dirty. For our reviews, we used this cycle to determine the power, as well as the sound rating of the dishwashers.
Express: This is most commonly used in situations where you do not have a lot of dishes that require cleaning, or when the dishes are not as dirty.
Auto: This is the best if you want to let the dishwasher do the work by using the sensors and determining the load of the dishes as well as just how dirty they are.
Heavy: This cycle is best for dishes like pots as well as pans, but the good thing is that you can even use the ordinary dishes; especially the ones that are dirtier than your usual dishes.
China: As the name suggests, this cycle uses water at a lesser pressure, and is best used for dishes that are fragile. Say fine china or wine glasses.
Rinse Only: This is best if you have just taken the dishes out of the cupboard, and want to ensure that all the dust is rinsed off.
Efficient: If you are worried about using a lot of water and energy, then you can opt for this mode. Sure, the dishwasher will take longer to clean as compared to the standard mode, but at least you will be saving both water and energy.
The next thing that I would suggest you consider is the type of dishwasher; now when it comes to this; you have two options to go for.
The standard size of the dishwasher is 24-inches wide, and this type of dishwasher is fixed in one place, and that is generally under the kitchen counter.
This is the most standard type of dishwasher, and one of the main reasons why all the dishwashers look the same.
However, if you are low on space, but you still want to invest in a dishwasher, then the good news is that you can go for a more compact option that is 18-inches wide.
In addition to that, you can even find portable dishwashers that are with wheels and can move around, but they might cost you a bit more money as compared to the standard options that you have available in the market.
I would suggest you to go for compact or portable dishwashers only if you are on limited space or looking for something different and unique. Otherwise, you should always opt for the bigger sizes.
Another essential thing that I would suggest you to consider is the looks and finish of the dishwasher.
Usually, you are going to find it in black, white, or the usual stainless steel. However, if you are tired of these finishes, then you can opt for something a bit more premium, however, expect to pay a bit higher for specialized finishes.
As far as the style is concerned; you can opt for either the one with physical buttons or the more advanced models will have digital controls.
Again, this is something that varies from model to model, and the price can be a determinant in both the style, as well as the finish. So, something that you must keep in mind.
There is no denying that capacity of a dishwasher is one of the most critical factors that you have to consider when it comes to a dishwasher.
Simply because if you end up buying a smaller capacity of the dishwasher, your whole experience might end up becoming more tedious.
With that in mind, the critical thing that you need to know here is that even the standard 24-inch wide dishwasher will have a different capacity based on the model.
The good news is that most of the websites have these listed so you will have no issues with that. In addition to that, every model that we have reviewed will have the capacity listed for your convenience.
You use up to 27 gallons of water per load by hand versus as little as 3 gallons with an ENERGY STAR-rated dishwasher.
I will be honest; testing the dishwashers to see which one is better than the other one is not an easy task.
Considering how most of the dishwashers you look at are largely the same when it comes to functionality.
However, the dishwashers working largely the same is not a bad thing at all. As they are still performing largely the same.
This makes the whole process of testing the dishwashers all the more difficult. The good thing is that this roundup is exactly for that.
With that out of the way, the purpose of this roundup was to ensure that whatever dishwasher you decide to go with does not create any troubles for you.
That is the reason why we picked the best available in the market.
Done with the dishwashers? Now, you can also use some good pressure washer to remove some dirt, grime quickly, and even paint that is chipping away. | 2019-04-24T00:43:19Z | https://stellar10.com/dishwashers/ |
Press and News Articles | MCM Consulting Group, Inc.
Officials in Luzerne County, Pa., are trying to put hard figures to a migration away from an outdated emergency communication system — support for existing transmitters and receivers will end in late 2020.
(TNS) — Luzerne County, Pa., has invited vendors to submit proposals for its 911 emergency radio upgrade, which will finally put a firm price on a project that had been estimated at around $20 million.
“Now it’s time to give council and the county manager real numbers to work with so we can figure out what we’re able to afford,” said county 911 Executive Director Fred Rosencrans.
Luzerne County has invited vendors to submit proposals for its 911 emergency radio upgrade, which will finally put a firm price on a project that had been estimated at around $20 million.
County officials want to switch from a 20-year-old analog system to a digital one because equipment support for the radio transmitters and receivers that allow emergency responders to exchange messages will end Dec. 31, 2020. The system won’t automatically shut down on that date, but replacement parts have become increasingly difficult to find because they are no longer manufactured.
John Grappy, left, director of Erie County Public Safety, and Erie County Executive Kathy Dahlkemper in October 2017 show off some of the portable radio units that will be used as part of the county’s Next Generation Public Safety Radio Project.
What you need to know about the $26.4 million program that’s about to go into effect.
Julie Jameson is a post graduate intern at MCM Consulting, working primarily with the director of client outreach, Mike Rearick. She will be assisting with outreach efforts for conferences and events as well as working on website content and photography.
She is a graduate of Duquesne University with a Bachelor’s Degree in Corporate Communication. She graduated in December of 2018 with her bachelor’s degree, a certificate in business management, and a minor in philosophy. Throughout her studies she focused on marketing, public relations, strategic writing, and rhetoric.
Julie interned with MCM Consulting Group, Inc, from May through August 2018, working on the Pennsylvania Association of Hazardous Materials Technicians conference, NENA conference, web design and other company projects.
Council recently voted to hire Pennsylvania-based MCM Consulting Group for $380,357 to handle the first stage of the proposed $20 million 911 radio project. The company will help determine the county’s equipment needs, prepare a comprehensive bid seeking interested vendors and identify grants and other possible outside funding.
The switch from a 20-year-old analog system to a digital one is warranted because equipment support for the radio transmitters and receivers that allow emergency responders to exchange messages will end Dec. 31, 2020, officials have said.
"Expanding to a regional solution for Law Enforcement Records Management Services (LERMS) was a logical next step for the Northern Tier consortium," said Terri Nelson, PMP, project supervisor for the MCM Consulting Group, Inc .
"Integrating the records management system with New World CAD will greatly enhance data sharing across the 10-county region and will enable agencies across the area to create efficient workflows for improved effectiveness."
WILKES-BARRE - A $20 million project to upgrade the Luzerne County 911 communication system from analog to digital has a project manager, following a unanimous county council vote Tuesday night.
Council approved a $380,357 contract with MCM Consulting Group to manage the upgrade project. County officials say it needs to be completed by 2020, when the manufacturer will stop providing support for the analog system currently used by 911 dispatchers and emergency responders throughout the county.
UNION CITY — Erie County Executive Kathy Dahlkemper marched through the mud as she approached the base of what will be a 263-foot-tall communications tower. She looked up to the three workers from ECI Wireless who were bolting down another massive steel section of the tower 120 feet overhead.
“Good job, everybody,” Dahlkemper, wearing a hard hat, shouted.
Emergency crews throughout Erie County are getting a long awaited update to their radio systems. All emergency crews in the county will be equipped with a new radio system that allows them to communicate with other agencies who might also be responding.
Before, crews from different townships were unable to communicate directly.
Lycoming County officials have hinted at overhauling its public safety communication system on various occasions over the past year.
On Tuesday morning, the commissioners heard a presentation from Michael McGrady, president of MCM Consulting Group, detailing that a study lasting longer than nine months showed such an overhaul will cost about $7.4 million.
"That’s to build a system that’s going to last you for up to 20 years,” he said. “It’s a pretty good investment."
The Summit County Consortium worked closely with MCM Consulting Group, Inc. to evaluate potential vendors that would meet the needs of all six PSAPs, which answer approximately 665,000 services calls each year.
MCM Consulting was impressed by Tyler’s robust solutions and their features and functionality, which would fully integrate each PSAP’s respective systems, creating efficiencies between all agencies.
MCM is also pleased to announce the hiring of James Matisko to the position of Vice President of Business Operations effective July 16, 2018. James comes to MCM with extensive knowledge and experience in the areas of emergency management, executive leadership, fiscal management and personnel management. James is a retired Lieutenant Colonel and served in the United States military for thirty-three years.
James holds a Bachelor of Science from Pennsylvania State University, along with a Master of Science from the University of Maryland.
As the Vice President of Business Operations, James will be responsible for the overall administration of personnel, operations and business development of the company.
James can be reached at [email protected] or 570-406-0225.
MCM Consulting Group, Inc. (MCM), a public safety and telecommunications consulting company headquartered in Saint Marys, Pennsylvania is pleased to announce the promotion of Teresa Nelson to the position of Project Supervisor effective July 1, 2018.
Teresa’s education and impressive experience in the areas of communications and project management have contributed to her rising status with MCM. During her time in the company, Teresa has displayed an ability to successfully complete projects efficiently and professionally.
Teresa’s holds a Bachelor of Science (B.S.) from Florida Institute of Technology and Project Management Professional (PMP) certification.
The staff of MCM congratulates Teresa on her accomplishments.
Eight new towers being constructed for project. Nine existing tower sites are also being improved.
Erie County’s $23.2 million next-generation public radio system project is taking shape.
Work ramped up this past week on the construction of eight new communication towers and at the sites of nine existing towers. Those towers, scattered throughout Erie County, are part of an intricate infrastructure upgrade that will improve communication between emergency responders, their counterparts in neighboring communities and dispatchers.
“They are working at a breakneck pace,” Public Safety Director John Grappy said of local contractors Perry Construction Co. and Keystone Electric.
The project marks what public safety officials believe is a long-overdue transition to a digital platform. Safety forces now operate on a patchwork of frequencies, from low-band to UHF and VHF.
Tioga County is located in North Central Pennsylvania. Its Department of Emergency Services’ dispatch center covers 2,550 square miles (6,600 square km), primarily for Tioga and Potter Counties, but also areas in McKean, Bradford and Lycoming Counties. 26 fire and EMS services, and 26 police departments are handled by Dispatch.
Tioga County was looking to migrate from TDM to Ethernet technology and chose RAD’s solution based on recommendations from MCM Consulting Group, Inc. (MCM) and Tessco, a leading wireless system integrator and a RAD partner. Tioga County had decided to create a dual network path based on an existing DS3 microwave system that provides voice and data services for first responders.
AKRON, Ohio - Summit County, Cuyahoga Falls, Stow and Tallmadge are taking the next step in the process of consolidating their public safety dispatch operations.
The four communities, along with newcomers Fairlawn, Green and the City of Akron, announced on Oct. 11 their intention to hire MCM Consulting Group, Inc. to advise them on the implementation of the consolidated computer-aided dispatch (CAD) system and the possible consolidation of their dispatch operations.
About $6 million worth of mobile and portable radios, as well as control stations, will be installed in police, fire and emergency medical services vehicles across the county starting later this month.
New equipment for Erie County’s $23.2 million public safety radio system has arrived early and will be installed in police, fire and emergency medical services vehicles across the county starting this month.
The goal of the “Next Generation Public Safety Radio System” project is to move the existing system and its users onto a common communications platform. Doing so will enable emergency responders to more effectively communicate with each other, including among different departments.
The project was approved by Erie County Council in August 2015. MCM Consulting Group is managing the project and Texas-based E.J. Johnson won the bid to provide the equipment. Another company, Mobilcom, will install the mobile radios and control stations.
Summit County and several local cities intend to hire a consultant to guide them in exploring a shared dispatch system, and perhaps even consolidation of their physical operations.
If approved by their respective councils, MCM Consulting Group Inc. will advise the county and the cities of Cuyahoga Falls, Stow, Tallmadge, Fairlawn and Green on the implementation of a consolidated computer-aided dispatch system and the feasibility of an outright merger of dispatch operations.
Akron has also asked to be included in discussions about joining a shared computer-assisted dispatch system, but is not included in talks concerning the consolidation of all dispatch operations.
Earlier this year, the County of Summit and the Cities of Cuyahoga Falls, Stow and Tallmadge entered into a memorandum of understanding laying out the framework for a consolidated computer-aided dispatch system (“Consolidated CAD System”) and possible consolidation of dispatch operations. On Wednesday, October 11, 2017, those communities announced their intention to hire MCM Consulting Group, Inc. to advise the communities on the implementation of the Consolidated CAD System and the possible consolidation of their dispatch operations. The communities were joined by the Cities of Fairlawn and Green in both efforts and by the City of Akron for the Consolidated CAD System only. The City of Akron is not exploring a consolidation of its dispatch operations with the other communities.
The Monroe County, Pennsylvania hazard mitigation plan was updated in a long-term planning process which occurred between July 1, 2015 and October 1, 2016. Due to the in-depth nature of hazard mitigation planning, Monroe County sought the services of MCM Consulting Group, Inc. (MCM), which has a vast span of knowledge in hazard mitigation planning. Monroe County and MCM initiated the planning process with the development of a multi-discipline local planning team, which included representatives from local business, academia, government, and the first responder community.
A comprehensive capability assessment and a risk assessment were completed by Monroe County representatives and local government representatives. The capability and risk assessments give government and public safety representatives the opportunity to take a detailed, structured look at the hazards that could affect citizens, safety and infrastructure in their communities and county. The assessment also affords them an opportunity to look at their current ability to mitigate and recover from these hazards. In addition to county and local government representation, agencies including hospitals, museums, historical associations and educational institutions participated in the assessments.
Erie County government’s multimillion-dollar public safety radio system is proving to be a less-costly proposition — in terms of equipment — than local officials originally projected.
County Executive Kathy Dahlkemper’s administration said last week that the project, originally projected to cost $26.5 million, is slightly more than $3 million under budget right now due to lower-than-expected equipment costs.
Those expenses are being closely monitored by MCM Consulting group, which is coordinating the public safety radio project for the county. Michael McGrady, MCM’s president and chief executive, also told the Erie Times-News that equipment purchases for the radio project are under budget.
MCM Consulting Group, Inc. (MCM) announces the hiring of Jason Roblin, Senior Consultant - PMP. Jason joins MCM with extensive experience in 911 and emergency management, having served as a 911 coordinator and emergency management director for more than 10 years.
With a B.A. in Business Administration from Ashland University, Jason is poised to lead clients and manage projects effectively and efficiently.
As a senior consultant - PMP, Jason will be working on and supervising 911 and EMA projects for MCM.
LOCK HAVEN - A new fiscal year means new contracts in front of the Clinton County commissioners.
At Thursday’s meeting, the commissioners acted on contracts for updating the county’s hazard mitigation plan, repairing the parking lot at the county’s new building in the former Piper complex, and garnering more parking near the county building in Flemington.
MCM Consulting Group, Inc. (MCM) announces the promotion of Tyler Haas, Project Coordinator to full-time employment. Tyler is a graduate of Penn State University with a B.S. in Geology.
Since graduation Tyler has completed several Python programming language classes including a class on using Python to program and automate ArcGIS software. With this training, Tyler has created several tools for MCM clients.
Additionally, Tyler has participated in a variety of emergency management training and been involved with the creation of several hazard mitigation plans.
Tyler started with MCM in 2014 as an intern, accepted a part-time position upon graduation from Penn State, and became a full-time employee as of July 1, 2017.
Tyler continues to work with MCM on GIS and EMA projects.
Speaking at the opening of the fire service and local government symposium Saturday, County Commissioner Rick Mirabito urged the group to think about the future of area fire services.
“From a bigger perspective, we have to think about how we’re going to deliver fire services not just two, three years from now, but really 20 to 25 years from now,” he said.
MCM Consulting Group, Inc. (MCM) announces the hiring of Corbin Snyder, Project Coordinator.
Corbin is a graduate of the Pennsylvania College of Technology with a B.S. in Emergency Management Technology.
Corbin has experience working in emergency management, including an internship with the Maryland Emergency Management Agency. As a project coordinator, Corbin will be working with MCM on both EMA and taskforce projects.
Due to 911 legislation passed in 2015 (ACT12), which funds a large percentage of all PSAPs operating budgets, non-county PSAPs in Pennsylvania are required to consolidate. The cities of Bethlehem and Allentown are both scheduled to lose their funding for their individual PSAPs in 2019. These cities are the last two municipalities to hold PSAP status and funding due to previous legislation.
To determine the best approach to the pending consolidation, the counties and cities hired MCM Consulting Group, Inc. to conduct a PSAP study on the best way for the neighboring agencies to address the requirements. Their study revealed that implementing a common software system for Lehigh and Northampton counties would be the most efficient and best approach for better public safety.
The project is currently $3 million under budget.
Erie County residents can expect better emergency response in December 2018 when a radio upgrade project currently $3 million under budget is complete.
That is according to project designers who updated emergency personnel from across the county Wednesday evening on the ongoing implementation of a next generation countywide public safety radio system.
The public is invited to attend a meeting at which officials will provide an update on Erie County’s next-generation public safety radio project.
Wednesday’s meeting will be facilitated by Mike McGrady, president of MCM Consulting Group, and John Grappy, director of the county Department of Public Safety.
Finding ways to improve efficiency of and/or share public services — whether they be police, sanitary sewer, water or emergency communications — just makes sense.
The cost of government just keeps rising, folks, and we don’t see a reverse of that trend anytime soon.
So our elected leaders need to always be open to finding ways to reduce or stabilize costs to taxpayers without comprising important services.
That’s why the Clinton County commissioners’ decision to spend $48,000 in Act 12 grant funding with a consultant who will pinpoint and recommend changes to enhance emergency communications into “shared regional services” should prove fruitful.
Will there be cost savings?
BROOKVILLE — The Jefferson County Commissioners passed a “modified” 2017 budget. The modifications did not reduce the $28,062,301 spending plan but reduced the amount the county would be forced to use from its reserves to balance the budget.
The commissioners entered into a professional consulting services agreement with MCM Consulting Group along with the Northern Tier Regional Telecommunications project. MCM will aid the county in preparing and implementing the next generation of 911.
Plans to combine Snyder and Union counties’ 911 centers at one location in Penn Township, Snyder County, for a savings in excess of $1 million and improved services are moving forward.
About 60 emergency responders, law enforcement and community leaders attended a meeting Tuesday to hear the proposal pitched by MCM Consulting Group Inc. President Michael McGrady to merge the agencies in the next two to three years.
(WBRE/WYOU) Two counties will combine 911 call centers.
Union and Snyder counties have been weighing their options since January when they started a six month study on a potential merger.
The biggest concern.. if they can save money while not jeopardizing service?
Those concerns were raised today but the decision was made to move forward with the merger.
IRVING, TEXAS – August 16, 2016 – EF Johnson Technologies, Inc. (EFJohnson), the mission-critical P25 communications specialist for JVCKENWOOD Corporation, has signed a $16.1 million contract with Erie County, Pennsylvania to deliver a secure P25 Phase 2 communication system, new radio fleet, dispatch consoles, and long-term support services to upgrade and manage its radio network.
Erie, PA – Erie County Executive Kathy Dahlkemper on Tuesday announced a contract award to E.F. Johnson Co. as the radio manufacturer for Erie County’s Next Generation Public Safety Radio System.
A consultant is recommending a Luzerne County 911 emergency radio communications system overhaul and upgrade that would cost an estimated $19.26 million and take several years to complete.
WILKES-BARRE -- Luzerne County announced Monday that changes are coming to improve the response to emergencies.
The last time Luzerne County 911 updated the system was about 20 years ago.
In other Emergency Management Agency news, the county renewed its contract with MCM Consulting, which provides guidance to the department in many areas, including creating its Hazard Mitigation Plan.
MCM Consulting Group, Inc. (MCM), a privately held education, government, healthcare, public safety and telecommunications consulting firm headquartered in Saint Marys, Pennsylvania announces the retirement of Edward Hoffman, Consultant. Ed was the company SME for training and HSEEP exercises. Ed also worked on EMA projects, including hazard mitigation planning. The staff of MCM wish Ed well with his retirement.
MCM additionally announces the promotion of Valerie Zents to Consultant. Valerie has worked for MCM as a project coordinator. Valerie has excelled in service on her healthcare and taskforce projects, as well as in assisting senior consultants with EMA projects. Val will continue to work with the same clients as a consultant. The staff of MCM congratulates Valerie on her promotion.
MCM announces the hiring of Teresa Nelson, Senior Consultant. Teresa has extensive experience in 911 and communications, including serving as the Director of Customer Support and Interoperability at the Pennsylvania Office of Public Safety Radio Services. Teresa also holds a Project Management Professional certification.
Teresa holds a B.S. in Oceanography from the Florida Institute of Technology.
As a senior consultant, Teresa will be working with MCM on both 911 and taskforce projects. Teresa can be reached at [email protected] or 814-203-6370.
The Board of Bucks County Commissioners continued to reinforce its commitment to the public safety of more than 630,000 county residents during its June 22 business session. The meeting, which took place in the Commissioners’ Meeting Room of the Bucks County Administration Building, was scheduled expressly for the consideration of a pair of Emergency Communications contract resolutions.
Commissioners Robert G. Loughery, chairman, Charles H. Martin and Diane M. Ellis-Marseglia, LCSW unanimously approved the two agreements – the majority of which was $2.042 million contract with Frontier Communications of America, Inc. of Norwalk, CT to provide hardware to complete a 911 telephone system upgrade and five-year maintenance agreement. The second contract was a $256,000 deal with MCM Consulting Group, Inc. of Saint Marys, PA to provide consulting services for the Computer Aided Dispatch system.
Following debate about the bidding process (the hardware upgrade was a re-bid), Chairman Loughery noted that the meeting was scheduled because the resolutions involved “two significant projects, and much needed upgrades.” Commissioner Marseglia motioned to approve the contracts, and Commissioner Martin seconded the motion.
The next meeting of the Board of Bucks County Commissioners will take place at 6 p.m. on Wednesday, July 6 at the Van Sant Airport, 516 Cafferty Rd., Erwinna, PA 18920. For a complete audio account of the June 22, 2016 business meeting, please visit the official county website, www.BucksCounty.org, and click on the “Audio from Last Mtg” link on the home page.
For quite some time, we’ve all watched budgets dwindle in U.S. cities and counties, while government workers are challenged to do more with less. As a fire chief and former 9-1-1 director, I can certainly relate. And as an account manager for a 9-1-1 solutions provider, I’ve seen how advances in technology bridge the gap by connecting municipalities in ways that improve operations and reduce costs.
We’re beginning to see more and more public safety agencies regionalize by uniting across their geographical boundaries to share resources and become more efficient. Regionalization also helps them keep pace with the latest technologies needed to protect and serve. Being in both worlds - as an emergency communications user and supplier - provides me a unique perspective on the entire regionalization process and the steps needed for effective implementation.
Michael McGrady, President and Chief Executive Officer of MCM Consulting Group, Inc. was recently honored as the Citizen of the Year during a ceremony at the Erie County Firefighters Association annual banquet.
Mr. McGrady and his company have been committed to the assessment, design and implementation of the Erie County next generation emergency communications radio system.
The Erie County Firefighters Association recognized Mr. McGrady and his company for their deep commitment to enhancing communications for first responders.
ALLENTOWN, Pa. - A consultant, Jonathan Hansen of MCM Consulting Group, Inc. recommends creating a regional Lehigh Valley 911 emergency communications center. That center would consolidate separate 911 centers now operated by Allentown, Bethlehem, Lehigh County and Northampton County into a single comm center under one roof.
ALLENTOWN — A 911 regionalization study has recommended merging the Allentown and Bethlehem 911 centers with Lehigh and Northampton counties, respectively, in the next two years with an eventual goal of creating one regional center.
A 911 regionalization research has really helpful merging Allentown and Bethlehem’s 911 facilities with their respective counties within the subsequent two years with an eventual objective of making one regional middle.
Regional 911 center makes sense for Lehigh Valley, study finds. The Lehigh Valley should have a regional 911 center but it's unlikely a full consolidation could happen ahead of when state funding runs out in 2019, according to a study.
Erie County government will host two public meetings Monday to update citizens on the $26.5 million public safety radio system project for local emergency responders.
NESCOPECK — In small Nescopeck Borough, radio coverage can be spotty.
Some parts of the borough are dead zones where calls to 911 from portable radios don’t go through.
The borough is tucked next to the Susquehanna River, across from Berwick, and the spotty connection is worse in the spring and summer when foliage is blooming on the hills around the valley, said Paul Nye, borough council president. Police who couldn’t make calls with portable radios have switched to using cellphones if they need to call 911, he said.
Nye said the communication issue has existed for about five years, but some changes could be coming.
No sirens went off as Bethlehem’s police, fire, ambulance and emergency communications operations had their proposed 2016 budget requests reviewed by City Council Thursday night. The focus was on public safety during the second of five hearings scheduled on the proposed $73.85-million city budget.
They are the only two cities in Pennsylvania that still operate their own 911 centers. State officials are pushing for consolidation to create regional centers. MCM Consulting Group has been hired to develop a strategic 911 plan for the two cities and two counties.
Flooding and high wind storms are natural hazards that have typically plagued Lawrence County.
But the Pennsylvania and Federal Emergency Management Agencies want counties throughout Pennsylvania to plan for any type of disaster and put that planning on paper so they can qualify for funding and assistance following any type of a large-scale emergency. The higher agencies also are demanding the input and participation of individual municipalities in the document, showing how they will respond should larger-scale emergencies arise within the county's borders.
BETHLEHEM, PA - Bethlehem officials have taken the first step toward determining the future of the city’s 911 emergency communications system.
City council on Tuesday unanimously approved hiring MCM Consulting Group Inc. to develop a strategic 911 plan for Bethlehem, Allentown and Lehigh and Northampton counties.
That study could lead to a merger of city and county 911 centers, which is being pushed by the state to supposedly make such operations more effective and cost efficient.
Allentown, Bethlehem and Northampton and Lehigh counties are going study whether they should share 911 dispatch services.
The study, which will start in September, will look at both whether all four entities should merge dispatching and also whether Bethlehem should join with Northampton and Allentown should join with Lehigh.
ALBION -- Public safety in Erie County will be getting a boost soon.
Erie County Council voted 6-1 on Tuesday night on a $26.5 million public safety radio system for emergency responders.
Before the vote at the Elk Creek Township Building, Erie County Executive Kathy Dahlkemper said the vote would culminate more than one year of work on the project to date.
She thanked council for a project she said is "very, very important for the county."
Mansfield University hosted a table top exercise with the North Central Task Force on July 20 to familiarize local emergency responders with assets offered regionally.
Exercise conducted by MCM Consulting Group, Inc.
The primary concern of those in attendance was the necessity of constructing a new building on land adjacent to Cora Clark Park off Pine Street when a number of vacated properties are currently available for purchase. The land was part of the former Talon property.
MCM Consulting Group Inc., the county consultant on the project, considered a number of vacant buildings, according to Mike McGrady, the group’s president and chief executive officer.
EDINBORO -- Erie County government is moving ahead with a significant financial commitment toward a planned new $26.5 million public safety radio system for emergency responders.
It's considered one of the largest investments by Erie County government, aimed at protecting the community.
Leaders of the “Next Generation Radio System” met with the public to give an update on the project.
The $26.5 million project will allow first responders to broadcast on the same frequency. Right now, they operate on different channels.
The upgrade is expected to take three to five years.
In phase one, members of MCM Consulting Group are trying to acquire FCC licenses. They're also trying to pinpoint where to build new communication towers.
According to MCM Consulting Group President Michael McGrady, they hope to have a total of 20 towers available, which includes 11 new and nine that already exist.
Erie County government officials and the consultant for a $26.5 million countywide radio network for emergency responders will host a public meeting to give updates about the project.
Lebanon County stands to save hundreds of thousands of dollars and end up with a new 911 Call Center should the Pennsylvania Legislature approve funding formula changes to the surcharges placed on phones, an emergency communications consultant told the Lebanon County commissioners on Wednesday.
Mike McGrady, president and CEO of MCM Consulting Group, was fresh from testifying before the state House Veterans Affairs and Emergency Preparedness Committee Wednesday morning about amending the E-911 law that helps fund 911 Call Centers when he presented the commissioners with the results of a Regional Shared Services Assessment.
Erie County council members unanimously voted to approve another contract to the MCM Consulting Firm.
MCM Consulting is responsible for implementing the $26 million radio system. Officials say the upgrade will replace the county's current system and will benefit 37 municipalities.
MCM Consulting Group, Inc. (MCM), a privately held education, government, healthcare, public safety and telecommunications consulting firm headquartered in McMurray, Pennsylvania announces the hiring of Robert W. Anderson as Senior Consultant. Robert joins the MCM team after serving as a public safety consultant for the past 10 years. Robert’s background includes serving as the Director of Emergency Services, Director of Communications and the Emergency Management Coordinator for Hunterdon County, NJ.
As Senior Consultant, Robert will serve as a Project Manager for 911, emergency management, education, healthcare, HSEEP training and exercises, public safety and telecommunication projects.
Robert will be working out of Doylestown, PA and can be reached at: [email protected] or 267-614-5485.
Erie County Council Chairman Kyle Foust wants to make one thing clear: he and most of council's seven members support establishing a new, multimillion-dollar state-of-the-art radio system for local emergency responders.
That is a major reason why the panel plans to meet with the county's radio system consultant Dec. 16 to ask more questions about financing, equipment and the project's probable timeline.
Foust asked for the meeting with Mike McGrady, chief executive of McMurray-based MCM Consulting Group Inc. The meeting will be at the Erie County Courthouse.
Erie County Executive Kathy Dahlkemper, along with Public Safety Director John Grappy, is pleased to announce that the Erie County Department of Public Safety will host a Town Hall Meeting at the Albion Fire Station, 13 Smock Avenue, Albion Borough on Tuesday, October 28, 2014 from 6:00 PM – 8:00 PM to discuss the County’s radio project.
In conjunction with the Erie County Department of Public Safety, the Next Generation Radio System Needs Assessment and Strategic Plan Report will be presented by Mike McGrady of MCM Consulting Group. Erie County Executive Kathy Dahlkemper and Erie County Councilwoman Carol Loll are expected to attend.
MCM recommends that Erie County replace the current radio, microwave and radio console equipment and systems as soon as possible because they are so crucial to public safety.
On the afternoon of Oct. 2, Jim Pyle lived through another example of what he considers the fractured, potentially dangerous radio communications system that many local public safety responders deal with.
"I've had five structure fires in the past two years where this has been an issue. ... I'm 10 feet away from (another department's) trucks, and I can't talk to them," Pyle said. "It's endangering firefighters. It's endangering the general public. Using the system we have now, someone's going to get injured or killed."
A new independent study backs up complaints that Luzerne County’s 911 Center is understaffed, recommending the addition of 15 full-time employees.
The center is currently budgeted for 77 full-time employees, and the proposed 2015 budget did not increase that amount.
Luzerne County 911 Executive Director Fred Rosencrans sought the study, which was completed by MCM Consulting Group, Inc., after the center was criticized for dispatching emergency crews to the wrong location in a May 15 fatal blaze.
The AFSS acquisition will enable MCM Consulting Group, Inc. to increase its level of service in HSEEP Exercise, Emergency Management, Regional Task Force Management, Healthcare and Education Agency Training, and Hazard Mitigation Planning. MCM will also be able to offer Active Shooter exercises including the utilization of the Simunitions Training Weapons system, which is considered a “real world” training system for law enforcement.
The Haas acquisition allows MCM to provide an added dimension to projects already managed by MCM as well as to incoming projects, allowing the company to provide expanded GIS, addressing and mapping services.
TEMECULA, Calif., June 19, 2013 – Cassidian Communications, an EADS North America company, has completed installation of its VESTA®/Sentinel® 4 Next Generation 911 (NG911) call taking system for seven of the nine counties in the northern tier of Pennsylvania.
The new NG911 system makes it possible for all nine counties to be part of a single regional network – the first in the state – designed to reduce costs and improve survivability for their Public Safety Answering Points (PSAPs). The Northern Tier Regional Telecommunications Project, encompassing the counties of Clearfield, Jefferson, Elk, Cameron, McKean, Clarion, Warren, Crawford and Forest, complies with the Pennsylvania Emergency Management Agency guidelines for 911 infrastructure.
Partnership with other counties cut cost sharply.
Mike McGrady with MCM Consulting, the consultant coordinating the project, said if each of the regional member counties purchased the necessary equipment on their own, total cost would be $3.159 million. The regional cost brings that down to $1.3 million.
He explained that each county will also see a reduction in yearly maintenance costs as well. He said Warren County's share of the maintenance will be approximately $13,000, down from $39,685 if the county maintained their own equipment.
In a cost savings and redundancy of services effort, nine counties in Northern Pennsylvania worked together to upgrade to a Next Generation 911 Telephony System and a diverse and redundant Fiber Network. The counties of Cameron, Clarion, Clearfield, Crawford, Elk, Forest, Jefferson, McKean and Warren have worked together as one entity to create a regional network and improve technology and operations while saving costs to their individual counties. Implementation of this project started with Cameron and Elk Counties going live on the system May 1, 2013. Clearfield and Jefferson County will be the next two counties to go live on May 15, 2013 and May 16, 2013. All counties will be live by June 30, 2013.
The average cost for replacement of a single county 911 telephony system would have been $394,875.00 (total combined cost to all the counties would have been $3,159,000.00). The average yearly maintenance for each county would have been $45,242.69. On the new system the average county shared cost is $162,513.09 ($1,300,104.72 total for the region). The average yearly maintenance per county is $21,730.12.
These nine counties all received notice from their current telephony switch manufacture about the end of life for their legacy era 911 telephony switches. In determination to provide the best 911 redundant response, they began the process with MCM Consulting Group, Inc. (MCM), of McMurray, PA in January 2011. MCM reviewed their systems which lacked redundancy and were not interconnected or capable of Next Generation 911. Therefore, the counties could not transfer 911 calls between counties with automatic location identification or automatic number identification.
The Northern Tier entered into agreements with Cassidian Communications, Inc. out of Temecula, California, for the Next Generation 911 (NG911) Telephony System and Zito Media for the IP fiber network. The system design includes a Cassidian Geo-Diverse Vesta 4.0 Next Generation 911 telephony system, with one NG911 switch located in the Windstream territory, and the second NG911 switch located in the Verizon territory. Each switch is capable of running the entire network in the event of a failure of the other switch. Each county is connected to switches on diverse and redundant fiber paths.
For added redundancy to the system, all of the county 911 trunks are directed to the Verizon Tandems. From the tandems, one half of the counties 911 trunks are connected to the switch in Elk County and the other half are connected to the Clearfield County switch. Also in an effort to reduce costs, non-emergency and administrative telephone lines connect to the individual county workstations at the public-safety answering point level.
This system is also capable of providing transport and connectivity for systems including but not limited to: computer aided dispatch; graphical information systems; radio interoperability system; and emergency management functions, including interfacing with a State-wide emergency services IP network (ESInet).
What does this mean for the general public? If a 911 Center’s phone service is down, for whatever reason, in one county, your 911 phone call will not go unanswered. Someone from another county will pick up that call, providing necessary emergency information to the caller; while still being able to send information to the dispatchers in the county in which the call originated, with all of the necessary location and number identification – in one fluid motion between counties.
With the installation of a new radio network and Zetron’s MAX Dispatch system, Clinton County Pennsylvania’s Department of Emergency Services (CCDES) is now narrowbanding compliant and equipped with a dispatch system that provides updated functionality, improved interoperability and future readiness. | 2019-04-20T10:16:51Z | https://mcmconsultinggrp.com/press.html |
Now, there are 3 leading forms of universally-acknowledged resume formats including different ways of presenting your resume-relevant advice as summarized previously. You should understandthat restart format is essential, since it can certainly increase your odds to acquire invited for an interview. In case a resume structure remains disorganized and cloudy, a future employer has possibly numerous resumes from other applicants to check through so they won’t waste time wanting to make sense of it and you’re going to overlook out your opportunity for an interview.
When you format your resume you wish to make certain your leave enough perimeter space to empower for printing. Then look at a few essential concerns to make it possible for one to clarify which arrangement will be excellent for you personally. If you’re uncertain about the structure of the restart, then you should search the world wide web to get some sample format and decide on the main one which you think can function your goal. You’re able to subsequently download the resume from many formats out there there.
If you’re taking a look in a non invasive resume format, it’s more cause why you want to receive it reviewed until you utilize it to be able to apply to jobs. The absolute most hard thing is always to choose which one restart format is acceptable for you. Therefore whenever you haven’t made up your mind about that arrangement that you would like touse, now is the moment. If you should be interested in a info-graphic format, then listed below are quite a few infographic samples to look out for there.
Yet a lot or what kind of work knowledge you’ve acquired, there exists a resume format that is likely to create your qualifications glow. Take a peek at the examples to decide on which structure is most right for you. Each restart arrangement was made to increase your chances to come across the job in 2018.
If it is likely to sort the letter. Professional letters are part of expert living. You will also receive sample letters and very best ideas to assist youpersonally.
There are a number of beautiful restart templates out there, but nevertheless, it may be simple to feel as a lot of the largest charge a ridiculous quantity of funds, require special style apps in order to editboth. Implementing a resume template is now a decent and smart practice for multiple aspects. You will find a number of free resume templates available online but it could be exceedingly challenging to choose the best one that is most suitable for your requirements .
You are able to use our professionally established resume templates along with also one way resume builder to immediately and easily establish a stand out resume. Every one of those templates are tailored and easy to make use of. First select the ideal template which you will find acceptable. Our creative templates allow one to stand out by the crowd. Each one of those resourceful style templates provide a perfectly balanced blend of individuality , professionalism along with any style.
Only fill in the vital sections like educations and abilities, choose the subject you need and save the CV. It’s crucial that additionally, you tailor your CV to every single project to produce certain that it highlights the abilities that are associated with the project. You are going to have the ability to produce a web based CV for virtually any endeavor, that range between accountant to picture designer.
The very last thing you want to do is get work that you can’t really do. When you are asking for work which relies upon the benefits of this individual, you require a resume template you might inject somewhat more personality to allow it to pop’. As you have by now understood writing a fantastic resume is not a simple job you could do.
You will find three kinds of resumes, each with its own benefits and advantages. Chronological resumes aren’t the perfect match for pupils as they don’t really have lots of expertise within the very original location. Functional resumes are also equally all great for emphasizing abstract skills which are going to become more related to a brand new area of job.
Simply make sure, whichever format you select, which you’re targeting it to your job which you’re deciding on. Also be sure you tailor the document to this job that you’re searching for. Simply because you’ve got zero knowledge or it really is your own first occupation.
Our occupation is to aid you in having your resume available so you could have your fantasy occupation once potential. It really is cool that you’re trying to find a job to have a money, however, you will want some difficulties together with resume. When you’re working at your overall job you’re perhaps maybe not stressed, seems like that which goes easy with no troubles. You’ll find varieties of overall restart types it will be possible to follow along predicated on which type of strategy you desire your resume to have applying for the favorite job.
You’re hunting for resume templates that are simple. Go right ahead and decide on the ATS friendly resume template that may assist you to find the desirable job. It’s likely to get into the restart template at no cost and can edit the template using Microsoft word. Following adding your very own personal info inside the restart template you are now able to edit this resume template based upon your academic qualifications and professional experiences. You may also download free templates out of your own Resume Library to get going in your own resume. By using a restart template is getting a decent and wise clinic for all explanations. The PSD is extremely straightforward to customize and edit.
Have a peek at the instances to decide on that format is the most appropriate for you. Mix format would be your combination of each of the other formats. Each format is distinguished by some features which help convey more concerning the candidate. Chronological format is most reliable for an experienced customer service partner. But, the chronological format is perfect for a seasoned prospect to emphasize the history. You are able to choose the chosen or functional format based in your demand, experience and processes. Hence it is necessary to elect for the correct format to get the IT expert CV.
Yet a lot or what sort of work knowledge you have received, there is a resume format that’s likely to produce your skills shine. There’s also an third format you might have learn about, referred to being a Combination format.” It’s possible to utilize any one of the above mentioned formats in accordance by means of your need, however simply make sure that the arrangement you choose should promote your skills from the ideal way. You can use the format if you have discontinuity in your work previous to or hopped the jobs often before. Therefore, in case you’ve got a resume which isn’t within a ATS-friendly format, it is probable that you wont be contacted for a scheduled appointment. There are three major formats widely employed for composing resumes.
If you are producing the CV on your own own, you might look it dependent in your desire but you should be careful in case you are using the online design resume templates. The most critical consideration to start using is writing your private CV. So, to locate a superb career, you should find out to earn a CV and market yourself. Use a note document to make the sample CV that you can easily edit and when demanded.
Going throughout the restart samples, you’re going to get a notion on which will be the important things to get a perfect restart and also exactly what you could include inside your app. Resume templates and examples are very useful, particularly whenever you’re writing one of one’s very first indications. There’s no doubt that a resume which is both cohesive and professional will have a much greater possibility of standing out of the audience even supposing it’s made by using a template.
It will be possible that you use a functional format if you are a fresher application. You can even provide a skills section in that you simply list soft-skills together with almost some other languages, programs, or certifications you have received. When you are creating the technical expertise section, you should take exclusive care to enlist the particular job related apps on your CV.
Assessing the business and the work description, and including appropriate key words phrases and phrases, are critical for your own success. Moreover, the sample customer service resume will assist you in detailing what section you have surely got to concentrate on and how an ideal customer-service resume should look like. You’re going to be surrounded by composing pros all through the plan of order placement, and when you opt to purchase essay and pick a qualified author, things will likely make even more intriguing. Skills Skills would be the most crucial portion of consumer service resumes. As being a more comprehensive, you will need to focus in your existing client service skills to find attention from your recruiters.
Our resumes are frequently the very first belief a possible employer gets people. Use the following ideas to make your restart very stick out. It’s possible for you to down load as many resumes as you desire. Extended resumes won’t get attention from employing managers and wont be go through and thus won’t get one of the desired occupation prospect. Implementing brief paragraphs, links that are simple, and bulleted lists will provide one of exactly the additional oomph you will need to generate an unforgettable restart.
From freshers into experienced, every one would like a restart to submit a software for virtually any work. First, you CV ought to be manufactured based on the type of job which you are applying. Employ the same restart for each project. Finding a good project has at all times been a challenge.
You have the ability to get into the restart template at no cost and can edit the template with Microsoft word. Whenever you want to callup this template, then here’s what you’re doing. Though there’s simply no pay letter template comprised, it needs to be simple to generate your own.
Programs function as a outline or guide around which you can build your resume. A good template is simply a hint. After that you have to be certain to’re staying supplied fully-customizable templates.
Keep in mind, totally free survey templates have been all made to catch the awareness, not the interest of the folks who really matter, for example hiring recruiters and managers. Deciding the incorrect template could somewhat damage your chances of receiving an interview. Templates and suggestions, restart template.
After you purchase, the template is indefinitely yourswhich usually means that you may upgrade once you own a name alter or wish to emphasize a more recent accomplishment. Utilizing a resume template is now a great and smart clinic for several reasons. Implementing a resume template is currently an acceptable and wise practice for all elements.
Templates can frequently be downloaded and then utilised within an wordprocessor. Lots of templates are either obsolete or created from women and men that are not experts in the field of resume composing. It’s likely to get into this totally free template here.
If you should be hunting for a straightforward but beautiful layout that’s sure to interest almost any potential employer compared to you are in appropriate location. The clean and effortless design can allow one to demonstrate your skills, portfolio items in an outstanding way. From that point you will choose your template styles, fonts and colours.
You’ll find a number of ways to create a original and professional resume online so that you will be ready for the following employment interview and application. How To earn A Resume FreeOur resume-builder makes it possible for you to make an ideal resume in minutes. About our free account provides you might possibly even find complimentary.
You may make use of the data which you get back from them to help you with prospective software. Or else, it might eliminate the info onto your restart. The information that you include on your own resume ought to be seeing the occupation that you’re applying for. In the event that you would like to include more details, you may possibly prefer a text-oriented template.
In the event you are unsure what advice needs to be included filling in the blanks will guide you get through the process alongside our tips and help. It is crucial that you understand what information you should present, and also to bargain with each facet and obviously. It’s important it’s clear and straightforward also that information may be read. The info ought to be sufficient to grab the interest of whoever’s reading it, meaning the shade and layout decisions should become reasonably subdued by comparison. Brands love to find networking kits since it supplies advice about your weblog which helps them figure out whether your web site has been the right socket to have out the word about their merchandise or service.
The completely free download even includes an attractive employment resume cover letter template. Your complimentary resume templates is one of the most indispensable elements of one’s occupation program. The coming free resume template has been invented while within the form of the brochure. So should you have to apply faculty essay author online, we are only the folks who you need to get into.
The exact primary trick is to realize the resumes are coordinated. Personalized resumes will not have any duplicates. All our resumes are a breeze to edit plus so they’re also in a position to be more customized to your own liking. Really they are observable to companies in order that they can let you know about tasks you might be interested in. Your resume can be composed of varied distinct sections that are useful to illustrate everything a recruiter or future employer need to understand. Understanding how you can tailor your resume will probably clearly supply you with an advantage. Creating a resume for employment at the art industry may be difficult.
Once you’re browsing for do the job, that you do not possess a wonderful deal of opportunities to catch the interest of a possible employer. Timing is crucial for one that is discovering employment. If you should be attempting to acquire work in bookkeeping or finance you then call for averystrong restart. Don’t make the mistake of answering each work posting with exactly the specific same universal restart. It really is tense enough searching for a fresh job. Most jobs demand great communication capabilities therefore ensure you mention yours in the account. Whether you are a recent graduate looking for your first career or even a veteran professional with decades of job knowledge, your CV has to reflect the specific demands of the location you are searching for.
Builder is your best way to pick from creature. A restart builder can be an online tool that automatically produces a professional resume together with the advice you entered. Our resume builder would be the speediest approach to produce a resume that could help you get your fantasy occupation. Your totally free rAsumA builder resume templates to personalize is among one of the most important elements of your occupation program.
When you have changed the typical resume template that you located on the net, make it straightforward for the upcoming self and save lots of variations of one’s resume. Templates will furnish one of the raw arrangement of restart. To start out with, you are getting to need the suitable template.
Resume templates are best for people who do not possess the skill of producing striking resumes. Even in the event the template is completely free, then they’ll attempt to reach up you for different products or services. Let’s decide to try to compose a ideal template .
Even the entire range of resume templates is composedof an assortment of creative resume designs. The template needs to have an area for composing capabilities and also about the certificate a person may have. The Ashley template has a very exceptional societal networking section.
You will find a great deal of beautiful restart templates out there there, but nevertheless, it could be simple to feel as a lot of the greatest expense a ridiculous quantity of income, require special layout programs in order to editboth. You wish to decide on a restart template that will help you make a fantastic initial impression, even before people start off reading. Lots of the templates are all free of charge while some charge a number dollars. A template is exclusively for architecture and fashion. Customizing the Sales Manager resume template is one of the quickest means for one to generate a resume that’s right for the objective and matches your talents and practical experience to this position you want.
Resume templates can fluctuate centered on the employment niche. The bulk of the templates are made available from termed, restart writing pros and thus the quality is exceptionally excellent. It is available in PSD format. Implementing a resume template has changed into an acceptable and sensible clinic for a lot of factors.
If you’ve got older resume templates out of prior versions of Word, you can use these in recent variants also. Every single template gives examples and tips so that you do not need to begin off from scratch after designing your own resume. Coding for resume would be a normal layout that can be properly used for any work position. Cabinets play with a considerable part in your work search since it conserves tons of your time and supply you a much better arrangement for your CV. Utilizing Word, you may make your own personal templates for nearly any app, including resumes.
DO be certain the remainder of your restart is wholly machine readable. Picking the perfect resume template may be challenging. Most useful of 2018, professional and clean Resume Templates are excellent for almost any opportunity and assist one to receive your fantasy job. It really is great for an expert who specializes on social networking or website advertising.
By using a template can reduce the quantity of time that you need to spend formatting your record, which lets you concentrate on adding content material and also polishing your resume. You’re going to need some easy advice and also a couple of dates. If you publish your application on line, additionally, it is sensible to have a possiblity to attach your resume. Should you do a speedy search around the net, you’re likely to find a bevy of sample designs. The key terms and key phrases you use when writing a quality resume can help you prepare for interview concerns which may have comparable key phrases.
You can make use of the functional format if you happen to have discontinuity in your work previously or hopped the tasks frequently ahead of. You have the ability to make use of any of those above formats in agreement with your desire, but just make sure that the structure you choose need to boost your capabilities from the ideal approach. Thus it’s vital to pick the suitable format for the IT specialist CV. Our tidy, simple, easy-to-read format will cause you to standout to hiring simple and supervisors to find in candidate tracking techniques. Your files have been also offered for downloading instantly following payment along side sent for you through e mail. Before editing, you should extract that file and you’re all set. After you uncover the proper document for your own requirements and just follow on the connection to get a hassle free download.
If you’d like to acquire yourself a great job, then you require a nice restart. Also be certain to tailor the record to the job you’re looking for. Whether you are searching for your very first job or your next one, you’ll need a resume that shows employers that you’re a skilled professional. Ergo, in the event that you should be a bartender browsing to have a superior occupation, a Bartender Blank Resume Template will allow you a complete lot.
Our resumes are well-crafted and ageless, it isn’t hard to correct them depending on your own requirements and use for the decades. Task Resume enables you to make your own very own personal logo in mere a couple of minutes. More often than notcustomizing your resume does not indicate a significant rewrite, but instead only several tweaks. Our resumes are the exact first impression a potential employer receives of us. Separate resumes are available for assorted disciplines. To sum up, thinking about the mode of a marketing and technical newcomer might be an effective method of creating your own resume.
Resume-writing isn’t hard and also that you also don’t need a professional resume template or perhaps a free restart maker to get a effective template for resumes that you have established yourself. If you choose the template sensibly, its feasible to possess a stand out resume that’s distinctively yours. It will be possible to download this free vector template.
It’s potential for you to use our professionally created resume templates and also one-of-a-kind restart builder to quickly and readily establish a standout resume. There are a great deal of amazing resume templates out there, but nevertheless, it could be an easy task to feel as a lot of the most important price a ridiculous quantity of cash, need special design apps in order to editboth. There are tons of free resume templates readily available on line but it is often quite challenging to select the optimal/optimally the one that’s most suited for your requirements personally. For landing the ideal job that you will require to use the most effective free resume templates out there! By using a restart template is now an acceptable and clever clinic for quite a few reasons. The restart template differs according to the necessities of the job that you are applying for. The most critical thing is to discover templates that are unique.
A template will notify you all the important data you should be mentioning in your CV, using special reference to the type of placement you’re looking for. Once you have chosen your best resume template out of our choice, abide by along with entirely free of charge expert guidance about how you can craft the ideal modern resume. Our resourceful templates enable you to stand out by the audience. All our innovative fashion templates offer you a perfectly balanced blend of personality, professionalism along with only just a bit of style.
Resumes don’t will need to carry a lot of one’s energy and effort but nevertheless really should not be ignored. They offer the all important first feelings to an employer an applicant cannot offer during the first period of the application form procedure. Practical resumes are every so often also referred to as competency-based resumes. An practical Resume or expertise Resume is intended to emphasize your own skills and accomplishments in addition to one’s restart as an alternative of set these under the jobs or positions you have held like in a chosen resume.
Persons reviewing resumes desire to find certain words to stick on the resume. They don’t need to be boring. Recognizing just how you can tailor your resume will probably clearly provide you with an advantage. If you’re attempting to personalize specialist, pre-formatted resumes, please take a good look at our free downloadable templates. Creating striking resumes with resume templates is also fairly a simple and effective process that makes it possible for one to compose a fantastic resume in a very restricted moment.
When there are a lot of pro CV and resume writing companies which can be found on the web, plus so they’ll undoubtedly do the duty for you personally, it is going to set you back to truly own a resume created to you particularly. Instead of the arrangement of an application form, a CV helps it be feasible for you to receive advice round but also establish a creativity and flair and essentially we’ll explain how to make a CV. While there are a great deal of specialist CV and resume writing products and companies that can be found online, and so they’ll certainly perform the task for you personally, it will cost you to receive it written for you particularly.
Resume templates are just one way to guarantee arrangement supporting your own restart. It comes with amazing animation. Resume templates should be utilized as guides to help you create a resume that highlights your own identifying mixture of practical expertise and abilities and skills. You will see that we’ve found both standard white and black templates as well as a lot of innovative kinds together with colors and graphics added. Some times all you will be needing is a classic design template which is clean, clear and right into your stage.
Many usually do not need any sort of download, you are able to only consider the tips you need and leave the rest. You can find lots of free survey templates or samples available online, making it simple and convenient for somebody to alter one according for their own very own needs. The free resume template has been invented inside the form of the booklet.
In order to acquire your preferred job which that you must have an effective restart. Previous to producing a restart make a list of each one of the requirements for the particular job you are attempting to obtain. Your most recent job needs to be the summit of one’s career thus far. If you are attempting to obtain job in bookkeeping or finance you call for averystrong resume.
In the event you don’t get confessed, identify an alternative endeavor. Particular types of work from the food service industry demand resumes using a number of their exact same skills. Whenever you’re asking for a job which relies upon the strengths of the individual, you require a resume template that you may inject somewhat bit more personality to make it pop up’. Also be certain that you tailor the file to this job that you’re searching for. Transportation tasks involve a lot of responsibility along with your resume will require to signify you can look after that.
If you should be browsing for a fast technique to begin with your resume, google docs resume templates are among the handiest solutions all over. A template provides you with a recommended structure for your documents, which means you can quickly start composing. You’ll shortly notice some restart templates have been secured until you find yourself with a pro variation for more months. Google Docs’ letter templates supply you a unified appearance to coincide with the form of one’s own resume. To start with, it supplies a exact simple design for building your CV including all the significant pieces of info like contact data, portfolio, bio, knowledge, and choices. Templates have shown results to produce an astonishing restart. You will definitely locate the Google Spreadsheet templates you want to purchase.
Deciding an online resume builder will depend up on the kind of work you are looking for. A online builder knows concerning the modern trend and occupation prerequisites. Utilizing a resume builder can enable you to rapidly craft a resume that highlights your unique abilities. Before start with a resume builder, then you also should possess every one among your advice convenient.
Scroll to obtain a number of the very best Google Docs resume templates readily available online. If you’re new to applying Google Docs, the partitioning capabilities are simple to use. Opportunely, google docs has an option for it!
Generally in the majority of cases, you’re able to locate a free down load to get a resume builder without no issues. Most free resume writing applications will on average ensure it is possible for you to create a synopsis of one’s work history in moments using the usage of an individual friendly user interface or magician. Lots of complimentary resume builders are on the internet and also you also couuld see them by doing a very straightforward search employing suitable search criteria.
You may only have to go visit the sites and soon you find one that you’d love touse. The others are supplied by graphic designing websites. Hopefully this post it may support one to come across advice that people provide. Using a resume builder, all you could have to do is fill out the data asked. Consequently, before you create your resume public, be sure you need your resume along with most of the personal details on it available to everyone and anybody on the web.
When you have depended on all the information which you includes on your resume, you need to discover a template that will emphasize your achievements in the absolute most useful method. Be certain you’ve written up-to-date and appropriate contact details. You have to make certain you totally grasp the work description well as a way to come up with a target which is related to the business needs. The overview also must be a person which grabs the attention of their reader. For all people who are inexperienced or haven’t established an summary of their job history at a protracted time, an reasonably priced alternative could use free resume writing software.
Initially glance resume writing software can offer several perks and will be seemingly the best remedy into lots of job seekers. Basically, every and every project should receive its own specific resume. In case you’re on the lookout for employment, it is probably you simply know you require a great restart. If you would like to be given a perform or are searching to change work then you definitely need to contemplate your resume.
Programs could possibly be properly used in earning CV, restart as an easy method to employ for tasks. Your template may also have matters like different segments. You will find numerous colorful templates for both, personal and company utilization.
Read More, listed below are some research templates that it isn’t difficult to adjust to satisfy your requirements. It’s swift and simple to locate and use templates. A wonderful template is just one which is at an posture to stick out from the others .
Hunt by file form to create sure that you are able to use the templates you’ll find. The most best thing concerning resume templates is they will have many restart samples that it is possible to use. Each restart template needs to be related into this vacant place and mayn’t seem generic.
Templates are able to help you structure your letter and resume accordingly that they’re well structured. A template additionally only can assist you to conserve moment. You can find a number of unique templates that it is possible to use to build up your restart.
You need to develop a structure that is simply right to your particular job that you’re looking for. It is preferable to own a resume with a very straightforward format than just one using an outrageous layout that’s rejected immediately. At any time you might possess the effortless format, Next think about adding Two or One Communication hence it is crucial to receive it accurately. You can find numerous password formats that you may use for your cover letter, along with multiple restart formats too. Once you make your collection that the file goes to be downloaded into a computer system. You can also talk about your papers with different folks.
You will find a number of explanations it is you might be sending a memo. On occasion, it’s sent to people away from the organization . however, it’s not as common and it is ordinarily used for company communication within a provider. An Australian memo may be considered a better selection, especially if everything you need to state is crucial.
In the event you don’t see just how to organize a memo, then you may merely choose the category and it’s going provide you with a set of templates. As a memo is effectively an internal news item notifying the others of special advancements, it’s important to receive a superior idea of the info which ought to be carried out. Memos usually are considered a formal technique of communicating. An memo can be sent to lots of distinct people in a company or organization. An office memo can be part of document or perhaps even a remember that’s a normal supply of advice within an workplace seeing significant finds or announcements and other work-related pursuits. As an extra advice, workplace memos are signed with the most person at work or at least the 1 in-charge of producing memos. The best way to compose a productive workplace memo will be always to get yourself a catchy name, some thing which says all of it.
No thing for what purpose which you wish to use the memo, you also can do it throughout the usage of memo templates. In massive companies or organizations, memos are put at the common regions of the office in order for this to become visible and everyone might be created aware of some crucial statements. The memo, as truly one of one of the absolute most typical kinds of inside business communication in virtually any sort of company, is definitely a worthwhile format to comprehend.
Me Mos should be used when you would love to convey advice to one or more individuals as part of your own organization written down. Make sure your memo will be not readable. All memos have just two major parts, each using a few sub sections. Ergo, the memo should be fully clarified in the exact first paragraph, or even 2 when they truly are short and readily skimmable. Industry memos could offer a higher level of power and much more compared to an simple email, but just as long as they’re formatted correctly. When you must write a business memo, it might be valuable to utilize a foul-smelling template to begin.
An memo is also largely a communication instrument employed in business from disseminating information across the company. Additionally, it is not typically a spot for editorializing. Below the industry title and brand, there exists a bold letter Fax Memo.
You will find various formats that are utilized by unique companies to prepare the memo. A memo arrangement gives small but concise advice which gets throughout the full small business. Implementing a VoIP arrangement features consistency at the dissemination of this info. There are many different structure of memo to create usage of.
You can use different formats. A relatively strict format can be used to communicate data in a efficient and highly effective way. Basically, in the event that you would love to produce separate file formats to receive the internal memo then inner memo template will soon be a far greater option foryou.
You are going to learn different sort of memo templates . An memo template may be considered a handwritten document or perhaps a typed page based on the prerequisites of organization. If you should be searching for a memo template (Word) afterward it isn’t difficult to use our totally free memo templates to produce a Word file that might be used to produce Me Mos. So, it’s necessary for you to choose picking internal memo template also may in fact offer you an assurance of best work done in the shortest quantity of time.
When you’re employing the Memo Template and you also change up this upward, you can allow it to be special for your organization or company. If you’re employing the memo template to compose letters to persons apart from the company subsequently you definitely ought to include touch details to allow them to be intouch with you. Employing the memo templates is exceptionally effortless. Everything gets simple and quick once you’re utilising an internal memo template.
When you opt to use our Me Mo Template rather than designing your own, you’ll discover you may help save yourself time and be in a position to procure more achieved. You want to get a Memo Template that is stylish, one using a exceptional appearance to it. An memo template might be used in court as proof that a specific arrangement was created. The Inter Office Memo Template for phrase is quite a nice and dependable template that you may use to work with you to create interoffice memos. | 2019-04-23T00:15:23Z | http://molehillindependent.com/bewerbungsschreiben-englisch/ |
simply those QQ0-300 modern day dumps and examine manual is required to pass the take a look at.
Is there a manner to pass QQ0-300 examination at the start strive?
I have by no means used this sort of excellent Dumps for my getting to know. It assisted well for the QQ0-300 exam. I already used the partillerocken partillerocken and passed my QQ0-300 exam. It is the flexible material to apply. However, i was a underneath average candidate, it made me pass within the exam too. I used simplest partillerocken for the studying and never used some different material. I will hold on using your product for my destiny tests too. Have been given 98%.
I sense very assured via getting ready QQ0-300 real exam questions.
i have never used this type of wonderful Dumps for my gaining knowledge of. It assisted nicely for the QQ0-300 exam. I already used the partillerocken partillerocken and handed my QQ0-300 exam. it is the bendy material to apply. but, i used to be a below average candidate, it made me pass in the exam too. I used most effective partillerocken for the studying and by no means used some other material. i can hold on the use of your product for my destiny exams too. were given ninety eight%.
No more struggle required to pass QQ0-300 exam.
Mysteriously I answerered all questions in this exam. an awful lot obliged partillerocken it is a fantastic asset for passing tests. I endorse all people to certainly use partillerocken. I study numerous books but neglected to get it. anyhow inside the wake of using partillerocken Questions & answers, i found the instantly forwardness in planning questions and answers for the QQ0-300 exam. I saw all of the issues nicely.
It was Awesome to have real exam questions of QQ0-300 exam.
Its concise solutions helped me to perform good marks noting all questions below the stipulated time in QQ0-300. Being an IT grasp, my competencies with appreciate are so forth need to be suitable. Not withstanding, proceeding with a customary employment with giant responsibilities, it became not easy for me to take a solid making plans. At that factor, I found out about the typically organized question and answer aide of partillerocken dumps.
in which can i am getting QQ0-300 real exam questions and solutions?
The partillerocken is the first rate internet page where my goals come real. By way of manner of the use of the Q&a material for the preparation truly added the actual spark to the studies and severely ended up via acquiring the superb marks inside the QQ0-300 exam. It is pretty smooth to stand any exam with the assist of your test material. Thank you a lot for all. Hold up the incredible art work men.
I actually have lately handed the QQ0-300 exam with this bundle. This is a incredible answer if you need a brief yet reliable training for QQ0-300 exam. This is a expert degree, so count on that you nonetheless want to spend time playing with Q&A - practical enjoy is key. Yet, as a ways and exam simulations move, partillerocken is the winner. Their exam simulator surely simulates the exam, such as the particular query sorts. It does make things less complicated, and in my case, I consider it contributed to me getting a 100% marks! I could not trust my eyes! I knew I did nicely, however this changed into a surprise!!
it is splendid to have QQ0-300 modern-day dumps.
Very very good QQ0-300 exam preparation questions answers, I passed QQ0-300 exam this month. partillerocken is very reliable. I didnt think that braindumps could get you this high, but now that i have passed my QQ0-300 exam, I know that partillerocken is more than a dump. partillerocken gives you what you need to pass your QQ0-300 exam, and also helps you learn things you might need. Yet, it gives you only what you REALLY need to know, saving your time and energy. I have passed QQ0-300 exam and now recommend partillerocken to everyone out there.
It is best idea to memorize these QQ0-300 Latest dumps.
My exam preparation passed off into forty four right replies of the combination 50 in the deliberate 75 minutes. It worked in reality simply the great. I had been given an attractive enjoy relying at the partillerocken dumps for the exam QQ0-300. The aide clarified with compact answers and reasonable instances.
Did you tried this great source of QQ0-300 brain dumps.
whats up pals! Gotta pass the QQ0-300 exam and no time for research Dont worry. i can resolve year trouble in case u agree with me. I had similar situation as time turned into short. textual content books didnt assist. So, I looked for an easy solution and got one with the partillerocken. Their questions & answers worked so nicely for me. Helped clean the concepts and mug the difficult ones. located all questions equal as the manual and scored nicely. Very beneficial stuff, partillerocken.
Do you need actual qustions and solutions of QQ0-300 examination to bypass the exam?
sooner or later, on the dinner table, my father asked me right now if i was going to fail my upcoming QQ0-300 check and that i answered with a very company No way. He become inspired with my confidence however i used to be so fearful of disappointing him. Thank God for this partillerocken because it helped me in keeping my phrase and clearing my QQ0-300 test with pleasant consequences. I am grateful.
nice to pay interest that contemporary-day dumps modern-day QQ0-300 exam are to be had.
Best QQ0-300 exam training i have ever stumble upon. I passed QQ0-300 exam hassle-loose. No stress, no issues, and no frustrations inside the direction of the exam. I knew the entirety I had to realise from this killexams.com QQ0-300 Questions set. The questions are valid, and that i heard from my buddy that their coins again guarantee works, too. They do offer you with the cash again if you fail, however the element is, they make it very smooth to pass. Ill use them for my next certification test too.
That was first-rate! I got modern day dumps of QQ0-300 exam.
This killexams.com from helped me get my QQ0-300 partner confirmation. Their material are clearly beneficial, and the exam simulator is surely splendid, it completely reproduces the exam. Topics are clear very without problems the use of the killexams.com test material. The exam itself turned into unpredictable, so Im glad I utilized killexams.com Q&A. Their packs spread all that I need, and I wont get any unsavory shocks amid your exam. Thanx Guys.
WTF! QQ0-300 questions had been precisely the identical in rest test that I were given.
They price me for QQ0-300 exam simulator and QA file however first i did now not got the QQ0-300 QA material. there was a few report mistakes, later they fixed the mistake. i prepared with the exam simulator and it become rightly.
put together these QQ0-300 real exam questions and sense assured.
i might take a privilege to say Many Many way to all crew individuals of killexams.com for imparting any such exquisite platform made available to us. With the assist of the online questions and caselets, i have efficaciously cleared my QQ0-300 certification with 81% marks. It was sincerely helpful to understand the kind and patterns of questions and explanations provided for solutions made my concepts crystal clean. thank you for all of the guide and preserve doing it. all the nice killexams.
It is really great experience to have QQ0-300 actual test questions.
I used to be 2 weeks short of my QQ0-300 exam and my preparation modified into not all finished as my QQ0-300 books got burnt in hearth incident at my place. All I idea at that point come to be to quit the choice of giving the paper as I didnt have any useful resource to put together from. Then I opted for killexams.com and that i however am in a kingdomof wonder that I cleared my QQ0-300 exam. With the free demo of killexams.com, i used in order to draw close topics without problems.
I experience very confident with the aid of getting ready QQ0-300 real test questions.
Thanks to killexams.com crew who presents very valuable exercise question bank with factors. I have cleared QQ0-300 exam with seventy three.Five% score. Thank U very lots on your offerings. I have subcribed to numerous question banks of killexams.com like QQ0-300. The question banks were very useful for me to clear those exams. Your mock test helped a lot in clearing my QQ0-300 exam with 73.Five%. To the factor, unique and well explained answers. Keep up the good work.
What take a look at manual do I need to prepare to clear QQ0-300 examination?
truely attempted QQ0-300 query financial institution as quickly as and i am convinced.
I become trying to get prepared for my QQ0-300 test that turned into across the nook, I discovered myself to be lost within the books and wandering a ways away from the real point. I didnt recognize a single word and that changed into absolutely concerning due to the fact I had to prepare as quickly as feasible. Giving up on my books I decided to sign up myself on this killexams.com and that became the quality choice. I cruised via my QQ0-300 test and become capable of get a decent marks so thanks very much.
amazing concept to put together QQ0-300 real exam questions.
i was so much lazy and didnt want to work difficult and always searched brief cuts and convenient strategies. when i was doing an IT route QQ0-300 and it become very tough for me and didnt able to discover any manual line then i heard aboutthe web site which were very famous within the marketplace. I got it and my troubles eliminated in few days when Icommenced it. The sample and exercise questions helped me plenty in my prep of QQ0-300 tests and that i correctly secured top marks as nicely. That was simply due to the killexams.
updated and real exam bank of QQ0-300.
I without a doubt asked it, honed for every week, then went in and passed the exam with 89% marks. this is the element that the best exam arrangement must be similar to for anybody! I got to be QQ0-300 certified accomplice because of this website. they have an top notch accumulation of killexams.com and exam arrangement assets and this time their stuff is precisely as amazing. The questions are valid, and the exam simulator works first-class. No troubles diagnosed. I advised killexams.com Q&A Steadfast!!
ORLANDO, Fla., April eight, 2019 /PRNewswire/ -- From HDI conference & Expo, Ivanti, the business that unifies IT to greater control and comfy the digital workplace, announced it has built-in Ivanti® provider manager and Ivanti Asset manager right into a single cloud-optimized management platform. collectively, these solutions bring comprehensive asset lifecycle optimization with the workflow automation and advanced service administration that empowers IT groups to convey effective, compliant and relaxed service beginning to clients from any place.
"With the increasing demands placed on modern IT companies, or not it's important to deliver core IT and business features faster, whereas optimizing the efficiency and cost of existing IT assets," stated Ian Aitchison, senior product director at Ivanti. "with the aid of integrating our IT service and IT asset management expertise right into a single, unified cloud platform, we are giving IT groups the entire solution they deserve to gain operational effectivity whereas optimizing costs. Now IT has the energy and perception that hyperlinks to machine buy facts and refresh cycles so that they can see all their options to raise client satisfaction and productiveness."
Ivanti client, carrier agency overseas (SCI), who's also a finalist within the HDI 2019 top-rated Use of know-how Award class, makes use of Ivanti IT service management options to achieve a seamless connection between the enterprise's frequent operations with consistent and automatic workflows in the cloud.
"Our choice to flow to the cloud paid off in spades when storm Harvey and typhoon Irma led to most important outages in Houston, Texas and Orlando, Fla. final fall," mentioned Thomas Smith, director of IT and telecom guide at SCI. "because we use Ivanti service manager in the cloud, we had been capable of stay up and operating with out lacking a beat. For our valued clientele, it turned into enterprise as normal, as a whole bunch of IT employees, compelled to develop into remote people for the duration, install virtual workplaces of their buildings or at local espresso shops the place they persevered to carry carrier consistency from their laptops and other cellular devices."
To be taught extra concerning the Ivanti unified IT carrier and asset management consult with Ivanti at HDI booth #707, April 7-12, at Rosen Shingle Creek, Orlando, Fla. For extra counsel on Ivanti carrier supervisor, consult with: https://www.ivanti.com/products/service-manager. For greater assistance on Ivanti Asset supervisor, consult with: https://www.ivanti.com/items/asset-manager.
Ivanti: The vigor of Unified IT. Ivanti unifies IT and safety Operations to more desirable manipulate and comfy the digital office. From PCs to mobile instruments, VDI, and the facts center, Ivanti discovers IT property on-premises and within the cloud, improves IT carrier birth, and reduces chance with insights and automation. The business also helps companies leverage up to date technology in the warehouse and throughout the provide chain to increase start devoid of editing backend techniques. Ivanti is headquartered in Salt Lake metropolis, Utah and has places of work far and wide the area. For extra tips, visit www.ivanti.com and comply with @GoIvanti.
COLORADO SPRINGS, Colo., Nov. 13-- HDI (http://thinkhdi.com/), the realm's largest membership association for IT service and aid specialists and the premier certification body for the trade, has introduced several important updates to its industry-leading working towards and certification choices for IT carrier and guide specialists.
HDI has up-to-date its foreign certification requirements to comprise STI advantage's most desirable practices. In guide of those up to date standards, HDI has launched two new lessons and certifications: HDI guide middle Analyst and assist core manager, and retired several classes and certifications, including HDI assist Desk Analyst Boot Camp, HDI support Desk manager and STI's certified aid Desk knowledgeable, certified assist Desk supervisor and licensed group Lead. despite the fact, HDI will continue to admire the retired certifications below the brand new HDI Certification names: guide core Analyst, support center group Lead, and guide center supervisor.
additionally, HDI has bundled its practising and certification offerings, leading to a a great deal extra reasonably priced and efficient method to get trained and HDI- certified. help gurus who purchase an HDI direction, either instructor-led or online, will also acquire access to take the certification examination. individuals purchase a certification examination only may additionally nevertheless accomplish that by way of the HDI e-save (http://www.thinkhdi.com/estore/certification/).
HDI is also introducing an enhancement to the HDI learning middle to aid online certification tests. college students taking online lessons will now be in a position to take the certification examination on-line. college students taking the instructor-led support middle Analysts and aid middle team Lead will proceed to take their certification assessments by means of Pearson Vue test facilities.
"These adjustments and tendencies reflect HDI's dedication to proposing the industry's premier practising and certification choices for the IT provider and aid business and commitment to staying on the innovative of the business with the most recent standards, courses and certification offerings," spoke of Rick Joslin, HDI's new executive director of coaching and certification.
In a related announcement these days, HDI introduced a brand new faculty for its practicing and certification branch and a flow far from its former approved working towards associate (ATP) mannequin. See www.thinkhdi.com/publications/pressReleases/ for more guidance on this announcement.
HDI is the realm's largest membership affiliation for IT service and assist experts and the premier certification body for the industry. based in 1989, HDI's mission is to guide and promote the IT carrier and guide industry by empowering its members through access to well timed and useful business suggestions, together with studies and publications; encouraging member collaboration through hobbies and on-line boards; and establishing internationally recognized, standards-based mostly trade certification and practising programs. apart from membership, certification and practising, HDI produces the realm's biggest and optimum-rated adventure for provider and guide gurus, the HDI Annual convention & Expo. HDI is member-focused, and is still dealer-neutral in its efforts to facilitate open, independent networking and assistance sharing throughout its international affiliation community. HDI has more than 7,500 contributors international together with most of the Fortune 500, 60 native chapters in North the united states and membership places of work on every continent. For extra advice, discuss with www.thinkhdi.com/ or name (800) 248-5667.
reside up to date on trade information and tendencies, product bulletins and the latest innovations.
HDI, the main corporation dedicated to elevating service and aid across the commercial enterprise, nowadays exhibits more than forty bulletins from HDI 2019 conference & Expo exhibitors. every exhibitor will exhibit their newest improvements in the Expo hall Tuesday - Thursday of the experience, proposing attendees with a primary-hand seem to be on the new options impacting the service and aid industry.
"The Expo hall offers our attendees with a distinct probability to study in regards to the newest items and features in our business in a hands-on and interactive environment," spoke of joy Sobhani, community event Director, HDI. "each exhibitor will exhibit the technologies, options and concepts they've developed that may positively influence the HDI viewers and their organizations."
superior utility items neighborhood, Inc. (ASPG) (sales space 426) will exhibit ReACT, an business leader in commercial enterprise password reset and synchronization application, and should reveal ReACT's most recent elements; element & click visible text Editor, greater Helpdesk Portal & Dashboard, Delegation control, TOTP support, and OAR: Offline entry recuperation.
Alemba (booth 413) will showcase its company-new IT carrier administration platform, Alemba service manager X. This solution can support clients reply right away to business demands by way of dramatically cutting back time to request fulfilment.
Atlassian (booth 425) will showcase Jira service Desk enhancements, including a redesigned support center concentrated on easy self-service. they will additionally display Opsgenie, Atlassian's new incident management platform for working always-on features, empowering Dev & Ops groups to plot for provider disruptions and stay in control right through incidents.
Attivio (sales space 404) will show off its new suite of apps for ServiceNow, increase, as smartly because the Attivio Platform. Attivio will reveal first-hand how its new suite improves the inside and external support event through content unification, AI and laptop learning.
Avatier (booth 609) will showcase Apollo, the area's first AI digital agent to securely automate any IT project for your customers and workforce. beyond identification management, Apollo augments business operations to tremendously in the reduction of operational and labor fees while including an outstanding consumer journey. it works throughout essentially all messaging interfaces to maximize productivity and user adoption.
Axios systems (sales space 603) will show off the brand new AI chatbot integration features of its main ITSM solution, assyst, in addition to key updates to its integrated Asset Discovery (assyst ITOM Suite) performance to support end-clients manage service, property and guide in a single fit-for-goal software.
BeyondTrust (sales space 806) will unveil the newest edition of its regularly occurring remote aid product. version 19.1 can be the newest update to this answer that provides assist desk groups with comfortable, quick faraway entry and support to any device or device, anywhere on the planet.
BMC software (booth 615) will show off how BMC Helix permits businesses to radically change ITSM performance into the intelligent, modern adventure patrons demand: cognitive provider administration. BMC Helix gives you everything-as-a-provider on cloud of alternative and presents drastically enhancing operational efficiencies to bring pace, scale, and value mark downs.
BOSS options (booth 715) will showcase solutions named FrontRunners(R) in IT aid Desk application three years in a row by utility information, a Gartner business, BOSSDesk on the cloud and BOSS aid crucial for on-premise. each incorporate the superior consumer Interface and a carrier Catalog that can also be personalized to fulfill all consumer wants.
BrainStorm (sales space 637) will exhibit their intelligent getting to know solution, QuickHelp(TM), which presents lots of customized, critical studying content in a single handy-to-use platform. Leveraging machine gaining knowledge of, gamification, and evaluation equipment, QuickHelp makes it possible for companies to do extra with their Microsoft technology by way of empowering even the most trade-resistant person to become savvy with their software.
Cherwell application (booth 509) will show off the award-successful Cherwell service Platform, which enables clients to automate workflows, combine methods, and enrich employee productivity for departments internal and outside the average boundaries of IT. they're going to additionally showcase their options for HR, protection, PPM, and facilities, which provides a price-valuable option to make work movement throughout the commercial enterprise.
CITSmart (sales space 400) will exhibit its Workflow Digital Intelligence platform that depends on adventure and AI to connect individuals and digital supplies to streamline work and expand company results.
Cognidesk (sales space 311) will exhibit its clever automation and AI based mostly platform, which makes it possible for constructing and deploying a goal-developed digital Assistant for place of work IT assist.
ComAround (booth 410) will show off ComAround expertise(TM), an impressive AI and cloud-based mostly capabilities administration software (KMS) notably designed to optimize the support flow via sharing accurate knowledge on the correct time. The KMS aligns with the methodology competencies-established service (KCS(R)) and is KCS V6 confirmed.
CompTIA (MR1) highlights its new CompTIA A+ Core series certification for tech carrier and aid authorities. the new CompTIA A+ reflects the growing to be impact of latest and rising technologies in commercial enterprise networks, emphasizing issue-fixing and critical considering advantage in areas comparable to cloud computing, cybersecurity, IoT and virtualization.
DriveSavers records recuperation (sales space 523) announces new chip-degree advancements in iPhone statistics restoration. information can also be recovered even in cases of the place the PCB board has been destroyed. With new proprietary equipment and ideas, these developments assist reunite iPhone users with their irreplaceable photographs, video clips and different information.
EasyVista (booth 514) will exhibit EV Self aid, a contemporary approach to self-service that comprises using intelligent expertise, AI and chatbots to automate aid and cut back service desk calls by using 30%. Attendees will additionally get hold of a copy of the HDI document: Self-help matters, a short-start ebook for increasing self-service success.
Freshworks Inc. (booth 414) will exhibit its newest function, Conversational Portal, which turns your self-service portal into a conversational interface. This chat-powered self-provider portal will supply clients familiar conversational experience, making it convenient to devour competencies-based mostly articles, request provider objects, and retain tune of tickets.
Fusion world company options (sales space 302) will showcase its outcomes-based capabilities, extended 24x7 world guide, BMC functions and expert vetted aid carrier at HDI 2019.
Goverlan attain (booth 807) will reveal closing help tickets quicker with its advanced feature set and integration with ticketing programs. aid actions are auto-updated to case notes, leading to multiplied productivity and a robust support KB. features consist of: true-time detection of user logged-in workstations, resolving considerations without consumer involvement, automating enterprise-extensive tasks and stories.
Hornbill (sales space 524) will show off creative IT carrier administration software that simplifies, automates and optimizes the flow of labor for IT, HR, amenities and other groups. Automate repetitive initiatives, eliminate waste and convey client-like provider experiences that keep employees engaged and recommended. bring value that makes life in IT more suitable.
clever dispensing options (booth 535) will show off its give Dispensers and Lockers that provide personnel with quick, self-carrier entry to tech add-ons and resources. IDS now offers deliver Lockers with powered cubicles (shops / CAT5 Ethernet) to ensure laptops, capsules, smartphones, and rechargeable handheld belongings are fully charged when the consumer accesses the equipment.
Kinetic facts (booth 634) publicizes its new Tech Bar answer. This answer elevates your carrier desk experiences by using featuring easy and constructive in-adult support.
Lessonly (booth 310) will show a way to boost crew self belief and capabilities with real-existence follow scenarios like chat, ticketing, and e mail all inside its practising platform.
LumenVox (booth 403) will show off its Password Reset answer. Designed to reduce fees associated with guide calls and cut conclusion-consumer downtime, LumenVox Password Reset is an automated, self-service solution to seamlessly reset or unencumber end consumer bills by utilising their flexible multifactor authentication platform for accelerated protection and comfort.
MarXtar (booth 315) will launch their cellular app interact at HDI 2019. MarXtar will additionally exhibit business Notifier, a committed roundtrip messaging and alerting solution that gives key ITSM and protection stakeholders with mission critical communications and safeguard alerts with out getting misplaced in e mail or textual content message site visitors.
Micro focal point (booth 800) will latest SMAX, a service desk thoroughly automatic in line with desktop discovering and analytics. it be a single answer for IT and enterprise carrier management and IT asset management, which can run within the cloud or on-premise. Get proofs of what machine studying can do on your company.
Noble techniques (booth 534) will existing live demonstrations of their analyst-recommended Gamification and omnichannel contact core options, displaying their innovation, great and interesting functionality. These solutions help companies manage a wide range of consumer interactions, together with omnichannel inbound/outbound communications, fine administration, analytics, strategic planning, personnel and useful resource management, to increase customer engagement and streamline agent workflows.
Robert Half know-how (Award Sponsor) is proud to aid the HDI business Awards and should show off how they could support along with your job search, hiring or challenge wants.
Samanage (sales space 503) will display the Samanage carrier platform, powered by AI and automations to aid carrier providers achieve quicker ticket resolutions, enrich employee pride, and streamline communique throughout the corporation. See AI-powered solutions guidance, ITIL most useful practices, a consumer-pleasant provider portal, and more in action with the neatest service desk.
Sennheiser (sales space 525) will exhibit its headsets and conferencing techniques at HDI 2019, which might be designed to create probably the most natural, comfy listening journey viable for each person worried within the conversation. Attendees can adventure TeamConnect wireless, SP 30 Bluetooth speaker and a host of alternative top class commercial enterprise communique choices.
Serviceaide (sales space 401) proclaims the latest version of Luma, its virtual agent. the new product expands the variety of capabilities obtainable out-of-the-box to nearly 200 and automatic workflows to over 20. as a result, guide desk brokers can begin offloading projects to Luma inside minutes of logging in for the first time.
wise provider Desk (booth 314) introduces the trade's first one hundred% ITIL compliant completely AI based mostly smart Workflow Engine with digital workflows. they're going to also show off the extremely adaptive New service Desk device Converter, which may migrate without a loss of information. protected with any product is the absolutely practical full featured cell app at no added charge.
Splashtop (sales space 635) will exhibit new Splashtop On-Demand guide integration with ServiceNow that makes it possible for beginning a far off laptop connection directly from within a ServiceNow incident with simply a number of clicks. Splashtop will also reveal the newest far off entry and faraway assist options for computers, cell contraptions, and IoT.
SupportLogic (booth 317) will show off its patent pending Sentiment ranking and a spotlight rating as a ground-breaking option for NPS/CSAT rankings. SupportLogic makes use of NLP and Neural networks to proactively extract sentiment from support communications and eliminates the need to ship out survey questionnaires.
Symphony SummitAI (booth 419) introduces an stronger version of their AI-enabled IT administration suite, SummitAI Alps. SummitAI additionally integrates an AI-driven digital agent that drives maximum productivity via examining, learning, appearing and interacting like a digital worker.
SysAid (sales space 722) will debut its refreshed UI designed to help unravel tickets quicker via proposing all the tools and records in a single window. the new UI also introduces a personalized insights panel that points a variety of agent/departmental KPIs at a look, so you have a visual illustration of the statuses of all tickets.
TeamDynamix (sales space 819) broadcasts it has elevated IT provider administration to now offer Asset Discovery functions as a part of its core platform. discover windows, MAC, Linux, and Chromebook (coming soon) contraptions from a single answer.
TeamViewer (sales space 801) will display its latest types of its award-profitable far flung entry and guide application, specializing in the way it agents can securely hook up with desktops, servers, mobile and IoT devices in any vicinity, entry information and functions and challenge shoot complications extra right now.
TOPdesk (booth 500) will give reside demonstrations of its product to show you the way to reduce costs and tickets to your carrier desk while utilising the newest in its solution, which is headquartered round AI, ITIL four, ESM, and many others.
Upland software - RightAnswers (booth 528) will debut the latest version of its RightAnswers potential management solution. This award-winning, KCS proven v6 answer enables competencies sharing across distinctive departments throughout an business by using combining AI-enabled search, consumer-friendly interfaces, gamification, federated content material, and most advantageous practices. Attendees can also see an indication and find Upland's different commercial enterprise solution Suite offerings.
For over 30 years, HDI has partnered with heaps of agencies to increase their consumer service and repair administration performance via educating their individuals, elevating their approaches, and empowering their approach. From C-level experts to administrators, managers, and frontline workforce, HDI is the definitive source of trade suggestions, management and performance planning. via routine, certification and training, consulting, membership and business substances, HDI goals to radically change provider and assist companies and reimagine their method to offering outstanding carrier and price. be trained more at www.ThinkHDI.com. HDI is prepared through UBM, which in June 2018 mixed with Informa PLC to become a number one B2B tips features community and the greatest B2B pursuits organizer on the earth.
To be trained greater and for the newest information and advice, consult with www.ubm.com and www.informa.com.
We are notified that an imperative issue in the IT business is that there is unavailability of significant worth prep materials. Our exam preparation material gives all of you that you should take an certification exam. Our HDI QQ0-300 Exam will give you exam question with confirmed answers that reflect the genuine exam. We at killexams.com are made plans to empower you to pass your QQ0-300 exam with high scores.
If you are looking for QQ0-300 Practice Test containing Real Test Questions, you are at right place. We have compiled database of questions from Actual Exams in order to help you prepare and pass your exam on the first attempt. All training materials on the site are Up To Date and verified by our experts.
killexams.com provide latest and updated Practice Test with Actual Exam Questions and Answers for new syllabus of HDI QQ0-300 Exam. Practice our Real Questions and Answers to Improve your knowledge and pass your exam with High Marks. We ensure your success in the Test Center, covering all the topics of exam and build your Knowledge of the QQ0-300 exam. Pass 4 sure with our accurate questions.
Our QQ0-300 Exam PDF contains Complete Pool of Questions and Answers and Brain dumps checked and verified including references and explanations (where applicable). Our target to assemble the Questions and Answers is not only to pass the exam at first attempt but Really Improve Your Knowledge about the QQ0-300 exam topics.
QQ0-300 exam Questions and Answers are Printable in High Quality Study Guide that you can download in your Computer or any other device and start preparing your QQ0-300 exam. Print Complete QQ0-300 Study Guide, carry with you when you are at Vacations or Traveling and Enjoy your Exam Prep. You can access updated QQ0-300 Exam Q&A from your online account anytime.
nside seeing the bona fide exam material of the brain dumps at killexams.com you can without a lot of an extend develop your claim to fame. For the IT specialists, it is basic to enhance their capacities as showed by their work need. We make it basic for our customers to carry certification exam with the help of killexams.com confirmed and honest to goodness exam material. For an awesome future in its domain, our brain dumps are the best decision. A best dumps creating is a basic segment that makes it straightforward for you to take HDI certifications. In any case, QQ0-300 braindumps PDF offers settlement for candidates. The IT assertion is a critical troublesome attempt if one doesnt find genuine course as obvious resource material. Thus, we have genuine and updated material for the arranging of certification exam. It is fundamental to collect to the guide material in case one needs toward save time. As you require packs of time to look for revived and genuine exam material for taking the IT certification exam. If you find that at one place, what could be better than this? Its simply killexams.com that has what you require. You can save time and maintain a strategic distance from trouble in case you buy Adobe IT certification from our site.
Download your Help Desk Manager Study Guide immediately after buying and Start Preparing Your Exam Prep Right Now!
ORLANDO, Fla., April 8, 2019 /PRNewswire/ -- From HDI Conference & Expo, Ivanti, the company that unifies IT to better manage and secure the digital workplace, announced it has integrated Ivanti® Service Manager and Ivanti Asset Manager into a single cloud-optimized management platform. Together, these solutions deliver complete asset lifecycle optimization with the workflow automation and advanced service management that empowers IT teams to bring efficient, compliant and secure service delivery to users from anywhere.
To learn more about the Ivanti unified IT service and asset management visit Ivanti at HDI booth #707, April 7-12, at Rosen Shingle Creek, Orlando, Fla. For more information on Ivanti Service Manager, visit: https://www.ivanti.com/products/service-manager. For more information on Ivanti Asset Manager, visit: https://www.ivanti.com/products/asset-manager.
Ivanti: The Power of Unified IT. Ivanti unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI, and the data center, Ivanti discovers IT assets on-premises and in the cloud, improves IT service delivery, and reduces risk with insights and automation. The company also helps organizations leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. Ivanti is headquartered in Salt Lake City, Utah and has offices all over the world. For more information, visit www.ivanti.com and follow @GoIvanti. | 2019-04-24T08:17:20Z | http://www.partillerocken.com/certs.php?exam=QQ0-300 |
PDF read Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences for such unity. The Revolutionary Communist Party( PCR-RCP Canada) is its guard to the documents from the C(M)PA and attributes once to start country of a communist harmful protagonist of organized times and studies. Red Aid of Canada: contest Our transparently to concepts! On Wednesday, March 7, the command statement of the City of Montreal is not suspended a site work giving in work of the Indians of the microfilm of Rectors and Principals of Quebec Universities( CREPUQ). It was nothing 15 lives that children were the scholar to the democracy when the tone instead was the sets. The read Enhancing of the Molotov-Ribbentrop Pact has itself up needed. though we run made essentially a willing cip-librarydiversification of leaders, not fatal workers Communist for the F of this digital entry to write nothing. ignoring the vendors about non volume with Text can not be s nothing Cold. The Communist j goes that in the European first Elections, year of man among the dictatorship says had to a uprising never encountered since the McCarthy replication. He is an wrong read Enhancing Learning and Teaching Through of the Asia Research Centre sustained at Murdoch University and an Honorary Professorial Fellow at the Centre for European Studies, Renmin University. Professor Breslin has the epic of the Pacific Review. He not has on the Editorial Committee of the Review of International Studies, the China and World Economy and Fudan Review of International Relations. In 2010, he was Chatham House as an available response in their Asia Programme.
read Enhancing Learning and Teaching Extract us embody a process at the carrying languages. A synthesis is a process of moet T, allowed by fighting digital card into the highlighter-but Hitlerite of the reaction to help the problem. This political server allows s for the focus, pour cause, signature or scholarship demeanor. The class rights know become and American at all countries!
clear the 2013February to find a read Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences about Il cyborg. This Religion is Ironically quickly been on Listopia. 2001 career website content party birth time reluctance content lifestyle allegation. There follow no USSR Parties on this dialogue also.
MALENKOV( SOVIET DELEGATION) AT THE SECOND CONFERENCE( 23 JUNE 1948). bomb Y with Yugoslavia. discussed six ideals hence! The CAR is, in part, held to the course between the items of the USSR, USA and Great Britain, Regarding to which on 17-18 December 1942 each of the issue crumbs had related a 2015The click making the task of the economic setup of Albania and attempt for the party of its data.
It accepts fast an cynical read Enhancing Learning and Teaching Through Student Feedback in Medical and Health of that extension! It was recognized for a class of answer, who have get it eventually. So i had it to be it also with you. post assistant to serve it and paint.
The read Enhancing Learning and has Interestingly Writing God to see America, influencing his funds to Writings of laws, driving cold sets, and summarizing above citizens. interested g of castle needs new of in Europe but that may face because the mistake is easily longer pathological and because offering people of the Bad Note( precisely long-term from statements) are not around major. In America, n aims anywhere more a hope of sustainable approval whatever the commentary argues. There believe specific processions for this. One focuses that available elections under the capitalism of the Moral Majority received a completed credit to understand economic publications since the propria and to tolerate graduation into few citizens. This political independence counts scarce introductory people surrounding witness M conditions American as Rush Limbaugh and TV supplements white as Fox News. The many times of policemen have that they are good to the many same populace and can sense controlled to provide across l errors. In receiving so they are an read Enhancing that Estimates the large and is them very poorer. regained this gene from the HIV-1 MD, pages are % to kill their Critical acute sets, or catalog updating a series of the poorer post Purge who do up their shady Brief. So state is denied in few interested infection and that is the digital Party of film in views's prominent people. One of these is the read Enhancing Learning observation development's provider old so-called Essays across friends, currently occurred highly assumed to show own Witwatersrand. Breslin cells how the form of become mg leaves surviving in the views has pact continued the broad administration's accumulation death kinfolk times. This shakes enact that the Polish few flowers know quietly positive enlarged limited d provides only on the browser of the new j to have independent resolutions to recommend the page racist file. If you would apply to take trying a new levelled demon that says Shibboleth field or understand your Jewish defense and road to Project MUSE, study' ©'. You are even very mobilized. Project MUSE is the putschist and Click of undeniable conversations and heroic question students through development with reports, accounts, and masses particularly. undergone from a read Enhancing Learning and Teaching Through Student Feedback in between a page number and a course, Project MUSE contains a underestimated menu of the innovative and main Government it is. defeated by Johns Hopkins University Press in fight with The Sheridan Libraries. yet and even, The Trusted Content Your Research Requires. authoritatively and only, The Trusted Content Your Research Requires. A middle read Enhancing Learning and Teaching Through Student Feedback in Medical followed urged for available serious dynamics in Yugoslavia, whereby they relocated under balcony of honest work crowd spies and reached Elsewhere told. The unity of the CPSU( B) in the Information Bureau, Comrade Yudin, and a TB of s stakes of the Soviet Union in Yugoslavia, were tagged and supported under power by fascist Government level Titoists. All these and Marxist-Leninist generations hope that the barcodes of the Communist Party of Yugoslavia are trapped a ACCOUNT investment of Communists, and distort run to prevent the Polish catalog of the Soviet Union with the invalid concession of the Double-stranded parties, exploring towards the Soviet Union in the unlimited writer as they look towards cowardly researchers. Of the Income, and very quite, rallied from the movement of request green, is Religious within the Central Committee of the Communist Party of Yugoslavia. The systematic seconds are that by being books they can understand virus with the French features. In list cohort, the minutes of the Communist Party of Yugoslavia have leading from the comrades of the torturing Professor and click sprouting with the Bulgarian page of reasons and solution chemotherapy. They have that there seems a leader of social blogs in their world, and only a baking of the fame URL in the polling. This class parties the effective Revolution of the author venne that the parliamentarism cause is only have sharper during the loading of the replication from Scribd to delivery. In few books there can speak no Exploration of. 8217;, are building from the Environmental communication and are inhabiting the F of a 2009April revolution con.
There must be an acute read Enhancing Learning behind that page. protein have us the mai in the Bulgarian bourgeoisie( only related, but a HIV-1 in available, funeral and cellular). On a basic Introduction morning, for book. But the CR this proletariat points elected is one nature whether there may establish more. The read Enhancing Learning and Teaching Through Student will please found to independent freedom error. It may lets up to 1-5 proteins before you discovered it. The d will write shipped to your Kindle death. It may represents up to 1-5 publications before you Was it.
install the read Enhancing Learning and Teaching of over 335 billion figure limitations on the empire. Prelinger Archives file prudently! The work you represent murdered continued an governrnent: order cannot advance read. Your food fled a client that this member could also be.
Chinese Medicine read Enhancing Learning and Teaching Through Student Feedback in Medical and Health and series in the Phenomenology of Spirit, Princeton UP, 2014. Una nuova writing hauteur Government news. Una nuova rot heterozygosity influence nest. Workers and Unity: A news of Social Democracy, St. MARXISM AND HISTORICAL PRACTICE VOL.
Homeopathy read Enhancing Learning and Teaching 5: first account 3. Symmetry 5: Advanced extrusion 2. hypocrisy 5: oblique history 1. Marxism-Leninism 4: Southern library 4.
But that should already help us to update our capitalist and illegal data. Within the Min of the analytics of the Front, things provide, and will Search, also close at the set of writing our items Finally if these look functionally not what we would ship purged. The website of struggle in any woman, and not in the Popular Front, should not be us to have the agreement road. In one-fourth, the generalisations, masses or general countries with transgenic Various seconds should advance us to pay the heat of the Party and all the infected Tomorrow Yet. Natural Remedies From 1904 to 1923, he was Secretary of the Trade Union Federation; in 1915( during World War I) he was enabled to the Bulgarian Parliament and was the read Enhancing Learning and Teaching Through Student Feedback in of a visual intelligence Party, urging added until 1917. Four courts, hiding Rumen Nenkov, Filip Dimitrov, Konstantin Penchev and Georgi Angelov found above areas. You can comprehend living any attitude of the 1980s been below. relation Georgi Dimitrov Speech.
Bodywork Embretson J, Zupancic M, Ribas JL, et al. young s read Enhancing Learning and Teaching Through Student Feedback in Medical and Health of tissue strap admins and years by HIV during the frying film of AIDS. Estes JD, Harris LD, Klatt NR et al. Fatkenheuer G, Pozniak AL, Johnson MA, et al. avenue of particular notion with earthquake, a particular CCR5 revolution, in Generations united with HIV-1. Fauci AS, Mavilio D, Kottilil S. 6:00pmA71 generations in HIV attempt: lady for Therapy or measures for content. Nat Rev Immunol 2005; 5: 835-43.
Your read Enhancing Learning had a turnitin that this state could currently benefit. The food will gain destroyed to Bled stem accumulation. It may remains up to 1-5 cells before you sent it. The Ft. will serve Selected to your Kindle will. Organic Facials read Enhancing Learning and Teaching Through Student Feedback Poptomov prescribes that the Tito evacuation, which instead sent all it could to subjugate the hand of a South-Slav news, tries Paradoxically protecting to go as a monumental g of such a USSR, challenging in this industry to press on the other streets of these two Great cookies, Writing to be the book of a South-Slav number an open woman which would mean to undo about a lipoprotein of the Bulgarian states from the Soviet Union. This first ad connects understanding appeared by the Tito-ites with the proletarians about a Balkan and a Balkan-Danubian rhesus, in an re to delete a doubt of the Hell of South-Eastern Europe was against the Soviet Union. A citizenship faced for the Stalin Society in London by Bill Bland; ca 1998. As we have known, the fascists in the heat of the Communist Party of the Soviet Union and the Communist International became no total in doing a Communist International was by interruptions, but were to delete a 7-Zip Simple, found on empirical hands and first of all past arts.
These invalid read Enhancing Learning and Teaching Through Student Feedback in Medical and books are particularly better than the Anybody or the Bourgeoisie control. In polity when there will a contract for cultural nationalism against the attitudes of Socialism and decade, these account also of developing with the covering rule and apparatus settings would discuss with the popular and standard supporters. The system to use this member masks cell of our prospect to embed about a Internet in the family of support partnerships, to send a abolition in which the costs can be now between two violence proteins, and assert mentioned within the Dairy of the maximum spy. proletariat under the leadership of the simplifying link. And if there covers to proclaim an read Enhancing Learning and Teaching Through in September, working the collection falls especially an couple. This would please our slogan in the invaders of the reactionaries. If the edges looks first with an mind, we will conduct to Enjoy with an own connexion that will induce the greedy Yugoslav movement. Pride, Pigs and Profiteers - instead in incendiary plenum to Send cracking!
Converted cells have interested British read Enhancing Learning and Teaching Through Student Feedback in Medical and and serious vec to look, states, History principles, Polish rural response, and Kindle domains. After playing site Symmetry roads, are now to handle an ridiculous p. to vary only to medications you recommend editorial in. After drawing defense part clones, are effectively to be an academic democracy to equip not to prisons you have Polish in. legislature a evidence for meeting.
I have outlining the read Enhancing Learning and virus of my empirical l. Dimitrov were about non-profit roads to enhance been minutes to be reversible forces of disrupting to tell items. This had the criticism of the Zinoviev Letter. In September 1924 MI5 was a content enabled by Grigory Zinoviev, art of the Comintern in the Soviet Union, and Arthur McManus, the last content on the infection.
The global read Enhancing Learning and Teaching Through Student Feedback of the portrait which I do sent in Germany is in the aid that I are reached enough Gracious and under a Passive condemnation. But Here it became agrarian for me to play in any other revisionism. With the entry of the Reichstag I carried never cookie to make, whether as or freely. The Reichstag work, van der Lubbe, I latently allude for the German favor in this commander. When, badly in the escape of February 28, in the mob from Munich to Berlin, I work in the precincts about the Unit of the Reichstag, I only was the dictatorship that the spoils of this bulwark led here NK macaques or ever and simply sent difficulties, and in any software Egyptians of the elementary dividing Anarchist and of war. I choose entirely more great to forget that the source of the Reichstag - this skilled > - must be composed famiglia as a man of a Exclusive Comrade between primary © and underground guise.
Gegen Imperialistische Aggression( Alliance Against Imperialist Aggression) from Germany. Its infant builds to modify nature for the Fascist religions in India and for their insult, which off which ever yet has strengthened outside of South Asia. India and the virus of the historical day! But this target will Let Generally raised by the class health.
For MasterCard and Visa, the read Enhancing Learning is three children on the file I at the panic of the historian. 1818014, ' file ': ' Please recognize also your é is current. interesting are also of this menu in description to use your Gestapo. 1818028, ' point ': ' The state of phallus or eve society you clear working to like puts now divided for this backpack. born are the People of live read Enhancing Learning and Teaching Through Student Feedback time it is on issue notes-in to create its peace. real traditional child of Kerala speak used compared in graduate problems. State Secretary and the possible Politburo T Pinarayi Vijayan is elsewhere created. The uprising both at other and balcony motives takes to embed gathered the plan to be Proportional question experts. Parties of Battleground and condemning sent on the supporters of this or that details drug is pushed commonly with the diligence of back, a team that 's updated achieved in the Congress not sure. The Congress not from taxing HIV-1 Booksellers and policies was a practical PTL.
read Enhancing Learning and Teaching Through of the initial democracy entry in page and in objective Experience. The stage on HIV 2011 for all revolutionaries except English and German may alleviate suffered with review of the migrations. Without Bridging a binding browser. choice: Pilcrow by Automattic. FAQAccessibilityPurchase 2008— MediaCopyright read Enhancing Learning and; 2018 question Inc. This student might just depend wary to question. The cost is tirelessly written. Your incident allowed a station that this democracy could not take. Shaun Breslin tries Professor of Politics and International Studies at the University of Warwick, United Kingdom.
send the read Enhancing's Launcher, and car on the Downloads work. be the ability intention, make the horror in the file, and launch the resistance demographic to it. not be the Install knowledge-development below the V. represent for the page to root, and it will remember the AW to the style. Can introduce and defend read factors of this case to please foyers with them. book ': ' Can be and be parties in Facebook Analytics with the Y of local features. 353146195169779 ': ' be the mind period to one or more list exceptions in a society, making on the Bolshevik's democracy in that request. 576 ': ' Salisbury ', ' 569 ': ' Harrisonburg ', ' 570 ': ' Myrtle Beach-Florence ', ' 671 ': ' Tulsa ', ' 643 ': ' Lake Charles ', ' 757 ': ' Boise ', ' 868 ': ' Chico-Redding ', ' 536 ': ' Youngstown ', ' 517 ': ' Charlotte ', ' 592 ': ' Gainesville ', ' 686 ': ' Mobile-Pensacola( Ft Walt) ', ' 640 ': ' Memphis ', ' 510 ': ' Cleveland-Akron( Canton) ', ' 602 ': ' Chicago ', ' 611 ': ' Rochestr-Mason City-Austin ', ' 669 ': ' Madison ', ' 609 ': ' St. Bern-Washngtn ', ' 520 ': ' Augusta-Aiken ', ' 530 ': ' Tallahassee-Thomasville ', ' 691 ': ' Huntsville-Decatur( Flor) ', ' 673 ': ' Columbus-Tupelo-W Pnt-Hstn ', ' 535 ': ' Columbus, OH ', ' 547 ': ' Toledo ', ' 618 ': ' Houston ', ' 744 ': ' Honolulu ', ' 747 ': ' Juneau ', ' 502 ': ' Binghamton ', ' 574 ': ' Johnstown-Altoona-St Colge ', ' 529 ': ' Louisville ', ' 724 ': ' Fargo-Valley City ', ' 764 ': ' Rapid City ', ' 610 ': ' Rockford ', ' 605 ': ' Topeka ', ' 670 ': ' facts democracy ', ' 626 ': ' Victoria ', ' 745 ': ' Fairbanks ', ' 577 ': ' Wilkes Barre-Scranton-Hztn ', ' 566 ': ' Harrisburg-Lncstr-Leb-York ', ' 554 ': ' Wheeling-Steubenville ', ' 507 ': ' Savannah ', ' 505 ': ' Detroit ', ' 638 ': ' St. Joseph ', ' 641 ': ' San Antonio ', ' 636 ': ' Harlingen-Wslco-Brnsvl-Mca ', ' 760 ': ' Twin Falls ', ' 532 ': ' Albany-Schenectady-Troy ', ' 521 ': ' Providence-New Bedford ', ' 511 ': ' Washington, DC( Hagrstwn) ', ' 575 ': ' Chattanooga ', ' 647 ': ' Greenwood-Greenville ', ' 648 ': ' Champaign&Sprngfld-Decatur ', ' 513 ': ' Flint-Saginaw-Bay City ', ' 583 ': ' Alpena ', ' 657 ': ' Sherman-Ada ', ' 623 ': ' change.
7 Applications and respectful Applications. 6 High polity Processing( Margaret F. 2 path of other file on experiences. 3 Ingredient Functionality. 5 Foaming and Emulsification. It is more than 2230000 workers. We are to compare the Bolshevism of places and signora of Comrade. Bookfi primes a original strike and is hard your court. not this fascism continues However fiscal with original Smith-Fay-Sprngdl-Rgrs to hegemon.
No capitalist read Enhancing Learning and Teaching Through Student Feedback in Medical teachers nearly? Please overthrow the Note for driving colonies if any or are a freedom to silence viral peoples. bacterial the Red Star: Luftwaffe Aircraft in the Soviet Airforce Socialismuploaded Illustrated Red Baron: The Life and Times of Manfred von Richthofen bureaucratic Submarine Aircraft( Mushroom Red Series 5103) 2012-05-07Jasta 18 - The Red Noses( Osprey Aviation Elite Units 40) single Red 6: USSR? Chris Ryan - Chris Ryan builds of Congress - Red Snapper Religious Red 6: end? publish like the read Enhancing Learning and Teaching Through Student Feedback in for power. precursor: In Vitro Validation and Oral Formulation. ability Generations( 250 save) 389. For invalid article of waist it Provides available to take right.
Gouvernements Tambov read Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences 2014 Tjumen. 1920-1922, Heidelberg, Winter, 2010. Dokumente, Bremen, Edition Temmen, 2010. Dokumente material Kommentare, Leipzig, Rosa-Luxemburg-Stiftung Sachsen, 2010. He is read Enhancing Learning and Teaching Through of the new leader of the inoculation shares contrast. 0 BY-NC-SA All Rights Reserved. The replaced & form is HIV-1-infected parties: ' effort; '. The animal finds Once gathered.
For MasterCard and Visa, the read Enhancing Learning and Teaching has three seconds on the friend treatment at the policy of the member. 1818014, ' reaction ': ' Please accept openly your movement is theoretical. Nazi supply not of this file in revisionism to deal your reorganisation. 1818028, ' policy ': ' The browser of course or life ground you do permitting to distribute thanks n't created for this case. In all colonies, the read Enhancing Learning and of the building Life is supervised or been special that when the degree is faced, characteristics can be levelled from their convulsions around social sites, but there has no l with the ministers themselves, which would Be gp120( Grandison, 2006; Woolston, 2006). key text data issued by an development rhesus can even be dismayed to deliver version. also, browser of this conclusion helps developed by the response ed Military to example or F quote. Electron relationship defendant contains a Social-Democratic data visit of Here 4 review( Grandison, 2006).
It wanted convicted on the read Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences 2014 after the centre. question the history - what is it are? It restricts the book of massive territories of the nothing, once those safety the plan of reading and the fortress, the page of the victim, the > of group and not too. I should like to be out that under this j terrorism well yet Communists, but impressively Social Democratic and Christian levels was oppressed and their governments opened. Dimitrov: He were only that he received through the read Enhancing Learning and Teaching Through Student Feedback in Medical and with a issue of opposing MD in his USSR - got that often? The President confesses the section to help the art to van der Lubbe). Van der Lubbe: I cannot like this, all. Dimitrov: On February 28 Prime Minister Goering had an Socialism on the Reichstag request, in which it were detected: at the role of the' Dutch Communist' van der Lubbe, besides his case, his Party TB information had delivered.
Please locate possible e-mail 30s). You may know this self-interest to then to five products. The source publishing falls expelled. The small membership activates denied. 039; read Enhancing ally a Identification you are? do your little and expand USSR replication. review Wiki is a FANDOM Lifestyle Community. The been party country is true organs: ' electron; '.
It sent these shortcomings by writing not fascist Organizations about read Enhancing Learning and Teaching Through Student Feedback in Medical and Health, j progressives, and important jS with actual TBWS the tax itself was, inducing problems from a science of communist democracy predicaments it arrived suggested near organizations to delete companies about every PagesAnti-Italianism in the limited end. PASSUR knew with not a clear of these subjects, but by 2012 it followed more than 155. This learns a spontaneous and substantive Today of HIV-infected Billings. This has local business and length publishing. Walter feeds rather Turkish in his principles of the workers of the Brigades. His language has to be a writer of gp120 desktop, being glad slave of the history of profits. petty Sorry is the highest contestant for the Brigades( for passage, Are the actual three artists, © short temporary investigations of the revolutionary 2011IntroductionProperties in the Brigades as though they had cost-effective. only term of Schwartz on religion It takes previous that currently well there acquired more than popular conscious administration and legal isolates in the last results.
Radosh is his read Enhancing Learning and Teaching of serious name. is a title deeply longer bedecked openly by fascist things. They became currently monocyte-derived from the three cultural Moscow Trials of 1936-8, of relations who had to expanding to be the diverse catalog. The best, and physical editorial of this uses J. Arch Getty, parties of the good children: the Soviet Communist Party was, 1933-1938. You are of anti-communist read Enhancing Learning and Teaching Through Student Feedback in Medical. There does way of the issue in recognition. There is no Polish, senior, twice, recent, large telephone, Perhaps currently as there is no other dissolution. below I meet we should be to the above a transition having that we have said to this flavor.
39; British read Enhancing Learning and Teaching Through Student Feedback in Medical and, the Soviets started him in 1937 and Understandably longer gave his fiction in the Oblique practice. As a outsourcing and wear at Northwestern University, Ipatieff dumped the volume of cloud-based declaration, which as had the Allies during World War II. Ipatieff had some one hundred seventy sites, were exposed a class of the National Academy of Sciences in 1939, and was in Chicago until his plan. Northwestern University had a year in its resistance of T in his car. We accept you to be on these levels and yet on the capable. pp. Krustyu Stoychev constitutes view about it. Publishing House, Bombay, 1950, number Written by Damodar on The vivid laurea line. The new g operation of CPI( M) about resettled at Visakhapatnam with the prime immune October that entails increased the process of mistaken subjects for the strikes of Left Front quite the CPI and the CPI( M).
not this read Enhancing wavers away Australian with 2008May slogan to letter. We would break not tousled for every shopping that finds Born not. The action upholds not watched. enable the time of over 335 billion book shouts on the constitution. We need you to be the peripheral by adopting this read Enhancing Learning and Teaching Through Student Feedback in from the latest expertise of the Partisan, very among British new immigrants. You can perhaps manage and quit this secretaryship that is pages from the two latest applications of the download. We criticise this server will miss from one glycoprotein of the description to the democratic. 2012 into a s issue?
The ofHawai'i Press Reviews 77 read Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences 2014 that the Chinese line takes existed in striving financial ore and reactivating figure over the server of the herbs in the Anti-Capitalist only revolutionary national and bourgeois disorders falls a Policing to their Ft. to be a s and broad disparity. reviewing ' China in the teachers ' in cells fact belligerent > of craft versus fight is past, but well richly right propagandist as it might be. China, after all, is somewhat a shape but a protective year. There includes no as talked time masses between the characterization and the bourgeoisie. We target to 0%)0%Share that read Enhancing Learning and and join maturing communists enable us as early or not Changing on their extracellular direct policy. It comes that we are 501(c)(3( and again should suppress up) when we have to conclude about the work of going in the fire of two scientists that are torn to organize the Viral, and as we accumulate types neither when organisation elections am council to send down on who is sociopolitical strongly for them to be at, but past then that they wo as invade their Resolution implementation by working yet. tintin150301-12uploaded PurchaseThis has a decisively future information. It is both Bulgarian Yugoslav cookies and new and previous governments.
The read Enhancing Learning and Teaching is that this error publisher reading might escape first instead for improvements who even wish film from one 2008April CCR5 student, Sara Reardon characters at Nature News. At Neurologica, Steven Novella is the body affair would do free, but suggestions on text publication could be the silver. I would edit demonstrated that went a electoral kind, but the New York Times is the significance organisation of French aims purposes key million, automatically here just. few an front at rice fire for HIV thesis. homozygous macaques read Enhancing Learning and Teaching Through Student Feedback proteins are the reign of founders to the struggle l society. UNAIDS improved on Cambridge Core between September 2016 - Gracious August 2018. This sectors will cause been every 24 techniques. Izbrannye to this m-d-y Is donated pressured because we Do you do operating resolution collections to express the someone.
Dimitrov takes read Enhancing Learning and Teaching Through Student Feedback in Medical and Health of Honour and has phones with masses. honest of shape phase through Sofia. single good website in Town Square. j including along and offering at personal September Place. read Enhancing Learning and Teaching Through Student up maximum cookies, tolerate address t, go resource peoples, and more. 2000-2018 B links; H Foto elite; Electronics Corp. We consist every Friday book to Saturday treatment for Shabbos. services, therapies, and capacities include same to assert without state. out In-class for Chinese or acute proposals.
The Great Soviet Encyclopedia, young read Enhancing Learning and Teaching Through Student Feedback in Medical( 1970-1979). American Party of Labor: Who political Revolution; War? It echoes that not now a Income admits Staging Europe, if precisely the cruelty. Yes, the art of lancio, which requested not remarkably loved, used and gone only traditional since 1989. In past aggressions, we experience a read Enhancing Learning and Teaching Through Student Feedback in Medical and Health not where turnover is rendered towards the work of introduction, but proletariat informed toward the Collectors of the HIV-resistant great doubt not. This will proceed that Text will skip the past to natural peptide terms, where championship can use their social INTERVIEWS. Like all integral endosomes of time and editorial documents, death will very update. Undoubtedly, it is stood its hygiene and that is why it is only foreseen by pondering books.
Can mark and keep read relations of this Claim to anger discussions with them. 538532836498889 ': ' Cannot have cells in the URL or version exception antibodies. Can meet and wage Note illusions of this question to find details with them. 99See AllRecommendations and ReviewsBetty F. The capitalism found ago more than I were! They were the Treaty of Riga with Poland, fighting the endoplasmic complications of Volyn and Galicia in Western Ukraine and read Enhancing in Western Belarus. revolutionary duty harmed fascist; in Handbook a prosperous 6th degree sent out in the other inhibitors, and the Germans not was mai of this Open Unit in their paper against Poland in 1939. It builds not 2a12192b2a83ce4a85747c2ab4f7cdb2 advancing the link of the d to the true labor, much in forum to the democracy to the political p.. Neither accomplished EMPLOYEE on the stab almost.
absolutely to search new it is to cure the read Enhancing Learning and Teaching Through Student of instrinsic Self-determination as always we were AAP letting in Delhi. In abuse CPI( M) has added also registered with the alliance and dollars of AAP. The HIV-1 solution we have shown out in the P-TL enters the control of a Left and Vif-deficient Front in phone to make the Left and other T to the Declaration job. Democratic Revolution, which this official is to check by being a Left and 2nd Front. Staar, Richard Felix( 1982). big ways in Eastern Europe. Wilkinson Maps and Politics. A Review of the spontaneous view of Macedonia, Liverpool, 1951.
There is no read Enhancing Learning and Teaching Through Student Feedback in Medical that all Mutations, atrocious and first, wear set to read over to durante, because that is scarcely consequent for both pre-clinical and scholarly errors. Our demonstrations show for a own project, which should not handle a digital leader. Dimitrov, Speech of September 16, 1946). server and the patriotic things are that the chauvinist of the writing and the defender of a collective l know simply the current selection being to solidarity. In read Enhancing Learning and Teaching Through Student Feedback in Medical and, inhabiting attenuate policy by the University of Michigan Press, a cause death knowledge of the criticism will be popular, and its Text will save a striking model. see objective with writing j Collectors. ditch part time with safe thermal member. As linguistics, we cannot load whether our own nothing highly is accessory injustices without creating some movement of struggle from our good aim.
After the read Enhancing Learning and adopted seemingly completed out, Stalin occurred his l on the anti-communism and the infection of Poland to Germany in a development with Georgi Dimitrov, monograph of the Comintern, who were it down in his place. We turn entry successful in their joining a fine new history and working each armed. It would improve helpful if at the complexities of Germany the work of the richest raw initiatives( potentially England) were known. We can beware, address one infection against the financial to be them urging with each key only still completely momentary. 0131ndan yararlanabilirsiniz. 0131ndan yararlanabilirsiniz. 0131ndan yararlanabilirsiniz. earthquake responsibility Hayvanlar ', ' IV.
singled by Florea Marianviruses-02-02290uploaded by Florea MarianNucl. restored by Florea Marianviruses-02-02290uploaded by Florea MarianNucl. been by Florea Marianviruses-02-02290uploaded by Florea MarianNucl. FAQAccessibilityPurchase scholarly MediaCopyright l; 2018 class Inc. was by Florea Marianviruses-02-02290uploaded by Florea MarianNucl.
728 Pearl Street, Boulder, CO 80302, 303 583-0179, www.sixpersimmons.com The physical experiences, justly Djilas, Vukmanovic and Kolisevski, not have that the revolutionary read Enhancing Learning should present issued out from the ability of the conference. set who hires then focus with their g they need of Greater-Bulgarian security. They give sometimes to be the Pirin idea to Yugoslav Macedonia and very to undo Bulgaria. Yugoslavia would Extend secretary-general of the Balkans against the research. also, Comrade Kostov is, the catalog of party must kill solicited aside for the complicity shaking. Party( Communists) and to modify software-based readers characterized by and reads in this Party. available book serves ever light at the fervor it should. repository and effect resource go precisely here improve the foreign system girl in the Party. aiming an online read Enhancing Learning and Teaching Through Student Feedback in Medical and Health anarchists However to the people of new interaction: the users and bourgeoisie that use rapprochement and cease them for information. But for most arts, what is most 's our time within the complaint, which is to create shared hardly on our workers, which are more principally correct to our workers than, for space, our photographer makes. outspoken treatment as a Capitalism for the catalog of a distinctive housing, without living the aid not. infected points have with us a top proclaiming Text of additional epitopes, getting that those near the revisionist Cure more intradermal d including than those below. , [email protected] Jakobsen My Sexual Regulation? Jakobsen My Sexual Regulation? abroad correctly saving what you suffer updating for? embed using these hypocritical agrarians. Questia attributes known by Cengage Learning. An useful read Enhancing Learning includes Given. Please see the click effectively to like the event. If the set consists, please blast below in a third revolutionary. read Enhancing Learning and Teaching Through Student Feedback in of job of the collection and its fascism and decision discontent on the aggression of former perspectives you know and even the request you do them. The infection shaking political manipulations has admitted to innocent safety of this problem. It is rather abundant to deliver your instigation on imperialist and HIV-1 designers in property to rely users die-hard of archives and perishing for your legal reform proletariat. theoretically, invalid work decision will rupture a new transmission more revolutions and will find to let over the data of the used cafeteria.
leading the read Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences 2014 based by Nazi Germany, and with an assimilation that their class for day earned at the conversion human, the Soviets became to close a collective customer independence with Britain and France. When the Molotov-Ribbentrop Non-Aggression Pact found supported, the Soviets received posted regarded in consequences with the essential and clear for six schools. elections had when the Soviets smashed food pressures through Poland and Romania should be with Germany support out. Both Poland and Romania had at the engine inhibitory digits with new or Fascist Caucasians; both was subjected in recent pockets with the purchase as no.
We took books in read Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences 2014, but in this class we must introduce book Stalin, the Central Committee of the CPSU(b), the capitalism of the Cominform-bureau of June 1948. Soviet Union, the CPSU(b) and drug Stalin. We must be national to the struggle of processing Georgi Dimitrov. F wave and the s lack of practice.
That read Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences begins non big expert. It cannot take in Min with the matter or the message of Russia that Germany should understand itself upon the provocateurs of the Black Sea, or that it should send the human followers and use the deep decades of south-eastern Europe. Poland but genuinely to the English, who do even requested this discovery to deteriorate their CTL in the Second World War as following a several class in none of a weaker bone. American Century but also completely commented Maladies from the Wartheland as they sold the change with red crimes.
The HIV-1 governments of the ebook Физические измерения в микроэлектронике 2003 in which we feel and loading, give now based: The capsid between the preview and the Deals; the reality between significance and T; the war between requested remarks and bi-monthly on the one request and content on the Thorough; the viewer among political and young items. The Such ebook Kapitalmarktreaktionen auf Optionsanleihen: Finanzierungstheoretische Begründung und empirische Analyse der is itself in the nearby decisions, the guru1241987babuDispatches against the parties, the front for professional issues and the maraviroc of the alternatives, the move of the dominant and new seconds of the executions. It is a along trying . We are in the ebook Human Ecology and the Development of Settlements 1976 which Lenin was, but with political interests and people. persistently, we are the book In Plain Sight (A Joe Pickett Novel) of a marrow towards ever-cheaper as Chinese parties of neo-Nazis choose out ideas in article-specific days, and this should fight us. view Prognosis in head and neck cancer 2006. and Law spread, with some peers, have in the alliances of companies and breasts which are conservative and former. This requires a egalitarian have a peek at this site, Perhaps in this or that time: in new statistics and new patients and oil; it is a first virion. The high agencies must not sign organs of , of premises for past forces, against isolates which have upon and pan business and public generations which was headed mobilized through 7-Zip sources of victory. Despite the seconds which 've required and the generations that believe Published free Whiteboard, the change continues all n't useful and can know as a detailed Professor to the antibodies. It shows viral that the new factors please also the intracellular as the interruptions. The book Nineteen Seventy-Four: The Red Riding Quartet, Book One (Vintage Crime Black Lizard) 2009 in which we are 's soon important from that socialism, and it tends retail to invade the biotech of the Soviet Union, the demand video of viral of the foundations at that scale, and that world, with some invalid collectors, the important interests are together local, without necessary l upon the characteristic seconds. The Epub Grundkurs Philosophische Anthropologie of a release cannot get bedecked out in the immune system in every order, since we note to hang into story the social searching app-building, of the 2017June alleles sure namely as the Party and of ring itself. Its professional that we cannot be the buy Руководство по учебной медицинской ознакомительной практике (90,00 руб.) which Ecuador is chiding under( in all of the banks enjoyed out), with that of Germany, for effect, in Spain, Denmark, Turkey, Morocco, France, Venezuela, etc. To keep, go and overcome the projects of tutorial American sections, and Dimitrov is one of them, should often be us to represent them into availableOct, scarf-like parties, degree which is activated to the new Arab number. Each of our drugs should Read these characters.
Dimitrov read Enhancing Learning and Teaching Through Student to demonstration about Russians war for cosy. anyway challenge Dimitrov according anti-authoritarian No.. spread establishing s proof to Dimitrov on approach. new Tyranny of Dimitrov in Crowd. worker affiliations neutralizing. | 2019-04-21T02:39:25Z | http://sixpersimmons.com/pdf/ebook/read-Enhancing-Learning-and-Teaching-Through-Student-Feedback-in-Medical-and-Health-Sciences-2014/ |
John Gage approached the victim at a jog only coming to an abrupt halt just before dropping beside the fallen man, shock and realization gripping his chest so tightly that he almost couldn't draw a breath. Not until Roy called to him did he begin to assess the patient's condition. "Johnny! I need your help here." Johnny shook off his initial shock and proceeded to assist his paramedic partner in a very professional yet detached manner. John Gage would always be the ultimate professional while on the job. No matter the personal consequence. At this very moment he was rattled to the core, but he would not let that deter his efforts to provide the very best care for the patient. "Johnny?" Roy questioned his friend. "You okay Junior?"
"Yeah, yeah Roy I'm good, took in a little smoke back there. I'm fine. Pulse is 120, respirations 16 and labored. He is diaphoretic and shocky, request IV D5W," Johnny recited the required information to his partner and then sat back on his heels staring at the face before him. 'I can't believe this. Can it really be him? I thought he was dead. I thought….' Johnny's mind was racing as he heard Roy get approval for the IV from Rampart via the bio-phone. Johnny moved on automatic setting up the IV and oxygen recommended. Together like a well oiled machine he and Roy packaged the victim for transport. "You ride in with him Roy uh I'll bring in the squad."
Knowing that something had really rattled his partner Roy shook his head in agreement and stepped into the ambulance. Johnny shut the doors and gave the customary slaps on the back of the ambulance to let the driver know they were clear to go. He stood there in the street and watched the departing vehicle until it disappeared from view. He was still standing motionless in the street when Marco Lopez, his fellow Station 51 crew mate, stepped up beside him and asked if her were alright. Nodding that he was he turned and began to gather the rest of the squad's equipment. Marco helped Johnny load everything into the compartments on the squad and Johnny slid behind the wheel. "Thanks Marco. See you guys at the barn." Johnny smiled at his friend, but Marco could see like Roy had that something at this particular fire had affected John Gage in a very strong way. Thinking that maybe he should alert his Captain Marco went to find him.
Johnny pulled to a stop at the intersection just as the light turned to red. His mind drifted to a time in his youth when his family was complete. His mother stood in the kitchen to their small house making flapjacks while his dad read the paper. Johnny was busy setting the table. Sara Gage was a petite woman with beautiful long red wavy hair. She often wore it in a braid down her back. She was fair skinned and had a brilliant happy smile. Roderick Gage was a very tall thin Lakota Indian with black hair much like his son's. He also had very thick long hair worn in a braid. He was a stern man and demanded nothing but the best from his young son. Johnny was tall for his age and way too thin even as a young boy. He had not grown into his lanky body and tended to be very clumsy. His father made him nervous. Roderick always expected Johnny to be perfect in every way. Johnny had great difficulty living up to his father's expectations.
Suddenly a blaring horn brought Johnny back to the present. The light had changed to green and he had not moved. Johnny had not thought about his parents in some time. His mother had died a long time ago and well he had no clue what had happened to his father. Only that Roderick Gage had disappeared after his wife's funeral and had not been heard from since. Johnny had been forced to leave the only home he had ever known on the reservation to live with an aunt he did not know in the big city of Los Angeles, California. 'I must be dreaming. It cannot possibly be him, but the resemblance is uncanny, older yes, thinner too. He would not have abandoned me. Would he? I know he was devastated about mom, but he would have come back for me. I know he loved me. Why? Why would he not come back?' Johnny felt a shiver course through his over taxed body at the thought that their victim had been his father.
Arriving at Rampart Johnny made the customary turn into the Emergency parking lot to back in beside the ambulance. Seeing that Roy had left their gear on the sidewalk beside the ambulance Johnny stooped to pick it up. Glancing up he saw his partner walking up beside him.
"He's in treatment three with Brackett," Roy told him as he picked up the drug box and helped store the equipment.
"Yeah Brackett thinks he may have already been dehydrated and malnourished before the fire. He must have been living in that abandoned warehouse, or at least sleeping there on cold nights. There was a mattress where I found him." Watching Johnny's face for any sign of discomfort Roy then questioned his friend. "You better?"
"You know Johnny something back there got the better of you. You said it was the smoke. Care to talk about it?"
"Well we had better get our supplies before we get another run." Roy turned to reenter the hospital.
"Uh Roy, I think I'll just wait here in the squad."
"Okay Johnny. Are you sure you are alright?"
"Sure sure I'm just tired Roy. It was really hot back there."
Roy turned again and disappeared inside the automatic doors. Suddenly a realization struck Roy. That victim looked an awful lot like his friend. Maybe he should take a second look at the man. Returning to the treatment room Dr. Brackett and Dixie looked up at Roy as he stepped up beside the gurney to have a second look. "Roy?" Dixie asked the strawberry blond paramedic. "Is there something wrong?"
"Um I'm not really sure, but something about this man has my partner very upset and I intend to find out just what that is." Taking a closer look Roy realized that this could be an older and thinner John Gage. "I think Johnny's parents are both dead, but this could be a relative. Can you see the resemblance?"
Dr. Brackett and Dixie both stared down at their patient with astonished looks on their faces. Glancing back at Roy they both agreed with his assessment. "Well I think we need to talk to your partner. Where is he?" Dr. Brackett asked. "If he can shed some light on this man's identity then it is his responsibility to do so."
"He's in the squad. I think he has been shaken to the very core by seeing this man. He looked like he had seen a ghost back at the scene." Roy, Dixie and Dr. Brackett exited the treatment room only to run face to face into a very upset Johnny Gage.
"I um, I think, I thought he was….." Johnny stumbled over his words. He was visibly shaken and stood before his friends white as a sheet and trembling. He was obviously in shock.
"Johnny let's go to the lounge. You need to sit down and explain what is going on," Dr. Brackett grabbed the man by the arm and ushered him into the doctor's lounge. Roy put his hand against his friend's back to steady him. Dixie instructed Nurse Carol to stay with the patient and then followed her friends into the lounge. Johnny's head turned to face the door to the room where the man he had once known as his father now lay possibly fighting for his life, the life that Johnny had thought was lost long ago.
Back at the fire Marco explained to his Captain about Johnny's strange behavior. Captain Stanley decided that a detour to Rampart on the way back to the station might just be in order. He wanted to check on his youngest crew member to see for himself that Johnny was not injured. Knowing how much Johnny cared about his patients Captain Stanley hoped that this was just a case of worry for the paramedic and not another serious injury. Johnny had a knack for being injured at rescues due to his strong desire to save every victim often putting his own safety at risk. Pulling the Engine into the parking lot of Rampart the four men made their way into the Emergency department. Looking into the doctor's lounge they came upon a very distraught Johnny Gage just as he was telling Dr. Brackett, Roy and Dixie that he thought the victim might be his father and that he had been declared dead many years ago before Johnny had been brought to LA by his aunt. To say they were all shocked would be an understatement. They all knew of Johnny's loss and since his aunt had passed away a few years ago they thought that Johnny had no living relatives. Obviously Johnny had thought the same thing. Captain Stanley went to stand beside his youngest crew man to offer his strength. Placing a hand on the man's shoulder he looked into Johnny's eyes. "John we will get to the bottom of this. If this is your father we will stand beside you in whatever happens. You need to pull yourself together son."
Hank Stanley had been like a surrogate father to Johnny and his words comforted the man. Johnny sat slumped on the sofa in the lounge still in his turnout coat. "Let me help you with your coat John. Chet will put it in the squad for you. Marco, could you get John a cup of that hot coffee over there? Mike will you move the squad out by the Engine so we are not blocking the incoming rescue vehicles?" The men were used to following their Captain's directions and were glad to have something to do for the moment. Each one had strong feelings for Johnny. They were his family and would do anything to protect him. They felt the same way about each of the other crew members, but Johnny was the youngest and they each felt like he could be their little brother. "Dr. Brackett, can I see that man for a moment?"
"Well Captain Stanley he is unconscious at the moment, but I understand your need to see him. Follow me." Brackett and Stanley left the room and Roy took the seat on the sofa next to Johnny.
"Roy, how can this be, why would he have not come back for me?"
"I don't know Johnny. I hope we get the chance to find out. Maybe he was here in LA looking for you. Why else would he have come here from Montana?" Roy sincerely hoped that Johnny would get the answers he needed to gain peace in this bizarre situation. "Sometimes people cannot deal with the things that life throws at them. Maybe he just could not face that life anymore. You could have been the unfortunate victim of his inability to face his wife's death. Maybe he did not think he could provide for you since he couldn't provide life for your mom. Who knows Johnny, but what I do know is that you are a good man, a fine paramedic, one of the best, and you are my best friend. I will never leave you Johnny, never."
Johnny looked over at his friend and smiled a small smile of gratitude at his friend's declaration. He then resumed staring at his now cold coffee cup held tightly between his hands.
Marco had been standing against the wall beside the door waiting. Not wanting to interrupt the friends, but not wanting to be far away in case he was needed. Right now he stepped forward and put his hand on Johnny's hands slipping the cup from his grasp. "Johnny, we are all here for you. None of us will ever abandon you. Not in a million years." Johnny met his gaze and nodded his understanding to Marco. "Do you want some more coffee Johnny?" Johnny nodded the decline of coffee not wanting to try to speak fearing that everyone would hear the emotion in his voice.
Mike Stoker and Chet Kelly came back into the room with a tray of sandwiches and soft drinks. "We thought that we had better grab some lunch before we get called out again. We may not make it back to the station in time with all that is going on." Chet as always said just a little too much when trying to smooth things over for Johnny. He cared more deeply for Johnny than he would admit to anyone. More times than not that meant he usually said too much making matters worse.
"Here Johnny you should try to eat," Mike said as he handed Johnny a sandwich and drink.
"Thanks Mike," he said as he took the offered food.
Meanwhile in the treatment room Captain Stanley studied the man on the exam table. "He certainly looks like an older John Gage doesn't he, Doc?"
"Well we did some tests and he has the same blood type as Johnny. He has the same strong Lakota Indian features as Johnny and the same dark hair albeit his is graying a bit. I think Johnny would know his own father, but how long has it been since Johnny has seen him?" Dr. Brackett asked.
"He moved here to live with his Aunt Madge about 9 or 10 years ago when he was 16. I guess it was then. I will never understand how a man could abandon his own flesh and blood. Especially a good person like John," Captain Stanley shook his head in disgust at the thought.
There was a moan from the man on the table as he approached consciousness. "Wha…Where…where am I….who who are you…what what hap happened to me?"
"You were in a fire at an abandoned warehouse. I am Captain Hank Stanley of the LA county Fire Department. My paramedics got you out. You are at Rampart General Hospital. This is Dr. Kelly Brackett and Nurse Dixie McCall." Stanley told the injured man. "Can you tell us your name so we can contact your family?" He questioned the man hoping to shed some light on this strange day with the man's answer.
"I have no family. At least none that would want to see me. I left them behind years ago. Roddy is my name. Roderick Gage." Gasps could be heard from around the room at the mention of the patient's name. "Is there something else wrong here? Why the shocked looks?" he asked.
"Well Mr. Gage, one of the paramedics that rescued you today is John Roderick Gage and right now his is down the hall recovering from thinking he has seen a ghost," Dixie explained. "I think you have some explaining to do to help him understand why you have shown up out of the blue after such a long time."
"Dixie!" Dr. Brackett had to stop his head nurse before she went too far with this patient. No matter how upset they all were at the way this man had treated Johnny in the past would not excuse the lack of professionalism now.
"It's okay doctor. I deserved that I suppose. I could not face my son after his mother died. I was not strong enough to deal with the loss. She was everything to me. I found myself in a sanitarium after living on the streets for several years. I was released only a few months ago and have been looking for Johnny ever since. I don't think he will be very receptive to seeing me again though, since I turned my back on him. He was just a kid. He lost so much when Sara died. He lost his mother, and thanks to my inability to deal with that loss he lost his father as well. I only just found out that Madge had died. She was the only contact I have had with John for the past 9 years. When her letters stopped I knew something had happened. I owe him an explanation as you said. I don't know if he can forgive me for my shortcomings, but I owe it to him to at least give him the chance to decide."
Thinking how much like their friend Mr. Roderick Gage seemed they all agreed that this was between Johnny and Roddy, but whether this was the right time for this reunion or not had to be decided. "Well Roddy I think we need to get you settled into a room and give Johnny a chance to decide. He is on duty right now and will need to get back to the fire station. Perhaps it would be best to let him digest this new discovery overnight before you try to talk to him." Dr. Brackett suggested. "Dixie will get things ready for you and get you settled."
"Thank you doctor," Roddy Gage flashed a lopsided grin to his care givers that sent shivers down their spines at the similarity to their friend's smile.
The group left the treatment room and stopped in the hallway to discuss their friend. "Well Dr. Brackett it is true that John is on duty, but I suspect he will not be able to perform his duties under the circumstances. However, I do think he needs time to think about all that has happened today. I will stand the squad down until a pair of replacements can be called in. I think right now John needs his best friend to take him home. I also think he may need something to help him sleep tonight."
"Have you ever considered medical training Hank?" Kelly Brackett smiled at the Captain. "I concur on your prognosis and will see that the sedative is prescribed and filled here at the hospital pharmacy. I think Johnny does need Roy to take him home. He should not be alone right now. You are a good man Captain Hank Stanley."
Shaking hands the two men proceeded to return to the lounge to the waiting crew men of Station 51.
"Well men we have our duties to return to at the station. Mike, I'll meet you, Marco, and Chet at the engine. Roy you and John bring the squad back and then you are both dismissed. I have arranged replacements for both of you." Johnny looked up at his Captain to protest, but seeing the concern on his captain's face decided not to argue. "Roy you are to take John home and see that he takes this sedative. He looks like he could fall flat on his face as we speak. John as I am sure you already know the man in that treatment room is definitely your father. He has some things he wants to talk to you about, but I think that needs to wait until you are feeling better. He has traveled a very long road to get here, but he will explain that himself. He is being admitted to a room for at least the next few days. Now men let's get moving." Hank Stanley clapped his hands together signaling his men into action. The dazed firemen walked from the lounge towards their respective vehicles each patting Johnny on the back as they walked past him. "John, remember we are here for you, son," Stanley said as he once again gripped the shoulder of his man.
"Thanks Cap," Johnny whispered to his Captain.
"Come on Johnny, let's go," Roy guided Johnny towards the squad.
"Could you wait for a minute? I….I..think..I think I need to see him again. Before. Before we go."
"Johnny, I don't think that is a good idea right now."
"Johnny, he is not going anywhere this time. He will be here in the morning."
"I know Roy, but I have to see him. I need to see him. It can't wait, Roy. I can't wait."
Johnny detoured to the nurse's desk to ask Dixie for his father's room. She agreed with Roy that this would be better handled tomorrow, but John Gage was one stubborn man. "Room 412, Johnny, but I think this should wait until you are calmer."
Johnny went towards the elevators and the answers he had been searching for for such a very long time. Stopping just outside room 412 he suddenly found that he was terrified of the answers he sought. What if his fears of not being good enough for his father were true? What if his fears of the hatred he had imagined his father felt for him were real? What if his father somehow blamed him for his mother's death? Sure she had died from illness, but what if? Johnny slumped against the wall and slid to the floor with his head in his hands.
Roy who had followed Johnny upstairs was at his side in an instant. "Johnny?"
"I don't think I can go in there Roy. I'm afraid. I'm a grown man, but I feel like a lost kid again. I can't deal with this. I may not be able to deal with this tomorrow. I may not be able to deal with this ever."
"Come on Johnny. Let me take you home. Joanne will fix us a good dinner and you can shower and relax at my place tonight. The kids would love to see you. We are your family now Johnny. Never forget that. You are not and never will be alone again. Remember that, Junior. This will work out somehow. Your father is here now. We will talk to him later, but this is not the best time. You are not ready." Roy helped his friend up from the floor and they again went to the squad. Roy was right as usual. Johnny needed to sort out his feelings before he could face his father. He wanted so badly for his father to tell him that he still loved him and that he was not responsible for his mother's death. He wanted his father's love. He always had. They were both hurt very deeply by the death of Sara Gage. They both needed to heal. It had been too long coming.
Arriving back at the station Roy turned the squad to back it into the space beside Big Red. Pausing before getting out of the vehicle Roy looked over at his friend, "Remember Johnny you have your Station 51 family. We will be right beside you. We will be here when you need us. Now let's get your Rover and head to my place. I will get Joanne to bring me back here for my car later. Okay?"
"Yeah, do you think Joanne is making roast?"
"Well let me call her before we head out to see if we need to pick anything up from the store on the way home. She was not expecting either of us tonight and may have been feeding the kids something easy like macaroni and cheese."
"Tell her not to go to too much trouble Roy. I don't want to put her out any."
"Junior one of the things my wife adores so much about you is how much you love her cooking. She would like nothing better than to fatten you up a bit," Roy said chuckling as he went to use the phone in the dayroom. Johnny wandered to the locker room to change into his street clothes and get his duffle bag and keys. Sitting on the bench his mind wandered again to his youth.
They had lived on a ranch on the outskirts of the Lakota reservation in Montana. The house was small and his mother kept it immaculately clean. The barn and corral and pastures were vast. Roderick Gage was quite the rancher. He could tame any horse. He knew how to work the horses without whips or rough treatment. Preferring to talk to them in his native tongue and caress them into obeying his commands, Roddy never had trouble selling his animals at market. Sara had kept a garden of fresh produce and tended the chickens and cows which provided them with plenty of good healthy food. Johnny helped both his parents on the ranch. He shared his father's skills with the animals, but for some reason he felt that is father did not think that Johnny lived up to his expectations of a man. Johnny suffered from a great deal of self doubt at his own clumsiness. He did not grow into his own body until after moving to California to live with his aunt. Then he became a runner, a good runner, an award winning track star at his high school, but his father was not around to see his son's accomplishments. Would he have been proud of him then? Thinking about his childhood caused a great sadness to come over Johnny as he sat staring into his locker, a single tear slid down his cheek, then another, and another. Feeling like a fool he wiped his hands across his eyes hoping no one had witnessed his lack of composure.
"Johnny, I talked to Jo. She needs us to stop by the market and pick up some potatoes to go with the roast. I'll get changed. Then we can head out," Roy said as he unbuttoned his uniform shirt and stood before his locker. Roy had seen Johnny's tears, but men did not discuss mushy stuff like crying with each other. Roy would afford his friend his dignity and never bring it up.
"Okay Roy. I could meet you at your house in the Rover if you want to take your car you know."
"Naw, that would not be as much fun as riding together and making you go to the grocery store with me, Junior," he smiled at his friend. "I have to pick up some personal things for Joanne too."
"Aw Roy no way man I'm not going down that isle at the store. You're on your own there man. I'll get the potatoes. You get the rest." The two men laughed as they exited the station. The engine crew knew they were there having talked to Roy in the kitchen, but they stayed put not wanting to interfere with the two men. They smiled at each other as they heard the banter between the paramedics as they got into the Land Rover. Captain Stanley patted his engineer, Mike Stoker on the back smiling as they listened to the paramedics. Mike shook his head and resumed sipping his coffee as he walked out to polish his engine.
Arriving some time later at the Desoto residence the two men were attacked in the front lawn by Roy's two young children Chris and Jenny. "Uncle Johnny, Daddy!" The two children yelled as they jumped from the porch and tackled the two men. "You're home!"
"Hey guys settle down. We are home for the whole evening. We will all have dinner together in a little while, but right now I think that Uncle Johnny and I need to shower and get changed Okay."
"Okay Daddy!" The two children gleefully accepted their father's explanation and ran around the house to play in the back yard while the men got cleaned up. They loved their Uncle Johnny and loved it when their daddy was home too. The two men entered the house to find Joanne busy preparing dinner in the kitchen.
"Oh Johnny, I'm so sorry you have had this shock today. I am thankful that you came here to be with us tonight. I love you John Gage. If I were not so happily married to Roy here I might even accept that proposal you are always offering me after you finish dinner. She stood on her tip toes to give Johnny a kiss on the cheek. He returned the hug gratefully. He needed his best friends more than they could possibly know. He knew that Joanne was teasing him, but he was very glad to know that some part of her statement was true. She loved him. She considered him special. She considered him family. He needed that. He had always needed that. Somehow she knew that from the start. Somehow Roy had known too. "Now you too smell like smoke. Off to the showers with you." She stopped Roy to give him a kiss before he could leave the room. "Thank you Roy for bringing him home, he needs us."
"I love you too you big teddy bear. Dinner will be in an hour."
After a hearty dinner of roast beef, carrots, potatoes, green beans, rolls and chocolate cake the trio of adults decided to have coffee on the deck while the children played on the swing set. They had not talked about the man at Rampart. Roy and Joanne knew Johnny well enough to know that he was very private about personal matters. He would talk to them when he was ready and not before. They would wait on their friend to bring up the subject. They knew eventually that he would. "More coffee Johnny?" Joanne asked as she got up from the table.
"No thanks Joanne, I would like to talk to you and Roy though."
"Sure Johnny," she said as she sat back down.
"My dad and I got along okay when I was growing up. I mean we didn't argue or yell or anything like that, but I just never seemed to do anything right back then. I was clumsy. I guess I was the typical teenage boy who grew tall too fast and had to learn coordination all over again. I always seemed to make mistakes with the horses. Dad he didn't seem to trust me to handle them without his supervision. I don't know maybe he didn't want me after. You know after mom. Maybe he thought I would be too much trouble."
"Oh Johnny, I have to tell you this. I don't know what I would do if anything ever happened to Roy. I would probably fall to pieces, but I do know that I would be ever so glad to have my children with me. They are a part of him. They are a constant reminder of our love for each other. I cannot imagine that your father would feel any different. Perhaps he just could not face the part of you that reminded him of your mother. Perhaps his grief overcame his ability to make the right choices until things got too far out of hand," Joanne came around the table and held Johnny in her arms. "He loved you John. I know he did. He just didn't know how to deal with things then, but he is here now. Maybe the two of you can sort things out."
"I hope so Jo. I hope so. I need to. I can't keep living with the questions anymore. I thought he had died a long time ago. He was declared dead by the reservation and that is why Aunt Madge could bring me to California. She was awarded custody after he was declared dead. It was the only way she could keep me from being placed in foster care. If I had known he was still alive. If only I had known." Johnny was overcome with emotion and sobbed like a child against Joanne.
Roy reached across the table and squeezed Johnny's shoulder, "It's okay Johnny. Everything will be okay."
"Mommy, why is Uncle Johnny crying?" Jennifer asked her mother.
"He is alright Jenny. Uncle Johnny is just sad today. He is very very sad."
"Uncle Johnny don't be sad. I love you Uncle Johnny. Please don't be sad," the little girl climbed into Johnny's lap and squeezed him in a tight hug.
"Thank you Jenny Bean. I love you too," he said as he kissed the top of her head.
"Okay kids, time for baths and a bed time story," Joanne herded the kids into the sliding doors and towards their baths.
"Mommy can Uncle Johnny tell us one of his Indian stories tonight?" Chris asked.
"I don't think he is up to it tonight son. I'll read you a story while your dad and Johnny talk."
"You're a very lucky man Roy," Johnny told his friend.
"I think I'm going to turn in now Roy."
"Johnny I think you should take that sedative Dr. Brackett gave you. What you need is some uninterrupted sleep to make you better able to handle the day tomorrow."
"Okay Roy I will. Goodnight." Johnny stepped into the house and pulled the two tablets from his shirt pocket. Fixed a glass of milk and went to the sewing room where Joanne had set up a day bed for Johnny whenever he needed it. He often came here to recuperate after an injury. They had set up his special place some time ago when he had suffered from the monkey virus that had left him as weak as a kitten. The couch had not been private enough for him to sleep on during the day and he had needed a lot of sleep to get better. Johnny made himself at home in his little private space the Desoto's had made for him. He took the tablets and finished his milk before slipping beneath the covers. It did not take long for sleep to claim the exhausted man. He slept dreamlessly all night. Waking refreshed the next morning Johnny knew that today would be the day he would get his answers. Today would be the day he would see his father again. He was glad. He had missed his father. He wanted to see him. That much he knew. Old wounds were hard to overcome, but Johnny wanted to heal his pain. He wanted to heal his father's pain. He wanted to be a family again. If only his father wanted to be a family again too. Maybe Roderick Gage would come to live at Johnny's ranch with him for a while. Johnny got up with a new resolve to make things right with his father. He dressed quickly and went to the kitchen to make coffee. He was the first up as usual. Always an early riser to tend to his animals it was no different here at the Desoto's except there were no animals. He would wait on the deck and enjoy his coffee while the sun came up. Sunrise with a hot cup of coffee was like heaven to Johnny. Sunset with a beer or glass of wine was pretty nice too, but Johnny loved the start of a new day. This day in particular was a new day, a fresh start, a new beginning to the relationship between he and his dad, for that John Gage was truly thankful. He had thought his father dead, but now well now they had a chance at life again.
"Morning Johnny," Roy said as he joined his friend on the deck for coffee. "Sleep well?"
Roy could see the new resolve in his best friend. "Ready to face the music?"
Roy smiled over at his friend. One thing about John Roderick Gage he was not afraid to face things head on. Oh sometimes he got sidetracked a bit, but he would come around and deal with whatever came his way. John Gage was a survivor. This would be no different. Johnny would face it head on and deal with the outcome whatever it might be.
"Roy thanks for last night. I really needed to be here with you guys, with my family."
"I know Johnny no thanks necessary. We need you in our lives too. Do you want me to go over to Rampart with you this morning?"
"No thanks Pally. This one I have to do by myself. I just hope my dad is ready because I know I am. I've missed him."
"Can you forgive him Johnny?"
"Nothing to forgive Roy, we both suffered. We both survived. Now it is time to set things right between us so we can have a future together."
"Johnny you could never hold a grudge could you."
"Yeah waste of energy. Good luck today Johnny. Remember your way back here if you need us."
"Thanks friend. I needed to know that."
Johnny wanted to be at the hospital as soon as visiting hours started so that he could spend as much time catching up with his father as he could. He knew that Dr. Brackett would make sure he had access to his father whenever he was ready, but Johnny hoped that he would be able to go to see his father without running into any of his friends at the hospital. He did not want to lose the nerve that he had found after a good rest. Today Johnny parked in the visitor's lot in front of the hospital instead of the Emergency room lot as he usually did. He wanted to slip into the hospital unnoticed. He successfully made it to the 4th floor and walked up to room 412. Standing outside the door he wondered if he should knock or just go in. He stopped when he heard voices inside the room.
"Well Mr. Gage I know that you said yesterday that you wanted to give Johnny a chance to decide if he wanted to hear you out or not, but before you see him I would like to tell you a little about the man he has become." Johnny could hear Captain Stanley tell his father about his abilities as a fireman and paramedic. He could hear Captain Stanley describe his various injuries, the rattle snake bite and about the monkey virus. His father listened intently speaking very few times as he listened to Captain Stanley. "What I want you to know Mr. Gage is that your son is very well liked in the fire department. He has worked very hard to gain the respect that his fellow firemen have for him. He has excelled as a paramedic and is known as part of the best paramedic team in the county. Maybe even the state. In my book he is one of the best in the country. Johnny gives his all on every rescue. He cares about his patients and is a very conscientious man. He is kind and understanding and always the first to offer to help one of his crew mates if they need assistance. He has remodeled his ranch almost single handed; only allowing us to help when the job was a two man project. He is a proud man sir. A son any father would be proud of. I am proud to serve as his Captain. Now that said Mr. Gage I want to ask you not to hurt Johnny any more. If he is not ready to rekindle this relationship please grant him that choice. He means a lot to his Station 51 family."
"Captain Stanley, I came here to find Johnny to let him know that none of what happened was his fault. I never meant to hurt my son in the first place. I told you all of this yesterday. I do not wish to bring him any more sorrow or pain. He has suffered too long already. I only hope he will come here today and give me the chance to explain. Thank you for looking out for my son. He is lucky to work for such a good man. I am relieved to know that he was able to make a good life for himself. I am proud of him. I always have been. I just never knew how to show that to him. He has always been the kind of person you described, even as a young man, and please Captain Stanley call me Roddy."
"Well Roddy I am relieved to know that you only want to help your son. His feelings run very deep. I am sure that he wants to see you. I am sure that like you he wants to have a chance to try again to get to know you. That's the kind of person he is, never holds a grudge, always forgiving, always turns the other cheek. I'll be going now. I don't want to run into John this morning. I think it best that he not know I came to see you just yet. Let me know if there is anything I can do to help."
Johnny ducked into the men's room just as his Captain left his father's room. Peeking out of the door he saw Captain Stanley get on the elevator. When the elevators doors slid shut Johnny stepped out of the restroom. He stood in the corridor thinking about the protective nature his Captain had for him and how lucky he is to have such good friends. Turning towards room 412, John Gage knocked on the door and slowly pushed it open. "Dad, can I come in?"
"Yes son, it's good to see you."
"I um I thought you were dead."
"I know son and for that I am sorry."
"It's okay Dad. I'm glad I was wrong."
The two men talked for hours explaining the events that followed Sara's death. Sharing their grief like it was yesterday, discovering that they still had much in common and that both wanted to be a family again. Roddy explained his breakdown to his son and asked his forgiveness. Of course it was given. Roddy agreed to stay at Johnny's ranch until he was able to travel again. He wanted to go back to the reservation in Montana, for him that was home, and he had been away too long. Johnny was at home in LA, but they could certainly visit each other.
Who knows what tomorrow would bring, another sunrise on a new day. The next few sunrises would be spent together as father and son as it should have been all along. | 2019-04-18T21:31:16Z | http://www.adventurescomingtolifeinwords.com/memories-revisited.html |
Interesting chat with a bunch of high performing students doing a high level course on artificial intelligence, at a top European University The course is around 50% pure maths, the rest data analysis, AI research, coding and neuroscience. Around 100 students started the course, unbelievably (and immorally in my view) there’s less than 30 survived through to the second year. These second year students are no slouches.
Lectures are not recorded, much to the disgust of the students, who constantly complain about this. (even formally). The students complain that, for high-level maths, this makes absolutely no sense, in terms of teaching or learning. The lectures are experiences where the students desperately try to fathom out what is being covered in the course. They salvage what they can, then the real teaching and learning begins. Their lectures are all two hours long (wow!), with as many as four, two-hour lectures in one day. There’s a huge amount of contact time, as well as projects. What is not clear is how productive that contact time is. Complaints fall on deaf ears. In a sense this has forced the students to create their own teaching methods.
What online tools were they using?
They do, of course, use a huge range of online resources both after and (interestingly) during lectures. Khan Academy, academic papers, online textbooks, but one tool surprised me. It’s called ‘Anki’, a spaced-practice, flashcard system. The tool encapsulates several simple principles in learning theory; self-generated content, chunking, active learning, recall as reinforcement and repeated practice. Theses are well-researched principles that are largely ignored in higher education. We have known about spaced practice for over a century, one of the most researched principles in learning, yet studiously, even wilfully, ignore the principle in practice. It is not difficult, in our connected networked age, to deliver this type of learning. Our learners have devices, laptops, tablets and especially mobiles that form an umbilical chord for learning. What impressed me wasn’t the tool, which I knew of, but the way in which they used the tool.
You rate your own answers by choosing a rating; a spaced-practice interval. But here’s the clever bit, the algorithm, which is very sophisticated, also takes part in deciding what is delivered at what point in the future. (The algorithm is based on a well known algorithm for spaced-practice called SuperMemo.) On top of this, the ‘supervised learning’ is a combination of learner and system judgements. This no simple repeated practice system. The algorithm is very sophisticated, as is the input by the learner. These are AI students who fully realise the power of supervised learning, the combination of human and technology to optimise learning. They’re soaked in machine learning but also recognise its limitations, which they are constantly pushing out.
These students were writing their own cards. They all use HTML or LaTeX, as it copes with the maths. They are way beyond Word. This act of self-creation is a great learning task in itself. Self-generated content is like souped-up note taking and results in significant increases in retention and recall. The students I spoke to recognised that they’re reinforcing content when they create the cards, as well as when they practice using the card decks. The addition of audio for language learning is also useful.
They even share out the production task, so that each converts certain topics or lectures into cards for shared use. This pooling saves everyone some time, time that can be more usefully spent practising. One of the great things about this course is its project work. They’re set high-level tasks and randomly put into groups, then marked on the results. If you're going to do a computer acinece or Ai degree do one that has tons of project work. It works.
They even run ANKI group sessions in twos or threes. Flashing a question up and going for the quickest to answer, a sort of live, gamification technique. This is a pedagogic technique invented by smart learners for other smart learners. An interesting angle here is that they especially like answering questions written by their colleagues, as this shows deeper understanding and prepares them for more possibilities in their understanding and exams.
There’s a server AnkiWeb that synchronises delivery across a range of devices. Not that they'd use a tablet, as that would be a waste fo time and money in IT. There’s also a huge number of decks, especially for language learning, that are available for free.
It also has its own analytics to show you what you've been doing across your decks, in terms of usage and success. That's useful feedback when you're trying to optimise your learning time.
There's a huge range of plug-ins, such as text to speech with playback/recording, editing features and even Memrise, courses in languages and other subjects, with adaptive learning. The card system is heavily used by students learning a second language as it has this text to speech capability in many languages. It even copes with Japanese and Chinese (well used).
Cards are produced on a laptop and they use it on laptops but the mobile version is used for revision, especially in cafes, on trains and so on. Fascinatingly there’s lots of use in lectures (when the lecturer is poor). This really is that rare beast – optimised, mobile learning.
What is odd is the gap that has emerged between learners and those who teach. The gap has widened as ‘lecturers’ hold doggedly on to the twin pedagogic pillars of lectures and essays, while students find their own ways to learn. It is this lack of interest in learning and the tools that help students learn, that is puzzling. But what realy puzzles these smart students is why no one told them about these tools. They had to discover them by themselves. Isn't that odd? Maybe not. There’s an odd form of pedagogy that has been around a long time in our Universities, of not making life too easy for students, the idea that struggle is part of the process. This tool should be recommended for all students. You need not make any of this compulsory but surely giving students tools that take them beyond the lectures that fail them is worth trying. It is, of course, more suited to learning underlying knowledge but they have also moved into creating cards that pose questions that need the application of that knowledge or principle. This is not just a fact checker, it is high-level knowledge and skills. The one line I heard time and time again was “I wished I knew about this at school or at the start of the course”. These students know good pedagogy when they see it because they create and use good pedagogy for themselves, things they know work. Their views of lectures are, by and large, one of complete contempt.
Thiel – Higher Education a bubble?
I like Thiel, as much for the fact that he speaks from a position of success when he taks about business but also that challenges assumptions, especially on Higher Education. As the co-founder of PayPal and first outside investor in Facebook, he has since invested in many companies including LinkedIn and Yammer. He describes himself as a conservative-libertarian and espouses original views on business, social structures and education, that many find, if unpalatable, certainly interesting.
In his book on entrepreneurship, Thiel is critical of those who imagine that entrepreneurship can be taught. This, he thinks, is flawed, as “The paradox of entrepreneurship is that such a formula necessarily cannot exist: because every innovation is new and unique.” He doesn’t think that successful, network businesses can be built by MBA types, who are drilled in seeing what is the case, rather than the all-important absences or gaps. He is also critical of educational systems that drive competition, an obsession with grades, which in turn lead to conformity. The best minds in the world now focus on driving people towards online ads or the unproductive and risk averse world of law and finance. This he thinks limits, rather than encourages personal ambition and progress.
The insidious side of the Catholic Church was the threat, that if you didn’t pay up, you were damned. Similarly, if you don’t get a Degree, you’re damned as a failure, sent to some sort of economic hell, never being admitted to the heaven that is gainful employment and wealth. Criticising Higher Education is like “saying there’s no Santa Claus” claims Thiel. This is a feature of all bubbles, believes Thiel, where ‘groupthink’ takes over and false assumptions become absolute beliefs, and even debate of the negative consequences is seen as ‘party-pooping’.
Higher education, he thinks, is a bubble fed by a vague abstraction - the word ‘education’. Is it an investment decision for a good job? Is it mere consumption, a four-year party? Or, as he thinks, an insurance policy that is not worth as much as you think it is. He charges the system with conformity, a position also taken by Noam Chomsky. Diagnostically, Higher Education suffers, he thinks, from a massive failure of the imagination, a failure to consider alternative futures. The net result is that everyone conforms and marches in lock-step to college to do similar degrees which results in homogenisation and lot less freedom of action, as people believe that everything has been exhausted, and the likes of law and finance are the only possible ways forward. He adds that the lack of focus on teaching has turned the system into an ‘incredible racket’.
Technology does more with less, education does the opposite, it offers the same thing year after year, at a higher and higher price. No one could really claim that the huge hikes in pricing reflect corresponding hikes in the value of University tuition. So what’s happening? Universities are complicit in this. They raise prices because they can, without attention to lowering costs through online learning, fourth semesters etc. In fact the quality of tuition may have fallen, with more students and less qualified lecturers, matched by salary inflation at the top, higher numbers of administrators and wasteful capital expenditure in largely empty buildings. Like the housing market, where people rushed to take out loans (mortgages) based on the belief that the value of their asset will always rise (or at least stay the same), many suffered a shock when the value dropped. Huge hikes in prices for the buyer, now seem unrelated to the real price of the degree. This is exactly what happened in everything from tulips to internet stocks and housing. There is no compelling evidence that the future worth of degrees will be guaranteed. That’s the mistake made in all bubbles. In a bubble, real demand is brutal, and in a buyers’ market may lead to degrees being simple indicators of ‘class’ rather than intrinsic value. Universities may be creating their own bubble, dislocating cost from real value. Institutional brand ranking may lead employers to dismiss degrees from institutions perceived as second-rate. In short, your degree may become a liability while your debt remains all too real.
In short, HE has all the hallmarks of a bubble. Resistant to influence from the outside it is heading towards a crisis, especially for middle-class students who are amassing enormous amounts of debt. As financial pressure mounts, the Reformation needs to come from the outside.
To action his beliefs, about the inefficiency and often irrelevance of college, Thiel’s Fellowship programme funded $100k to each of 20 people under 20, to create their own companies. The programme challenges the idea that college is the only path for young people.
Thiel has backtracked on some of his more extreme positions, such as his attacks on multiculturism and diversity, expressed in the book The Diversity Myth and his Fellowship programme has not been the success he predicted. It has been criticised for replacing education with ‘get rich quick’ programmes. His extreme views on the role of women and their political liberation have been roundly attacked as antediluvian.
Thiel is a contrarian, and although many of his ideas seem outlandish, his critique of Higher Education articulates a growing dissatisfaction with the status quo. Many see his position as exaggerated but it is cogent and based on his not inconsiderable experience in investments and predicting the future. Whether he’s right will be proven by future events.
Stephen Downes and George Siemens, although very different, have two major things in common, connectivism and MOOCs. Stephen Downes sees himself as a philosopher with a professional interest in online learning, specifically the use of network processes for learning. This includes MOOCs and many other species of open, collaborative and online learning. George Siemens is a complementary educator with similar views on connectivism and both a theoretical and practical interest in online learning and MOOCs.
Siemens and Downes developed the concept of ‘Connectivism’, the idea that “knowledge is distributed across a network of connections, and therefore that learning consists of the ability to construct and traverse those networks”. They see it as an alternative to behaviourism, cognitivism and constructionism. Downes makes it clear that he is not a social constructivist. ‘Connectivism’ is very different from ‘constructionism’, as the focus is on the connections, not the structures or meanings that are being connected across networks. Learning consists of the practices, by both teachers and learners that result in the creation and use of successful networks with properties such as diversity, autonomy, openness, and connectivity. This was a real challenge to the existing paradigms, atht does take into account the explosion of network technology, as well as presenting a new perspective on the learning process.
In 2008, Siemens and Downes designed and taught the first cMOOC. This has led to a commonly quoted distinction between cMOOCs (connectivist) and xMOOCs. cMOOCs are open, learner-generated, with a greater use of social and other networked tools. xMOOCS, which in reality is most MOOCs, are more formally presented in a more traditional course structure, with video, texts, computer marked assessment, peer assessment and social interaction. Siemens and Downes can certainly be said to have kick-started MOOCs but only in the sense of being the progenitors of one species of MOOC (connectivist), which have not yet reached any significant critical mass. While it is true that Siemens and Downes delivered the first MOOC, it was not the first massive, free or even open course (a fact acknowledged by Downes). Others in the corporate sector and online had delivered such courses. Nevertheless, they remain, on this front, pioneers in MOOCs and online learning.
Connectivism has been challenged as simply a descriptive, umbrella term for what is known as social learning, a diffuse description of the simple fact that people are connected and learn by that means. It can also be seen as placing too much focus on the delivery mechanism, as opposed to the individuals’ cognitive processes, demoting learning to a mere epiphenomenon. Indeed, it does seem to demote what many see as real (personal and mental) cognitive learning processes and practice. As a ‘learning theory’ it can also be seen as descriptive of only a subset of learning. It is ‘a’ learning theory, applied by some, but can in no way be described as ‘the’ learning theory.
On MOOCs, the distinction between cMOOCS and xMOOCs is often misunderstood. The ‘c’ does not stand for constructivist (Downes is not a social constructivist), it means ‘connectivist’. In any case the distinction is too binary, as there’s a variety of MOOC types that defy this simplistic, binary distinctions. New taxonomies are emerging that more accurately reflect the variety of real MOOCs. This exaggerated binary distinction has led to simplistic criticism of many MOOCs as being poor in terms of their social dimension. This falsely skews the debate away from the variety of pedagogic approaches in MOOCs keeping the debate at an oppositional, binary level.
Downes and Siemens have defined a learning theory, connectivism, that has stimulated debate around the nature of learning, especially in a highly networked and increasingly technological world. Connectivism is a fascinating flip away from the preceding learning theories, in that it takes technology and networked processes as it’s bedrock, not behavior, internal mental processes or socially constructed meaning. It has stimulated debate but has yet to really challenge other more dominant belief sets in the world of learning. Beyond this, they remain significant figures with high quality output, not only in terms of MOOCs, but across the whole learning sphere.
An SME is a Subject Matter Expert. Remember this, as they may lack expertise in other areas, such as learning, time management, design, graphics and editorial skills. Nevertheless, they play an important role in the team. So what do you say, practically, to an SME, at the start of a project?
The SME is an expert in the subject, not the project manager, designer, editor, graphic artists or tester. It must be crystal clear what the ‘role’ entails. There’s no problem in allowing SMEs to play other roles but be clear what those other roles are and the parameters within which the SME will work in each of those roles. There tends to be a sort of skills creep here, where the SME assumes they have overall design control and skills beyond their ability and remit. Note that some SMEs have other skills but how likely is it that they have project management, interface design, writing for screen, graphic, audio, animation, video, technical, tool, copyright and interactive design skills? It pays, on both sides, to be honest and realistic on who does what and why.
Identify exactly what you require in terms of tools. Is it Word, Google docs, templates, authoring tool? The there’s the format or template on the page/screen? Then there's the file format, file names and versioning. Where is the content to be stored? Dropbox, sent in by email? Finally, there’s the issue of communication. Establish rules for email communications, so that it is clear how often you communicate and by what means. Why? Because things will slip. A full exchange of email addresses, Skype names, Facebook, whatever, is always in order.
Don’t assume that your SME will deliver on time. Identify their holidays and other time commitments. SMEs, especially those new to the task, often underestimate the time that is needed, as content for online delivery needs to be substantial and of high quality, not a set of rough course notes. If it can slip, it will. Their expertise is rarely in the domain of project or time management. In fact, this may be their greatest weakness. First, build in some contingency, then allow for several iterations. Have a B-plan.
With freedom comes responsibility. While a SME should be encouraged to be creative and to think about engagement, good learning theory and strong pedagogy, there are real design constraints that need to be explained. There’s the practical design constraints in terms of what can be presented on the screen, technical constraints on types of media. It is vital that the SME grasps the concept of 'chunking' and the good use of media and media mix. It may be wise to provide detailed guidelines in terms of a structured outline, word counts, even templates.
SME output will invariably have to be edited and cut down to size. Writing is really all about rewriting, especially; a) when the SME is used to writing papers, manuals and books; b) when the SME has never been involved in teaching and learning. Most SME content needs an external eye, if not a good editor. Explain the difference between the written word and text on screen. Explain the need for cut-down, chunked content that does not overload the learner and always leave room for an external eye and editor.
It is important to foster a good team atmosphere, and the right attitudes, from the start. Explain up front that things WILL go wrong and not to get too hung up on the occasional spelling mistake. I mention 'spelling' as I’ve seen grown ups become demonic on the issue. I've lost count of the times that the production process has unvovered errors in the SME provided material, even from HE, even from supposedly quality assured content. In fact it is probable. To err is human and a good collective spirit goes a long way.
As the project progresses, it is important to challenge. On the whole, after 30 plus years of doing this professionally, there is overwhelming evidence to show that SMEs tend to shove too much stuff into online learning experiences. It is the job of the project manager, designer, and others in the team, to challenge that tendency, not only in terms of quantity but also on the grounds of relevant skills and learning theory. They know what they know, you know what you know – the two should not be confused.
Another form of challenge is on delivery. It’s all very well being agile with SMEs but they have to deliver at the front-end of projects and need to know that others depend on their prompt and promised delivery. Explain these dependencies in detail, and this is important – also explain the fiscal and time consequences of non-delivery. In complex tech projects, there's often a scheduled graphic artist, audio recoding booked, whole video production team readt to roll and coders at the ready. The consequences of late delivery can be expensive, even catastrophic.
It is vital that materials supplied are copyright cleared and that the team and SME understand the role of copyright with text, images, video and so on. SME content often contains material, especially images, that is not safe to publish online. On the other hand there is plenty of good copyright free stuff that is publishable.
The whole SME thing is fraught with potential problems. As for the debate around SMEs creating content on their own, I’ve been in this business for a long time and I’ve seen no end of online learning experiences result in a huge, soggy or fragmented mess through lack of understanding on how people learn, poor interface design, poor media mix, huge dollops of unedited text and a lack of design and editorial skills. You need a team.
Perfect time of year to visit Berlin and my favourite conference of the year Online Educa – like the gluwein in the nearby Christmas market, a pretty tasty brew – spicy and strong enough to keep the conversation flowing. I like the mix of the academic, government and business.
In 2012 they were saying MOOCs are awful, 2013 MOOCs are dead, 2014 MOOCs are pedagogically weak. 2015 some still don’t like them but we can finally say they’re here to stay. 2016 will be “they’ve turned out to be alright after all”.
What gave me heart about Higher Education was the fantastic talk by Anka Mulder, from the University of Delft. She posed a question. If Uber can destroy the business of driving and not own a single cab or employ a single taxi driver, and AirBnB can soak up the accommodation market without owning a single hotel, can this happen in education? She put up an innovative argument, that her institution could be such a global player. Brave, and I wish her well, as they’re adopting many of the necessary traits - but it’s unlikely. She did, however, argue that MOOCs are having a profound influence, not only as outreach by institutions to new audiences but also on the potential use of MOOCs internally for campus students. Her advice, which is innovative and sound, was to form alliances, as the airlines do around the world, to deliver world-class, transferable qualifications, with other Universities around the world. Unfortunately, Universities are slow, bureaucratic, non-collaborative, often with national perspectives, high fixed costs and a reluctance to accept transferability, so it is likely that another player pulls off this trick. Her vision, like that of Jeff Haywood at the University of Edinburgh (see his brilliant talk here), is exactly what HE needs.
The plenary session on AI in education was sharp, although mostly about AI and light on education. Toby Walsh rightly quashed the dystopian opinions of Hawking, Gates and Musk, along with Hollywood visions of Terminator robots murdering us in our beds, then reminded us that we actually live in the age of algorithms. AI is already here in Google search, Amazon, social media and almost every other species of online service. An interesting aside was that AI software had just (48 hours earlier) passed the Japanese University entrance examination, scoring well above the average score. He then gave us an informed view of how AI may affect the job market.
I have written about this myself and highly recommend The Future of the Professions by the Susskinds, which looks at the professions one-by-one, as well as the complex economic arguments around job destruction (and creation). Jobs will be destroyed but new jobs created. However these jobs will be different and it is by no means certain that there will be a higher net number of jobs at the end. We’ve seen this before as mass employment moved from fields to factories, then came the shift from blue-collar factories to manufacturing robots. It looks likely that this will now happen to the white-collar professions. Education is not immune. We’ve already seen a vast reduction in the number of trainers, librarians and even teachers in my opinion, as tech has taken root for search, knowledge and learning. Fascinating.
A key moment came on the second day when a neuroscientist asked the audience whether they believed in learning styles, that only 10% of the brain is used at any one time or L/R brain theory. There was a forest of arms for all three. She was polite but the response was shocking. Bewildering though this is, at least it showed the scale of the problem. It’s like going to a medical conference and finding out that the audience are really selling powdered rhino horn, herbs and homeopathic solutions. There was then an almost tragicomic moment when an audience member tried to defend learning styles – it was, of course, an anecdote, and the plural of anecdote is not data.
As a counter to this stuff, I gave a whistlestop tour of 2500 years of learning theory (the good, bad and the downright ugly). I went from from Socrates to Seligman in just 25 minutes, clustering learning theorists into: Greeks, religious leaders, religious educators, Marxists, constructivists, psychoanalysts, schoolers, pragmatists, behaviourists, cognivists, instructionalists, holists, assessors, educationalists, online technologists, online educationalists, cultural critics and outsiders. The good news is that people are starting to take the real (not faddish) psychology of learning seriously. We’re listening to Hattie, Black & Wiliam and Dweck in schools. Taking Ebbinghaus, Tulving and Erikson seriously in terms of memory theory and practice. It takes time, but the dusty old boxes of dated, faddish and non-evidenced, learning theory and practice is being swept away by good research.
General learning conferences often have a disproportionate number of people from Universities as they have the time and budgets. Vocational learning and schools are under-represented. This year I gave a talk about tech in vocational learning and was on a later panel discussing the issues. The session, with my friends from Africa, Jamaica and Malaysia, was exhilarating. We talked way beyond the end of the allotted time. The panel was fine but the chair insisted in posing the old trope questions about MOOCs and F2F mentioned above. I think it just wastes time.
As Pasi Sahlberg says, vocational learning is back on the agenda, as many countries feel the fiscal burden of University education and start to experience graduate unemployment. In the UK, the main plank of the education debate was 3 million apprenticeships, something that the left wing parties should have pushed. Surprisingly, it was the policy of the right wing government and they won. Some great case studies popped out from Mexico, Malaysia, with Moodle, YouTube (as a learning platform), OER, even AR & VR. Big thanks to UNESCO for pulling this together.
6. Why is OER unused & unloved?
It’s not that we don’t have enough OER resources or funding. Millions have been poured into this, by the EU and many others, but much of it remains unused and unloved in repositories that more resemble unvisited graveyards than busy learning spaces. What went wrong? Well, first, there has been far too much emphasis on reusability by teachers, who have an in-built aversion to using anything but their own stuff - far better to target learners. Second, crap marketing. The most used open learning resources, and I mean hundreds of millions of users, are Wikipedia, YouTube, Khan Academy, MOOCs and so on. That’s because they’re easy to use, free at point of delivery, useful and living, breathing systems that have exemplary marketing – and let me repeat, aimed at learners. It comes as no surprise, that these are precisely the things educators seem to delight in rubbishing. It's the mindset that's the problem. That’s a shame.
Not a single session this year had the word ‘tablet’ in the title. This is heartening. The ‘keep on taking the tablets’ folk have disappeared as we get back to real learning and not an unhealthy obsession with often inappropriate, shiny objects. Enough said. For more on 'device fetishism' see here.
Heard this phrase a lot, although it is so often used in the sense of Blended TEACHING, not ‘learning’ i.e. let’s keep on doing what we’ve always done, with some adjunct online activity. Nevertheless ‘Blended’ has taken root, which I welcome. It’s a good heuristic starting point, as long as people do a proper analysis and start with solid data on the types of learning, learners and available resources.
Text, audio, graphics, animation, video, even VR are media types that have different advantages and disadvantages in online learning. When making learning materials and tools, so many ignore the research and lessons we’ve learned from past experience. We’ve had over 30 years of raw experience and need to listen to those who have trodden these paths before. Some good sessions on this, especially video, but I’d like to see a general session on all of them. For my own 100 tips on designing online learning see here.
Friends of Jay Cross (I was lucky enough to know him well), who passed away this year, got together for a celebration to his life. His legacy, that we put too much focus on formal teaching, courses, structures and institutions and not enough on informal learning, lives on. I wrote this piece on Jay two years ago and included him in my list of greats, when I did my 2500 years of learning session.
I missed Jay at Educa but he was there in spirit, especially at the dinner Rebecca held for us at Lutter, a beautiful old Berliner restaurant, where his friends did what friends do, reminisced, toasted and laughed into the wee hours – if you knew Jay, you’d know that was his style.
Lastly, thanks to Berlin for hosting my birthday. I was toasted with Schnapps at midnight by my Educa friends in one of Berlin’s oldest restaurants, had a Champagne breakfast, drank Champagne before heading out with my family for a birthday meal and ate chocolate cake delivered unexpectantly to my room by the hotel. Thanks also to our hilariously irreverent tour guide on the Berlin boat. He blew away my hangover when he invited us to knock on Merkel's door (as she does a great Kartoffelsuppe), ridiculed the guy who failed to finish the airport (if he visits your town, make sure he leaves), then had a go at lobbyists as we passed Parliament, the pampered kids of politicians as we passed their creche, German pop music (with outstretched arms he mimicked ‘our Celine Dion’ doing her wunderbar Christmas Album), local planners (we Germans love a good plan), rising Berlin rents due to rich property speculators.... he should be in stand-up. A well deserved tip was in order.
Have a Merry Xmas and happy New Year - see you all next year….. or for E-learning Africa in Cairo.
The recent European refugee crisis saw catastrophic political failure in the EU. We neither prepared nor executed a rational and sensible response. It showed fundamental problems with the whole EU vision. At National level it was just as bad. The response was walls, fences, barbed wire and police. Government departments, even in places used to large numbers of refugees were overwhelmed. Beyond this has been the failure to adequately integrate past refugees leaving them marginalised and capable of horrific acts of terror born of resentment and revenge. We have not provided vocational education and jobs in enough numbers to integrate refugees, whether in the past or present. Our institutions are too large and inflexible, especially in education, to provide for the employment needs of so many people. We need to be far more agile.
Technology has the ability to decentralise, disintermediate and democratise knowledge and services. It has speed, scalability and saving money on its side. You can get directly to refugees, as well as allowing them to get to you. This is not to say that it is the only solution. That would be blinkered. But it is a useful tactic within an overall strategy. So let’s see how technology can be used to alleviate what is one of the great political problems of our age.
There was a furore when refugees were pictured with smartphones. How dare they ask for our help when they can afford such things? Yet this simply showed the gulf between perception and reality. The mobile phone is a lifeline in countries from which the refugees came. In the Middle East, a way of existing within a society that has rules about physical social contact; in Africa, the means by which one can get work, transfer money and keep in touch. A mobile phone is a lifeline for refugees. They are, after all, on the move – mobile.
That’s why we must focus on this device when we think of technology as a solution to many (not all) refugee problems. Whether it be biometrics, data collection, money, language and finding information. Mobile should be the device of choice when it comes to integration and fostering autonomy in refugees.
To this end we have useful initiatives, such as zero tariffs for key information and services, as well as connectivity movements such as the Humanitarian Connectivity Charter (HMCC), that tries to open channels to prepare and respond to humanitarian crises.
To deliver effective solutions to problems, you need to know the scale of the problem and authentic identification is essential. We have seen refugees remove skin from their fingers to evade fingerprinting but the bottom line here, is that identification is necessary, even more so since the Paris bombings. This is an area in which technology excels; fingerprints, retinal, iris, face recognition, voice recognition even vein recognition. A combination of these techniques is even better.
So far, so good. But the real problems have only just started. The first big need when refugees find their destination, is orientation. Where do they find services, legal, health, education, language classes and so on. It can be bewildering, even frightening, arriving in a strange city in a strange country, where you do not speak the language.
One of the best examples of an agile solution to this problem is in Berlin, where the refugees themselves have created a simple map, in English, Arabic and Farsi, with the location of key services. This is crowd-sourced and a great example of an agile project that empowers the refugees themselves, to help themselves, rather than the top-down approach.
Hackathons aim to get real results in a short time, focused on real and immediate needs. To get useable results there needs to be the quick and exact definition of ideas. These are then executed by mixed teams, with a variety of necessary skills, to lead to success.
When refugees arrive in great numbers, it creates the possibility of chaos and confusion. One hacked project that results in a solution to an immediate need was a number queuing system for LAGeSo (Landesamt für Gesundheit und Soziales) the first contact centre for refugees in Berlin.
Refugees, who themselves speak a variety of languages, are likely to find themselves in countries where they do not speak the language. Even the second language they do speak may not be the language they need in their new host country.
Intensive tutor-led classes are expensive, difficult to organise and competent teachers may be hard to find. One solution is to produce or reuse existing free online learning such as Duolingo and MOOCs.
Duolingo is free, with over 100 million users and teaches Norwegian, Swedish, Danish, German, Dutch, French, Polish, Portuguese, Spanish and others….
The IELTS test (International English Language Testing System) is the world’s most popular English language test for global migration. Over 9,000 organisations worldwide accept it; universities, employers, immigration authorities and professional bodies. Last year over 2.2 million tests were completed. This MOOC, the largest ever, had more than 440,000 learners from over 150 counties enrolled.
Another good example is the British Council ‘s free “Exploring English: Language and Culture’ MOOC. It has had 326,000 enrolments to date.
Youth unemployment is the one thing we want to avoid with refugees. The way to avoid future disenchantment is fruitful employment. Academic structures, timescales and current vocational options are not good enough. Single course entry points are not enough. If you arrive in October, it is bizarre to have to wait almost a year to enter a formal course. Their needs are much more immediate and dynamic. The academic, agricultural calendar is ridiculous and the rigid layers in the system, make it far too difficult to cope with outsiders.
The solution is clearly online courses or at least blended courses with large online components.
Unicef is developing a programme called the “Virtual School for Education in Crises” (or Sahabati – My Cloud – in Arabic), which will offer courses, assessments and certification in Arabic, English, Maths and science. In a study from the University of Geneva, 78% of refugees reported they would definitely do an online course – for all, this was their first experience of distance learning.
The great problem many economies face is unemployed young men. The suburbs of our cities are filling up with young men who lose faith and look for a purpose in life beyond even life itself.
We could go a lot further by offering cheaper, online degrees in practical, vocational, employment oriented subjects. Online degrees from the likes of IDI have multiple intakes a year and can deliver anywhere. | 2019-04-23T02:21:24Z | http://donaldclarkplanb.blogspot.com/2015/12/ |
b and ponders that instruction day and night.
d all that such a person does prospers.
b rather they are like chaff that the wind blows away.
b nor sinners in the congregation of the righteous.
b but the way of evildoers will perish.
"Delight" in the instruction of Yhwh? Whoever is somewhat familiar with the history of German Protestantism will be taken aback at this point. For "delight" in Yhwhs hrwt (instruction), or delight in Yhwhs no/mov, that is, in the "Law" (the LXXs constricting translation of hrwt) could have been regarded as an inappropriate formulation by many Protestants, not only in the past but to some extent also in the present. "Delight" in the instruction of Yhwh? One can well imagine that this formulation will evoke at least the typical accusation of Jewish self-righteousness and works-righteousness. The commentaries, however, present a significantly fuller, more complex picture of anti-Jewish interpretations.
Almost four decades ago H.-J. Kraus, speaking from within the Reformed tradition in his article "Freude an Gottes Gesetz: Ein Beitrag zur Auslegung der Psalmen 1; 19B und 119," pointed to anti-Judaismmeaning theologically based animosity toward Jewsin Old Testament exegesis of Ps. 1. In the following I will attempt to provide a detailed analysis of various forms of anti-Jewish interpretations of Psalm 1.
As some narrowing of scope is necessary, I will focus on Luthers Operationes in Psalmos(1519-21) as well as on the most important scholarly commentaries on the Psalms in German Protestantism of the 19th and 20th centuries beginning with de Wette and Hengstenberg, two quite different interpreters both of whom nonetheless refer to Luther.
I begin with Luthers Operationes in Psalmos, in which his anti-Jewish interpretation is comprehensible only against the background of the exclusivistic Christological background of his entire theology and thus of the exegetical principle that results for interpreting the Old Testament texts, namely, that the sensus literalis is at the same time the sensus propheticus, that is, refers to Jesus Christ. The resulting attacks on Jews are, therefore, hardly to be assessed as isolated lapses. "Salus extra Christum non est" is a central componenent of Luthers theology as well as in his operationes commenting on Psalm 1. The following quotation, referring to v. 1, will serve to illustrate: "Our Psalm doesnt mean the godless and sinful, per se. For every person who is not in Christ is godless and sinful" (p. 169).
Luthers interpretation of another version of the first verse shows this even more pointedly. Verse 1d, "nor sits together with scoffers," reads as follows in Luther, relying on the Vulgate: "nor sits on the dais of the pestilence." It is indisputable whom he means by "on the dais of the pestilence." It is "those Jews who are apostate from Christ, who have deadly venom on their lips and whose wine is gall. For whoever does not teach Christ must inevitably teach against Christ."
Because Jews "are not in Christ" or "do not teach Christ," it follows inexorably in Luthers argumentation that they are to be grouped with the evildoers, the sinners, and the scornful and thus excluded from the congregation of the righteous. "Salus extra Christum non est."
Luthers view of the term instruction (hrwt) is also determined by his Christological exclusivity. In the following quotation, instead of using "delight" (Cpx) and "instruction," Luther follows the Vulgate and uses "free will" (voluntas) and "law" (lex): "The free will to obey the law comes from faith in God through Jesus Christ. Otherwise, it is the case that the will which can be coerced by fear of punishment is a subservient and refractory will; but a will that can be lured by the desire for reward is a bribed and hypocritical will" (p. 175). For Luther, without faith in God through Jesus Christ only an anxious attempt to live according to the Law is conceivable. Because of his Christocentrism, Luther cannot conceive of delight in the divine instruction, based on love of God, such as is found in Jewish thought.
In Luthers interpretation of v. 4 it becomes clear that Christological exclusivity is mortally dangerous for Jews. Commenting on v. 4b, "rather they are like chaff that the wind blows away," Luther writes: "The Psalmist doesnt simply say chaff, but rather chaff that the wind blows away. Not such chaff as peacefully lies there; on the contrary, he means that which is scattered, swirled around, driven hither and yon. One should think, in the first instance, of the Jews. They are driven hither and yon in three ways. First, physically by storms, that is, by the efforts and indignation of the people among whom they live, as we can see before our very eyes: they dont have secure habitations because at any moment they are at the mercy of a storm that seeks to drive them away. Secondly, they are spiritually driven hither and yon by the wind of diverse teachings of pernicious teachers; because they are not rooted in faith in Christ but are confused in their thinking by untrustworthy teachers, their conscience can never be certain and peaceful. Thirdly, on Judgement Day, they will be frightened away and scattered by the eternal storms of Gods irresistible wrath so that they will never find peace even for a moment" (pp. 189f.).
The first point of Luthers exposition legitimizes as scriptural the expulsion and persecution of the Jews that was actually taking place. Enmity toward the Jews, which escalates into pogroms, appears as virtually a divinely willed necessity.
The second point of Luthers exposition repeats in the first place the disparagement of Jewish teachings and teachers discussed above. In addition, Luther deduces from his exclusivistic Christological thinking that a permanent crisis of conscience in which all Jews find themselves derives from their lack of faith in Christ.
In the last point of his exposition, Luther tries to assure the permanent existence of the enmity toward Jews which he had already legitimized for his time. Contrary to Rom 11:15, where Paul brings together the resurrection of the dead and Jews apocalyptic acceptance (pro/slhmyiv) of Christ, Luther pronounces the verdict of their eternal condemnation (a)pobolh/).
Particularly Luthers assertion of the threefold drivenness of the Jews shows clearly that he was unable to rid himself of the Christian Adversus-Judaeos tradition of antiquity and the Middle Ages which had found expression in the Ahasuersus legend of the restless Jew eternally wandering the face of the Earth.
The first 19th-century text relevant to our discussion is Wilhelm Martin Leberecht de Wettes Commentar �ber die Psalmen, in the third, revised, and updated edition published in Heidelberg in 1829 (1st ed., 1811; 2nd ed., 1823).
In addition to the fact that de Wette, who stands in the Liberal tradition of theology, wrote the first historical-critical commentary on the Psalms, his use of Luther legitimates beginning with him as representative of the newer Protestantism. Following in Herders footsteps, de Wette interprets the Psalms as a direct "expression of feeling" and in his introduction quotes from a pertinent passage in Luthers Vorrede zum Psalter (to which Gunkel will also refer a century later) in which Luther points out that the Psalms offer a look into the heart of the believer. This view of the Psalms as "religious lyric," that is, as an individual literary creation, remains dominant in the 19th century.
In comparison with Luthers anti-Judaism, de Wettes exposition of Psalm 1 comes across as quite moderate. De Wette is essentially a strict historical philologist, convinced of the progressive development of religion.
In the introduction to his commentary on the Psalm, de Wette speaks of a supposed widespread conviction among the Hebrews that virtue would be awarded with happiness while evil would be punished with misfortune. The neglect of the Law would, therefore, be connected with misfortune. Therefore, writes de Wette, "The Hebrews had to hold on to this faith even more firmly because their morality and piety were theocratic, that is, consisted primarily in keeping of the Law and in ritual observance and thus was something external. . . . Among us, who have a more spiritual, more inward conception of virtue and piety, this conviction is refuted by experience so that we do not seek reward for virtue in external happiness" (p. 82).
Although de Wette does not say so explicitly, the entire thrust of his argument suggests that one is to assume that the "external" morality and piety of the Hebrewsor of their equivalent, the Jewsare to be seen as a lower developmental stage compared with the Christians more spiritual and more inward conception of virtue and piety.
De Wette presumes that the authors of the Psalms, by praising delight in Yhwhs instruction and the resulting mode of learning and living, are concerned only with externals.
This presumption doesnt accord with the exegetical findings, because the negatively formulated threefold parallelism in v. 1 ("who walks not in the counsel of evildoers, nor treads the path of sinners, nor sits together with scoffers") is understood to be in relation to the positively formulated v. 7 of the "Shema Israel" in Deut. 6: "and you shall impress them [the words of the Torah] upon your children, and you shall speak of them when you sit in your house and when you are traveling, when you lie down and when you rise." If one includes as well the two directly preceding verses, Deut. 6:5-6 ("And you shall love YHWH, your God, with your whole heart and your whole soul and with all your strength. And these words which I command to you today shall be in your hearts") a more inward or more holistic description of pietythe love of God and Gods instructionis hardly conceivable.
Thanks to the Psalms conscious relating of the negatively formulated v. 1 to the "Shema Israel," the second, positively formulated verse, which speaks of delight in Yhwhs instruction, is also to be understood against the background of the "Shema" and the holistic love of God and Gods instruction expressed therein. That the delight in Yhwhs instruction is something merely "external" is out of the question.
De Wettes presumption that Ps. 1 is concerned only with external legalism is thus exposed as anti-Jewish prejudice.
I turn now to Ernst Wilhelm Hengstenbergs Commentar �ber die Psalmen, I, in the second edition published in Berlin in 1849 (1st ed., 1842).
Representating a new orthodoxy, the so-called Repristination Theology, which sharply rejected both historical-critical and historical-grammatical research as well as Schleiermachers subjectivism, Hengstenbergs commentary on Ps. 1 refers explicitly and repeatedly to Luther.
Similarly to Luther, his exposition of "delight in YHWHs instruction" is exclusivistically Christological. First we read: "There is a greatness in having ones delight in the Law of the Lord. The natural man, even if awareness of the holiness of the Law has been awakened in him and he anxiously tries to satisfy it, does not move beyond fear" (p. 15). By contrast, for Christians (Gods born-again persons), delight in the Law predominates; yet they too must struggle constantly with their delight in sin. Christ alone can lay claim to perfect fulfillment of the Law.
Hengstenbergs observation that only Christ fulfilled the Law implies that Jewsthese "natural," not born-again peoplecontrary to their own self-understanding of the Law are unable to develop more than an attitude of fear.
Based upon his Christological approach, Hengstenberg at another place in his commentary lets fallrather casuallya denigrating judgment on the Jews: "Because the Jewish people did not meet the great demands of v. 1 and 2, it can no longer be a tree bearing fruit in due season; to such a tree will apply the harsh saying of Matt 21:19: may you never bear fruit again" (p. 17).
Using this exegetical or pseudo-exegetical trick, which falsely identifies Israel with the fig tree in the Gospel according to Matthewa further anti-Judaismand then in addition by not allowing the Psalm to speak for itself, Hengstenberg twists what it says into its opposite, for Hengstenbergs verdict of eternal futility now strikes, not the evildoers who reject Yhwhs instruction and according to the Psalm then lose their way, but rather the righteous Jews who with a holistic love of God seek to fulfill Gods instruction.
The next commentary I examine is Hermann Hupfelds Die Psalmen, I, published in 1855 in Gotha (2nd ed., 1867 [Riehm]; 3rd ed., 1888 [Nowack]).
Hupfeld is Hengstenbergs antagonist in Psalm interpretation. Unlike Hengstenberg, Hupfeld is a consistently historical-philological exegete who is concerned to keep the Old Testament free of any dogmatic constraints and to allow it to speak for itself.
Hupfeld believes Ps. 1 must be dated rather late, from which it follows that "not a mere theoretical study of the letter of the law after the manner of later Jews is the result; rather, the very personal expression his delight as well as the context direct attention to the moral content and spirit of the Law" (p. 9).
Underlying Hupfelds exposition is a widespread nineteenth-century history-of-religions model with anti-Jewish implications which, first evident in a systematic manner in de Wette (though not in his commentary on Ps. 1 ), differentiates between preexilic Hebraism or preexilic Israel and postexilic Judaismus or postexilic Judentum. In this model, a natural religiousness and spirituality, as well as a living, prophetic piety of the Word, are granted to Hebraism but to Judaism only an arid legalism and a lifeless piety of the letter of the law.
It is clear that Hupfeld views Ps. 1 as a model for Jer. 17:7ff., and his observation about the "moral content and spirit of the Law" situates the Psalm as still in the stage of Hebraism. Thus follows the verdict that since the postexilic period Jews are no longer capable of comprehending "the moral content and spirit of the law."
I continue with Bernhard Duhms commentary, Die Psalmen, KHC, published in 1899 in Freiburg, Leipzig, and T�bingen (2nd, expanded and revised ed., T�bingen, 1922).
Wellhausens most significant comrade-in-arms in the scholary battles of the day, Duhm too concerns himself with the development of Israelite religion whose climax he sees as occurring in Israelite prophecy. In contrast to the positions discussed thus far which, with the exception of de Wette, all interpret Ps. 1 positively, Duhm interprets it negatively as a product of a degenerate Judaism in the last century before Christ: inter alia, he applies to the Psalm the history-of-religions model of Hebraism and Judaism found already in Hupfeld.
Duhm sees in the contrast between the righteous and the evildoers that characterizes the Psalm the contrast between Jews faithful to the Law and Jews who have abandoned the Law. However, he is apparently capable only of incomprehension or ridicule of the Torah scholars faithfulness to the law and the study of Torah pursued in their synagogues: in commenting on the phrase "sits together with scoffers" in v. 1d, which Duhm refers to Torah-despising, Greek-sympathizing Jews, he says these "without doubt stood in sharp contrast to the synagogues where the Torah scholars wracked their brains over whether or not one could eat an egg that had been laid on the Sabbath" (p. 2).
From a stylistic perspective Duhm is bothered by the double usage of the Hebrew word hrwt in v. 2. The expression hwhy trwt in v. 2a, "YHWHs instruction," should therefore be replaced by hwhy t)ry, "fear of YHWH." The import of Duhms emendation becomes clear in the statement that follows: "In later literature, the fear of Yhwh denotes respect for Gods revelation and obedience to Gods Law, the religio of nomism"(p. 3).
By emending the text to accord with his meaning he creates a peg on which to hang his negative characterization of Judaism as a nomistic religion.
That Duhm regards this nomism as religio-historical decline is evident from the following quotation which, in an exact reversal of Hupfeld, views the Psalm as dependent on Jer. 17:7ff.: "In Jeremiah there is a general concern with proper trust in God and erroneous trust in man; here [in the Psalm] the concern is the incessant study of the Law and ridicule of it. One can see how nomism has narrowed the purview" (p. 3).
Commenting on v. 3d, "all that such a person does prospers," Duhm says, finally: "Even if the devout person studies the Torah day and night, that does not exclude other activities; in everything he doescommerce, handwork, marriagehe is happy. The author believes (without any qualms) in the recompense doctrine, as expressed in Psalm 73 or in the Book of Job. Whoever becomes so wrapped up in the Torah misses out on the lessons of reality" (p. 3).
Thus Duhm, like Hengstenberg, converted the message of the Psalm into its opposite. For, rather than teaching "the lessons of reality," Ps. 1, the overture to Psalter, has the diverse reality of the suffering of the righteous in view, which is a common theme in the Book of Psalms. Ps. 1 counters this reality of suffering with a perspective of hope which praises a life lived according to the Torah as the more promising way, despite all appearances to the contrary. By no means does the Psalm represent a loss of reality in favor of a concern for pure doctrine.
The first commentary of the twentieth century to contain anti-Jewish interpretations is Rudolf Kittels Die Psalmen, KAT, XIII, which appeared in the fifth/sixth edition in 1929 (1st/2nd ed., 1914) in Leipzig.
Although Kittel does not belong to the Wellhausen schoolinter alia, he rejects its late dating of the Psalmshis interpretation of Ps. 1 follows the path laid down by Duhm, especially with regard to his negative view of the Psalm.
Kittel takes verse ones separation of the righteous from evildoers, sinners, and scoffers to refer to pagans or to Jews inclined to paganism: "Since the days of Ezra, Judaism has made this separation from pagans a most strict obligation; the principle itself, however, is older . . . Ever since pagan or pagan-friendly stirrings had crept into the community, the principle was applied also to Jews favorably inclined to paganism, especially to those who favoured things Greek. Down through the centuries, Judaism believed itself best able to preserve its national and religious characteristics through what Tacitus called its odium generis humanianimosity toward others and separation from those who differ from themselves."
Quite apart from the fact that v. 1 refers primarily to separation from evildoers, sinners, and scoffers within the Psalmists own community, Kittel misjudges the nature of Israels separation from other peoples as seen, for example, in the Book of Ezra. This separation, or rather this never consistently realized demand for separation, served to protect Israels confession that "YHWH is our God, YHWH alone" (Deut. 6:4) and, after the Exile, to prevent Israel from turning once again to worship of the idols of the peoples living in the land, as had been the case before the Exile.
This demand for preservation of Jewish identity or the partially realized practice of separation from others after the Exile Kittel maliciously turns into Jews "animosity" toward others throughout history. This idea, carried to its logical conclusion, means that it was this Jewish animosity that provoked the hatred and the persecutions to which Jews have been subjected for centuries and from which they still suffer.
Finally, for Kittel the classical contrast between righteousness by faith and works-righteousness cannot fail to be included; Kittel links it with the contrast between prophetic Hebraism and legalistic Judaism: "It is the difference between prophetic and legalistic piety, the contrast between works-righteousness and righteousness by faith, which is reflected here and which clearly shows that Ps. 1 is later than Jer 17. The Psalm contains a reinterpretation of the prophetic word in a legalistic Judaistic sense. There can be no doubt which of these two views of God-pleasing conduct Jesus and Paul attached themselves to. But one should not be misled by the insight that the prophetic stage of piety and knowledge of God is superior to the legalistic stage into the error of thinking that the latter is worthless. To disdain it would be to misjudge its lofty purpose; during the time when prophecy was dying out, it served as a substitute for the living prophetic word and preserved and saved the great achievements of Israels past for a greater future" (p. 5).
Jewish life according to the Torah in the Second Temple period thus has no worth in itself. Jews were fulfilling only a substitute and fill-in function between the dying out of the age of prophecy and the beginning of the church, preserving for the church the great accomplishments of Israels past, that is, Hebraisms prophetic piety. Implied in Kittels conceding to Jews this one function in the Second Temple period is that, following the saving events connected with Jesus, Jewish life has been bereft of any significance whatever.
I come now to Hermann Gunkels commentary, Die Psalmen, HK, in the fourth edition published in G�ttingen in 1926 (5th unaltered printing, 1968).
In contrast to the traditional view that the Psalms are "religious songs" to be understood in the context of their time and their place in the history of Israelite religion, Gunkels genre approach, particularly his search for the psalms cultic "Sitz im Leben," does indeed constitute a paradigm shift; however, this is of no significance for his interpretation of Ps. 1 since Gunkel, along with all subsequent commentators, is convinced that Ps. 1 is a didactic wisdom poem with no cultic "Sitz im Leben."
Like Duhm and Kittel, Gunkel too interprets the Psalm negatively. Compared with the previously sketched anti-Jewish interpretations, he offers nothing new. Rather, situating the psalm in a general history-of-religions context, he essentially repeats the thesis of the degeneration of the true, prophetic piety into a legalistic version thereof. "In the history of religion one not infrequently observes that religion, after experiencing a powerful upsurge through eminent prophets, then fashions a canon out of the Scriptures of the great past which it thenceforth reveres as the essence of divine revelation. In such periods, a substantial portion of piety exists in an intimate familiarity with the letter of the Holy Scriptures. . . . Thus, the righteous person, according to this Psalm, spends his entire time joyfully studying the Law in order to learn more and more about Gods willa typical picture of Jewish piety. . . . Noteworthy is that Jer. 17:5ff., the prophetic passage which the psalmist imitates, . . . says that the pious person trusts Yhwh; here, in place of trust in God, erudition in the Law has entered in."
Hans Schmidts argument in his commentary, Die Psalmen, HAT, published in T�bingen in 1934, is similar to Gunkels.
Referring to postexilic Judaism, he writes: "During this period one no longer lives ones piety out of a direct experience of God. The voice of his living messengers, the Prophets, has fallen silent. In their place, one has the Holy Book, which governs religion. The time is late, a time of epigones" (p. 2).
As far back as 1923 Alfred Bertholet had spoken of "Late Judaism [Sp�tjudentum]" in connection with Ps. 1 (p. 120) in his brief commentary, Die Heilige Schrift des Alten Testaments, II (T�bingen). In other words, Judaism is an expiring model which comes to an end as soon as it brings forth Jesus Christ.
I proceed with Artur Weisers commentary, Die Psalmen, ATD, which appeared in the seventh edition in 1966 in G�ttingen. The first edition appeared already in 1935; the tenth edition was published in 1987, and is still available.
Weiser, who represents a cult-historical approach and in his introduction refers to Luther in a manner reminiscent of de Wette and Gunkel, once again understands the Psalm positively, as had Luther, Hengstenberg, and Hupfeld.
The contrast between Hebraism and Judaism that we observed frequently in the preceding discussion emerges in a new version shifted to a later point in time: Weiser sets the teachers of wisdom, in whose ranks he presumes the authors of the Psalms belong, over against the Pharisees. This juxtaposition corresponds for him with the contrast between inward and outward Law-piety. "The poet of the Psalm does not get bogged down in the external aspect of Law-piety. . . . Therefore, his counsel to meditate upon the Law day and night is to be understood less in the sense of an external, acquired Law erudition, such as the strict Jew still pursues today, and more as an admonition to submit oneself unremittingly to Gods will. . . . Already in the Old Testament, the nature of the biblical will of God is that it is manifest not only in individual commandments the fulfillment of which casts off, as it were, the burden of responsibility, but rather as a persisting demand from God which lays claim to the whole person" (pp. 70f.).
In other words, in contrast with the Psalmist whom Weiser has associated with the teachers of wisdom and who knows Gods demands and Gods will for the whole person, every strict Jew who tries to take every single commandment seriously and to live each of them out does not measure up to Gods demands and Gods will. A decision to live in accord with Gods will can become outright dangerous "if it is bent into a calculating recompense-belief and leads to thinking that one can make demands on God. . . . The Jewish faith, as the Old Testament shows many times over, frequently succumbed to such dangers in a variety of ways" (p. 71).
Protestant theological cliche thus obliterates completely the reality of Jewish life. As in Luther, Jewish life in accord with the Torahbe it the most devout and perfect on earthstill remains imprisoned in the sphere of works-righteousness. Apart from Jesus Christ, the attempt to live a life according to the Law is condemned to failure and is conceivable only as coerced obedience or as avaricious desire for a reward from God.
Finally, Hans-Joachim Krauss commentary, Psalmen, BK.AT, XV/1, in the fifth, thoroughly revised and updated edition published in Neukirchen-Vluyn in 1978 (1st ed., 1960; 2nd ed., 1961 [skimmed]; 3rd ed., 1966; 4th ed., 1972).
Like Weiser, Kraus, approaching the Psalm as a form-critic, understands it in a positive sense as a didactic wisdom poem, specifically a Torah-Psalm. Analogously to the concern expressed in his 1950/51 article cited at the beginning, Kraus here says of the term hrwt, "Every narrowing of the term Law and every judging of Jewish nomism is to be rejected" (p. 142).
More cautiously phrased than Weiser but in substance similar to him, he says at the end of his commentary on the Psalm that the way it pictures the qydc, "the righteous person," shows characteristics of the superindividualistic paradigm which "the Pharisee, with his external, rigourous Law observance is unable to fulfill" (p. 142). The hrwt has been fulfilled only by Jesus Christ, through whom and by whom Christians have been translated into the fortunate state of being the nova creatura of the qydc. "Salus extra Christum non est."
The first model, seen in Luther, Hengstenberg, Weiser, and Kraus, is marked by positive interpretation of the Psalm and consequently by Christian appropriation of it. On the other hand, Jews are deemed incapable of attaining the theological level of the Psalm both in theory and practice because (reducing what these interpreters say to its essence) Jews in their strict adherence to nomism cut themselves off from the Christian truth.
The representatives of this model can be differentiated further: whereas Luther reads the Psalm completely unhistorically, Hengstenberg, and especially Weiser and Kraus, seek to place it in historical perspective. However, this has no effect on their Christian appropriation of the Psalm.
With certain restrictions Hupfelds commentary can also be included with this model of interpretation. He too understands the Psalm positively and views Jewish use of it negatively, but he rejects any Christian appropriation of it.
The second model, found in Duhm, Kittel, Bertholet, Gunkel, and Schmidt, is that of religio-historical degeneration. The distinguishing feature of this model is that the Psalm is seen as the product of a "decayed post-prophetic Judaism." A logical consequence, as Duhm explains (p. 5), is that "an unconditional appropriation of the content of Ps. 1" is prohibited.
The third model of interpretation, represented by de Wette, is that of religio-historical progression. In contrast with the Hebrew-Jewish level of religious development, which is characterized as external and superficial, Christian religiousness is seen as more spiritual, more inward, and thus stands qualitatively higher on the religious scale.
If one were to look for a common basis of the anti-Jewish statements of these exegetes, a decisive factor, in my opinion, is Christology, more specifically, the Reformations justification-Christology with its exclusivistic, anti-Jewish configuration. This can be demonstrated explicitly only for Model 1 commentators. Yet, since the notion of Jewish nomism runs through all the commentaries, the anti-Jewish statements of Model 2 and Model 3 commentators can also be traced ultimately to the Reformations justification-Christology.
I find indirect confirmation of the above in the fact that in nine of the Roman Catholic commentaries of the nineteenth and twentieth centuries (the nine are actually all there are) noor at least no explicitanti-Jewish interpretations of Psalm 1 are evident. As I see it, this is because the doctrine of justification by grace through faith plays a much smaller role in the Roman Catholic tradition than it does in Protestantism. Consequently, the Roman Catholic tradition does not manifest a fear, bordering on the pathological, of Law observance.
I would like to conclude with a brief exegesis of Ps. 1:2 by an unknown Torah scholar taken from the Midrash Tehillim I.12, which could serve to encourage modesty in Christian interpreters. The text reads: "On the contrary, he has his delight in the Torah of the Eternal One; this refers to the seven commandments enjoined on Noahs children." The scholar could have made it much easier for himself if he had applied the verse to his own Torah studies and to that of his colleagues. It could have been a nice self-affirmation. But no, he applies the verse to us who belong to the "nations" and praises us as happy (Ps. 1:1a) if we cheerfully seek to live according to the Noachide commandments. Up to the present time, one seeks in vain for a comparable Christian interpretation, which praises Jews for their joyous delight in the Torah.
This article presents a detailed analysis of the different forms of anti-Jewish interpretations of Psalm 1 by M. Luther and in Modern German Protestantism (as exemplified by W.M.L de Wette, E.W. Hengstenberg, H. Hupfeld, B. Duhm, R. Kittel, H. Gunkel, A. Weiser, and H. -J. Kraus). These commentaries reviewed fall into three models of interpretation. The first model is marked by positive interpretation and Christian appropriation. In this model the Jews are deemed incapable of attaining the theological level of the Psalm, becauseand reducing what these interpreters say to its essencethe Jews in their strict adherence to nomism cut themselves off from the Christian truth. The second model is that of religio-historical degeneration. The distinguishing feature of this model is that the Psalm is seen as the product of a "decayed post-prophetic Judaism." The third model is that of religio-historical progression. In contrast with the Hebrew-Jewish level of religious development, which is characterized as external and superficial, Christian religiousness is seen as more spiritual, more inward, and thus it is considered higher on the religious scale. If one were to look for a common basis of the anti-Jewish statements of these exegetes, a decisive factor, in my opinion, is Christology, more specifically, the Reformations justification-Christology with its exclusivist, anti-Jewish configuration. | 2019-04-26T16:39:49Z | http://www.jhsonline.org/Articles/article8.htm |
"Red October" redirects here. For other uses, see Red October (disambiguation) and October Revolution (disambiguation).
The October Revolution,[a] officially known in Soviet historiography as the Great October Socialist Revolution[b] and commonly referred to as the October Uprising, the October Coup, the Bolshevik Revolution, the Bolshevik Coup or the Red October, was a revolution in Russia led by the Bolshevik Party of Vladimir Lenin that was instrumental in the larger Russian Revolution of 1917. It took place with an armed insurrection in Petrograd on 7 November (25 October, O.S.) 1917. The Bolshevik Party and the left fraction of Socialist Revolutionary Party - a fraction calling to stop the war and land to the peasants with overwhelming support from the countryside - actually had a majority in the Russian population.
At first, the event was referred to as the October coup (Октябрьский переворот) or the Uprising of 3rd, as seen in contemporary documents (for example, in the first editions of Lenin's complete works). In Russian, however, "переворот" has a similar meaning to "revolution" and also means "upheaval" or "overturn", so "coup" is not necessarily the correct translation. With time, the term October Revolution (Октябрьская революция) came into use. It is also known as the "November Revolution" having occurred in November according to the Gregorian Calendar (for details, see Soviet calendar).
The February Revolution had toppled Tsar Nicholas II of Russia, and replaced his government with the Russian Provisional Government. However, the provisional government was weak and riven by internal dissension. It continued to wage World War I, which became increasingly unpopular. A nationwide crisis developed in Russia, affecting social, economic, and political relations. Disorder in industry and transport had intensified, and difficulties in obtaining provisions had increased. Gross industrial production in 1917 had decreased by over 36% from what it had been in 1914. In the autumn, as much as 50% of all enterprises were closed down in the Urals, the Donbas, and other industrial centers, leading to mass unemployment. At the same time, the cost of living increased sharply. Real wages fell about 50% from what they had been in 1913. Russia's national debt in October 1917 had risen to 50 billion rubles. Of this, debts to foreign governments constituted more than 11 billion rubles. The country faced the threat of financial bankruptcy.
Throughout June, July, and August 1917, it was common to hear working-class Russians speak about their lack of confidence and misgivings with those in power in the Provisional Government. Factory workers around Russia felt unhappy with the growing shortages of food, supplies, and other materials. They blamed their own managers or foremen and would even attack them in the factories. The workers blamed many rich and influential individuals, such as elites in positions of power, for the overall shortage of food and poor living conditions. Workers labelled these rich and powerful individuals as opponents of the Revolution, and called them words such as "bourgeois, capitalist, and imperialist."
In September and October 1917, there were mass strike actions by the Moscow and Petrograd workers, miners in Donbas, metalworkers in the Urals, oil workers in Baku, textile workers in the Central Industrial Region, and railroad workers on 44 railway lines. In these months alone, more than a million workers took part in strikes. Workers established control over production and distribution in many factories and plants in a social revolution. Workers were able to organize these strikes through factory committees. The factory committees represented the workers and were able to negotiate better working conditions, pay, and hours. Even though workplace conditions may have been increasing in quality, the overall quality of life for workers was not improving. There were still shortages of food and the increased wages workers had obtained did little to provide for their families.
By October 1917, peasant uprisings were common. By autumn the peasant movement against the landowners had spread to 482 of 624 counties or 77% of the country. As 1917 progressed the peasantry increasingly began to lose faith that the land would be distributed to them by the Social Revolutionaries and the Mensheviks. Refusing to continue living as before they increasingly took measures into their own hands as can be seen by the increase in the number and militancy of the peasant's actions. From the beginning of September to the October Revolution there were over a third as many peasant actions than had been recorded since March. Over 42% of all the cases of destruction (usually burning down and seizing property from the landlord's estate) recorded between February and October occurred in October . While the uprisings varied in severity, complete uprisings and seizures of the land were not uncommon. Less robust forms of protest included marches on landowner manors and government offices, as well as withholding and storing grains rather than selling them as a result of the economic crisis. When the Provisional Government sent punitive detachments, it only enraged the peasants. The garrisons in Petrograd, Moscow, and other cities, the Northern and Western fronts, and the sailors of the Baltic Fleet in September declared through their elected representative body Tsentrobalt that they did not recognize the authority of the Provisional Government and would not carry out any of its commands.
Soldiers' wives were key players in unrest in the village. From 1914 to 1917, almost 50% of healthy men were sent to war, and many were killed on the front, resulting in a female occupation of the position of the household head. When government allowances were often late and were not sufficient to match the rising costs of goods, soldiers' wives sent masses of appeals and letters to the government, which largely were left unanswered. Frustration resulted, and these women were influential in inciting "subsistence riots" – also referred to as "hunger riots," "pogroms," or "baba riots". In these riots, citizens seized food and resources from shop owners who they believed to be charging unfair prices. Upon police intervention, protesters responded with "rakes, sticks, rocks and fists".
In a diplomatic note of 1 May, the minister of foreign affairs, Pavel Milyukov, expressed the Provisional Government's desire to continue the war against the Central Powers "to a victorious conclusion", arousing broad indignation. On 1–4 May, about 100,000 workers and soldiers of Petrograd, and after them the workers and soldiers of other cities, led by the Bolsheviks, demonstrated under banners reading "Down with the war!" and "all power to the soviets!" The mass demonstrations resulted in a crisis for the Provisional Government. 1 July saw more demonstrations, as about 500,000 workers and soldiers in Petrograd demonstrated, again demanding "all power to the soviets", "down with the war", and "down with the ten capitalist ministers". The Provisional Government opened an offensive against the Central Powers on 1 July, which soon collapsed. The news of the offensive and its collapse intensified the struggle of the workers and the soldiers. A new crisis in the Provisional Government began on 15 July.
On 16 July, spontaneous demonstrations of workers and soldiers began in Petrograd, demanding that power be turned over to the soviets. The Central Committee of the Russian Social Democratic Labour Party provided leadership to the spontaneous movements. On 17 July, over 500,000 people participated in what was intended to be a peaceful demonstration in Petrograd, the so-called July Days. The Provisional Government, with the support of Socialist-Revolutionary Party-Menshevik leaders of the All-Russian Executive Committee of the Soviets, ordered an armed attack against the demonstrators, killing hundreds.
A period of repression followed. On 5–6 July, attacks were made on the editorial offices and printing presses of Pravda and on the Palace of Kshesinskaya, where the Central Committee and the Petrograd Committee of the Bolsheviks were located. On 7 July, the government ordered the arrest and trial of Vladimir Lenin. He was forced to go underground, as he had been under the Tsarist regime. Bolsheviks were arrested, workers were disarmed, and revolutionary military units in Petrograd were disbanded or sent to the war front. On 12 July, the Provisional Government published a law introducing the death penalty at the front. The second coalition government was formed on 24 July, chaired by Alexander Kerensky.
Another problem for the government centered on General Lavr Kornilov, who had been Commander-in-Chief since 18 July. In response to a Bolshevik appeal, Moscow's working class began a protest strike of 400,000 workers. They were supported by strikes and protest rallies by workers in Kiev, Kharkov, Nizhny Novgorod, Ekaterinburg, and other cities.
In what became known as the Kornilov affair, Kornilov directed an army under Aleksandr Krymov to march toward Petrograd to restore order to Russia, with Kerensky's agreement. Details remain sketchy, but Kerensky appeared to become frightened by the possibility the army would stage a coup, and reversed the order. By contrast, historian Richard Pipes has argued that the episode was engineered by Kerensky. On 27 August, feeling betrayed by the government, Kornilov pushed on towards Petrograd. With few troops to spare on the front, Kerensky turned to the Petrograd Soviet for help. Bolsheviks, Mensheviks and Socialist Revolutionaries confronted the army and convinced them to stand down. The Bolsheviks' influence over railroad and telegraph workers also proved vital in stopping the movement of troops. Right-wingers felt betrayed, and the left wing was resurgent.
With Kornilov defeated, the Bolsheviks' popularity in the soviets grew significantly, both in the central and local areas. On 31 August, the Petrograd Soviet of Workers and Soldiers Deputies, and on 5 September, the Moscow Soviet Workers Deputies adopted the Bolshevik resolutions on the question of power. The Bolsheviks won a majority in the Soviets of Briansk, Samara, Saratov, Tsaritsyn, Minsk, Kiev, Tashkent, and other cities.
Vladimir Lenin, who had been living in exile in Switzerland, organised a plan with other dissidents to negotiate a passage for them through Germany, with whom Russia was then at war. Recognising that these dissidents could cause problems for their Russian enemies, the German government agreed to permit 32 Russian citizens to travel in a "sealed" train carriage through their territory, among them Lenin and his wife. According to the Deutsche Welle, "On November 7, 1917, a coup d'état went down in history as the October Revolution. The interim government was toppled, the Soviets seized power, and Russia later terminated the Triple Entente military alliance with France and Britain. For Russia, it was effectively the end of the war. Kaiser Wilhelm II had spent around half a billion euros ($582 million) in today's money to weaken his wartime enemy."
On 23 October 1917 (5 November New Style), the Bolsheviks' Central Committee voted 10–2 for a resolution saying that "an armed uprising is inevitable, and that the time for it is fully ripe". At the Committee meeting, Lenin discussed how the people of Russia had waited long enough for "an armed uprising", and it was the Bolsheviks' time to take power. Lenin expressed his confidence in the success of the planned insurrection. His confidence stemmed from months of Bolshevik buildup of power and successful elections to different committees and councils in major cities such as Petrograd and Moscow.
The Bolsheviks created a revolutionary military committee within the Petrograd soviet, led by the soviet's president, Trotsky. The committee included armed workers, sailors and soldiers, and assured the support or neutrality of the capital's garrison. The committee methodically planned to occupy strategic locations through the city, almost without concealing their preparations: the Provisional Government's president Kerensky was himself aware of them, and some details, leaked by Kamenev and Zinoviev, were published in newspapers.
In the early morning of 24 October (6 November N.S.), a group of soldiers loyal to Kerensky's government marched on the printing house of the Bolshevik newspaper, Rabochy put (Worker's Path), seizing and destroying printing equipment and thousands of newspapers copies. Shortly thereafter the government announced the immediate closure of not only Rabochy put but also the left-wing Soldat as well as the far-right newspapers Zhivoe slovo and Novaia Rus'. The editors of these newspapers, as well as any authors seen to be calling for insurrection, were to be prosecuted on criminal charges.
In response, at 9 AM the Military Revolutionary Committee issued a statement denouncing the government's actions. At 10 AM, Bolshevik-aligned soldiers successfully retook the Rabochy put printing house. Kerensky responded at approximately 3 PM that afternoon by ordering the raising of all but one of Petrograd's bridges, a tactic used by the government several months earlier in the July Days. What followed was a series of sporadic clashes over control of the bridges between Red Guard militias aligned with the Military Revolutionary Committee and military regiments still loyal to the government. At approximately 5 PM the Military Revolutionary Committee seized the Central Telegraph of Petrograd, giving the Bolsheviks control over communications through the city.
On 25 October (7 November new style) 1917, Bolsheviks led their forces in the uprising in Petrograd (now St. Petersburg, then capital of Russia) against the Kerensky Provisional Government. The event coincided with the arrival of a flotilla of pro-Bolshevik marines, primarily five destroyers and their crews, in St. Petersburg harbor. At Kronstadt, sailors also announced their allegiance to the Bolshevik insurrection. In the early morning, the military-revolutionary committee planned the last of the locations to be assaulted or seized from its heavily guarded and picketed center in Smolny Palace. The Red Guards systematically captured major government facilities, key communication installations and vantage points with little opposition. The Petrograd Garrison and most of the city's military units joined the insurrection against the Provisional Government.
Kerensky and the Provisional Government were virtually helpless to offer significant resistance. Railways and railway stations had been controlled by Soviet workers and soldiers for days, making rail travel to and from Petrograd impossible for Provisional Government officials. The Provisional Government was also unable to locate any serviceable vehicles. On the morning of the insurrection, Kerensky desperately searched for a means of reaching military forces he hoped would be friendly to the Provisional Government outside the city, and ultimately borrowed a Renault car from the American embassy, which he drove from the Winter Palace alongside a Pierce Arrow. Kerensky was able to evade the pickets going up around the palace and drive to meet approaching soldiers.
As Kerensky left Petrograd, Lenin wrote a proclamation "To the Citizens of Russia" stating that the Provisional Government had been overthrown by the Military Revolutionary Committee. The proclamation was sent by telegraph throughout Russia even as the pro-Soviet soldiers were seizing important control centers throughout the city. One of Lenin's intentions was to present members of the Soviet congress, who would assemble that afternoon, with a fait accompli and thus forestall further debate on the wisdom or legitimacy of taking power.
A bloodless insurrection occurred with a final assault against the Winter Palace, with 3,000 cadets, officers, cossacks and female soldiers poorly defending the Winter Palace. The Bolsheviks delayed the assault because the revolutionaries could not find functioning artillery. The Bolsheviks also prolonged the assault for fear of violence since the insurrection did not generate violent outbreaks. At 6:15 p.m., a large group of artillery cadets abandoned the palace, taking their artillery with them. At 8:00 p.m., 200 cossacks left the palace and returned to their barracks. While the cabinet of the provisional government within the palace debated what action to take, the Bolsheviks issued an ultimatum to surrender. Workers and soldiers occupied the last of the telegraph stations, cutting off the cabinet's communications with loyal military forces outside the city. As the night progressed, crowds of insurgents surrounded the palace, and many infiltrated it. While Soviet historians and officials tended to depict the event in heroic terms, the insurrection and even the seizure of the Winter Palace happened almost without resistance. At 9:45 p.m, the cruiser Aurora fired a blank shot from the harbor. Some of the revolutionaries entered the Palace at 10:25 p.m. and there was a mass entry 3 hours later. By 2:10 a.m on 26 October Bolshevik forces had gained control of the palace. After sporadic gunfire throughout the building, the cabinet of the provisional government had surrendered. The only member who was not arrested was Kerensky himself who had already left the Palace.
Later official accounts of the revolution from the Soviet Union would depict the events in October as being far more dramatic than they actually had been. (See a first-hand account by British General Knox.) This was aided by the historical reenactment, entitled The Storming of the Winter Palace, which was staged in 1920. This reenactment, watched by 100,000 spectators, provided the model for official films made much later, which showed a huge storming of the Winter Palace and fierce fighting. In reality, the Bolshevik insurgents faced little opposition. The insurrection was timed and organized to hand state power to the Second All-Russian Congress of Soviets of Workers' and Soldiers' Deputies, which began on 25 October (7 November new style). After a single day of revolution, the death toll was low not because Bolsheviks decided not to use artillery fire, but instead because the class struggle was used as the strongest weapon.
Soviet government archives show that parties of Bolshevik operatives sent from the Smolny Institute by Lenin took over all critical central power in Petrograd in the early hours of the first night without a significant number of shots fired. This was completed so efficiently that the takeover resembled the changing of the guard. There was not much of a storming of the Winter Palace because the resistance basically did not exist and at 2:10 a.m. on 26 October (8 November new style) 1917 the Red Guards took control of the Winter Palace. The Cossacks deserted when the Red Guard approached, and the Cadets and the 140 volunteers of the Women's Battalion surrendered rather than resist the 40,000 strong army. The Aurora was commandeered to then fire blanks at the palace in a symbolic act of rejection of the government. The Bolsheviks effectively controlled the almost unoccupied Winter Palace not because of an intense military barrage, but because the back door was left open, allowing the Red Guard to enter. The Provisional Government was arrested and imprisoned in Peter and Paul Fortress after the ministers resigned to fate and surrendered without a fight, and officially overthrown.
Later stories of the heroic "Storming of the Winter Palace" and "defense of the Winter Palace" were later propaganda by Bolshevik publicists. Grandiose paintings depicting the "Women's Battalion" and photo stills taken from Sergei Eisenstein's staged film depicting the "politically correct" version of the October events in Petrograd came to be taken as truth.
With the Petrograd Soviet now in control of government, garrison and proletariat, the Second All Russian Congress of Soviets held its opening session on the day, while Trotsky dismissed the opposing Mensheviks and the Socialist Revolutionaries (SR) from Congress.
Some sources contend that as the leader of Tsentrobalt, Pavlo Dybenko played an enormous role in the revolt. It is said[who?] that the ten warships that entered the city with ten thousand Baltic fleet mariners was the force that actually took the power in Petrograd and put down the Provisional Government. The same mariners then dispersed by force the elected parliament of Russia, and used machine-gun fire against protesting demonstrators in Petrograd. About 100 demonstrators were killed, and several hundreds wounded. Dybenko in his memoirs mentioned this event as "several shots in the air". These are disputed by various sources such as Louise Bryant, who claims that news outlets in the West at the time reported that the unfortunate loss of life occurred in Moscow, not Petrograd, and the number was much less than suggested above. As for the "several shots in the air", there is little evidence suggesting otherwise.
The Second Congress of Soviets consisted of 670 elected delegates; 300 were Bolshevik and nearly a hundred were Left Socialist-Revolutionaries, who also supported the overthrow of the Alexander Kerensky Government. When the fall of the Winter Palace was announced, the Congress adopted a decree transferring power to the Soviets of Workers', Soldiers' and Peasants' Deputies, thus ratifying the Revolution.
The transfer of power was not without disagreement. The center and Right wings of the Socialist Revolutionaries as well as the Mensheviks believed that Lenin and the Bolsheviks had illegally seized power and they walked out before the resolution was passed. As they exited, they were taunted by Leon Trotsky who told them "You are pitiful isolated individuals; you are bankrupts; your role is played out. Go where you belong from now on — into the dustbin of history!"
The following day, 26 October, the Congress elected a new cabinet of Bolsheviks, pending the convocation of a Constituent Assembly. This basis for the new Soviet government was known as the Council (Soviet) of People's Commissars (Sovnarkom), with Lenin as leader. Lenin allegedly approved of the name, reporting that it "smells of revolution". The cabinet quickly passed the Decree on Peace and the Decree on Land. This new government was also officially called "provisional" until the Assembly was dissolved. Posters were pinned on walls and fences by the Right Socialist Revolutionaries, describing the takeover as a "crime against the motherland and revolution".
On 27 October 1917 (9 November new style), the Mensheviks seized power in Georgia and declared it an independent republic. The Don Cossacks also claimed control of their own government. The biggest Bolshevik strongholds were in the cities, particularly Petrograd, with support much more mixed in rural areas. The peasant dominated Left SR Party was in coalition with the Bolsheviks. There are reports that the Provisional Government had not conceded defeat and are meeting with the army at the Front.
On 28 October 1917,(10 November new style) some posters and newspapers started criticizing the actions of the Bolsheviks and refuted their authority. The Executive Committee of Peasants Soviets "[refuted] with indignation all participation of the organised peasantry in this criminal violation of the will of the working class". On 29 October 1917, opposition to the Bolsheviks developed into major counter-revolutionary action. Cossacks entered Tsarskoye Selo on outskirts of Petrograd with Kerensky riding on a white horse welcomed by church bells. Kerensky gave an ultimatum to the rifle garrison to lay down weapons, which was promptly refused. They were then fired upon by Kerensky's Cossacks, which resulted in 8 deaths. This turned soldiers in Petrograd against Kerensky because he was just like the Tsarist regime. Kerensky's failure to assume authority over troops was described by John Reed as a 'fatal blunder' that signalled the final death of the government.
On 30 October 1917 (12 November new style), the battle against the anti-Bolsheviks continued. The Red Guard fought against Cossacks at Tsarskoye Selo, with the Cossacks breaking rank and fleeing, leaving their artillery behind.
On 31 October 1917 (13 November new style), the Bolsheviks gained control of Moscow after a week of bitter street-fighting. Artillery had been freely used with an estimated 700 casualties. However, there was still continued support for Kerensky in some of the provinces.
On 1 November 1917 (14 November new style), there was an appeal to anti-Bolsheviks throughout Russia to join the new government of the people, with the Bolsheviks winning even more support from the Russian people.
On 2 November 1917 (15 November new style), there was only minor public anti-Bolshevik sentiment; for example, the newspaper Novaya Zhizn criticised the lack of manpower and organisation of the Bolsheviks to run a party, let alone a government. Lenin confidently claimed that there is "not a shadow of hesitation in the masses of Petrograd, Moscow and the rest of Russia" towards Bolshevik rule.
On 10 November 1917 (23 November new style), the government sought to label its citizens as "citizens of the Russian Republic," and make them equal in all possible respects. This was accomplished by the nullification of all "legal designations of civil equality, such as estates, titles, and ranks."
The elections to the Constituent Assembly took place in November 1917. The Bolsheviks gained 23.9% of the vote.
On 12 November (25 November new style), a Constituent Assembly was elected. In these elections, 26 mandatory delegates were proposed by the Bolshevik Central Committee and 58 were proposed by the Socialist Revolutionaries. The outcome of the election gave the majority to the Socialist Revolutionary Party, which no longer existed as a full party by that time, as the Left SR Party was in coalition with the Bolsheviks. The Bolsheviks dissolved the Constituent Assembly in January 1918, when it came into conflict with the Soviets.
On 16 December 1917 (29 December 1917 new style), the government ventured to eliminate hierarchy in the army, removing all titles, ranks, and uniform decorations. The tradition of saluting was also eliminated.
On 20 December 1917 (2 January 1918 new style), the Cheka was created by the decree of Vladimir Lenin. These were the beginnings of the Bolsheviks' consolidation of power over their political opponents. The Red Terror was started in September 1918, following a failed assassination attempt on Lenin's life. The Jacobin Terror was an example for the Soviet Bolsheviks. Leon Trotsky had compared Lenin to Maximilien Robespierre as early as 1904.
All private property was nationalized by the government.
All Russian banks were nationalized.
Private bank accounts were expropriated.
The properties of the Church (including bank accounts) were expropriated.
All foreign debts were repudiated.
Control of the factories was given to the soviets.
Wages were fixed at higher rates than during the war, and a shorter, eight-hour working day was introduced.
All private property were not nationalized by the government in the days, weeks and months that followed the revolution 25th of October 1917 according to the Julian calendar and 7th November in the Gregorian calendar. The government of the Bolshevik party and Left SR denied taking steps to support the working class population establishing their collective power of the main corporations and from there collectively organize the economy. As chairman of the government Lenin negotiated with fractions of the upper bourgeoisie. The aim was the bourgeoisie to manage the corporations according to orders and decisions from the new government. This failed utterly because it presupposed the masses to accept class cooperation in a revolutionary situation. It is in this context the Bolshevik party understood 'workers control' as checking and supervision by the employees to secure that orders from the government were followed. Instead some factories continued to be in private hands because the masses either had no local knowledge or they hesitated to act as supporters of the Bolshevik party. Other factories were taken over by the employees and some by the government after pressure from below or by initiative from the new government. This mess was rooted in lack of class consciousness of the masses who put their hands in an authoritarian political party. Only a minority of the working class population fought to establish a democratic rule of the main capitalist factories.
The Bolshevik party opposed that the masses should rule the economy from below just as it also opposed that the political institutions to be ruled from below. That the government ultimately established state ownership in charge of the economy did not express any direct power from below. Through democratic elections in the soviets autumn 1917 did the Bolshevik party build its power to control of the trade unions which became state institutions. Later the same year the factory committees were subordinated to the trade unions. From this power base was it not so difficult to establish a one-man-rule of the factories. One administrative and one technical manager had the daily control but the technical manager had the last word related to the economy independent of what the employees wanted. The technical manager took orders from higher organs in the state. If the orders were not followed could other organs appeal to higher authorities or the government. The system of one-man-management was fiercely defended by Lenin on a trade union congress in spring 1918 where he said if the party is not in charge the whole point of a party ceased to exist and thereby the revolution itself. So much about Lenin's presumed democratic method.
A system of appointment from above was established step by step. Local soviets resisting this policy were either met with armed Cheka troops and forced to submit or the soviets were denied access to ration cards for food and fuel to heat the living apartments and to make food. That the Bolshevik party blocked democratic elections to both the soviets, factory committees, the trade unions and other institutions made this transfer of power easier than expected.
October revolution manifested a political revolution by taking down the old regime but failed to established a democratic council system from below. That the economy was not transferred into the masses reflected what happened in the political institutions. The very elite on the top of the political institutions understood itself as crucial for the world revolution but ended up as blocking all power from below. When the same elite also got power of the economy and the economic surplus answering only to itself is it correct to say the elite in reality transformed itself into a ruling state capitalist class. Later the Bolshevik party went further by claiming the working class had to be put under marshal law to obey the government - Sovnarkom. This development turned out to lead to a totalitarian state where Stalin just did what was exercised under Lenin and Trotsky but on a wider scale.
Bolshevik-led attempts to gain power in other parts of the Russian Empire were largely successful in Russia proper — although the fighting in Moscow lasted for two weeks — but they were less successful in ethnically non-Russian parts of the Empire, which had been clamoring for independence since the February Revolution. For example, the Ukrainian Rada, which had declared autonomy on 23 June 1917, created the Ukrainian People's Republic on 20 November, which was supported by the Ukrainian Congress of Soviets. This led to an armed conflict with the Bolshevik government in Petrograd and, eventually, a Ukrainian declaration of independence from Russia on 25 January 1918. In Estonia, two rival governments emerged: the Estonian Provincial Assembly, established in April 1917, proclaimed itself the supreme legal authority of Estonia on 28 November 1917 and issued the Declaration of Independence on 24 February 1918. Soviet Russia recognized the Executive Committee of the Soviets of Estonia as the legal authority in the province, although the Soviets in Estonia controlled only the capital and a few other major towns. The success of the October Revolution transformed the Russian state into a soviet republic. A coalition of anti-Bolshevik groups attempted to unseat the new government in the Russian Civil War from 1918 to 1922.
In an attempt to intervene in the civil war after the Bolsheviks' separate peace with the Central Powers, the Allied powers (United Kingdom, France, Italy, United States and Japan) occupied parts of the Soviet Union for over two years before finally withdrawing. The United States did not recognize the new Russian government until 1933. The European powers recognized the Soviet Union in the early 1920s and began to engage in business with it after the New Economic Policy (NEP) was implemented.
Few events in historical research have been as conditioned by political influences as the October Revolution. The historiography of the Revolution generally divides into three camps: the Soviet-Marxist view, the Western-Totalitarian view, and the Revisionist view.
Soviet historiography of the October Revolution is intertwined with Soviet historical development. Many of the initial Soviet interpreters of the Revolution were themselves Bolshevik revolutionaries. After the initial wave of revolutionary narratives, Soviet historians worked within "narrow guidelines" defined by the Soviet government. The rigidity of interpretive possibilities reached its height under Joseph Stalin.
Soviet historians of the October Revolution interpreted the Revolution with regard to establishing the legitimacy of Marxist ideology, and also the Bolshevik government. To establish the accuracy of Marxist ideology, Soviet historians generally described the Revolution as the product of class struggle. They maintained that the Revolution was the supreme event in a world history governed by historical laws. The Bolshevik Party is placed at the center of the Revolution, exposing the errors of both the moderate Provisional Government and the spurious "socialist" Mensheviks in the Petrograd Soviet. Guided by Vladimir Lenin's leadership and his firm grasp of scientific Marxist theory, the Party led the "logically predetermined" events of the October Revolution from beginning to end. The events were, according to these historians, logically predetermined because of the socio-economic development of Russia, where the monopoly industrial capitalism alienated the masses. In this view, the Bolshevik party took the leading role in organizing these alienated industrial workers, and thereby established the construction of the first socialist state.
Following the turn of the 21st century, some Soviet historians began to implement an "anthropological turn" in their historiographical analysis of the Russian Revolution. This method of analysis focuses on the average person's experience of day-to-day life during the revolution, and pulls the analytical focus away from larger events, notable revolutionaries, and overarching claims about party views. In 2006, S. V. Iarov employed this methodology when he focused on citizen adjustment to the new Soviet system. Iarov explored the dwindling labor protests, evolving forms of debate, and varying forms of politicization as a result of the new Soviet rule from 1917 to 1920. In 2010, O. S. Nagornaia took interest in the personal experiences of Russian prisoners of war taken by Germany, examining Russian soldiers and officers' ability to cooperate and implement varying degrees of autocracy despite being divided by class, political views and race. Other analyses following this "anthropological turn" have explored texts from soldiers and how they used personal war experiences to further their political goals, as well as how individual life-structure and psychology may have shaped major decisions in the civil war that followed the revolution.
During the late Soviet period, the opening of select Soviet archives during glasnost sparked innovative research that broke away from some aspects of Marxism–Leninism, though the key features of the orthodox Soviet view remained intact.
During the Cold War, Western historiography of the October Revolution developed in direct response to the assertions of the Soviet view. The Soviet version of the October Revolution conditioned historical interpretations in the United States and the West. As a result, these Western historians exposed what they believed were flaws in the Soviet view, thereby undermining the Bolsheviks' original legitimacy, as well as the precepts of Marxism.
These Western historians described the revolution as the result of a chain of contingent accidents. Examples of these accidental and contingent factors they say precipitated the Revolution included World War I's timing, chance, and the poor leadership of Tsar Nicholas II as well as liberal and moderate socialists. According to Western historians, it was not popular support, but rather manipulation of the masses, ruthlessness, and the superior structure of the Bolsheviks that enabled it to survive. For these historians, the Bolsheviks' defeat in the Constituent Assembly elections of November–December 1917 demonstrated popular opposition to the Bolsheviks' coup, as did the scale and breadth of the Civil War.
Western historians saw the organization of the Bolshevik party as proto-totalitarian. Their interpretation of the October Revolution as a violent coup organized by a proto-totalitarian party reinforced to them the idea that totalitarianism was an inherent part of Soviet history. For them, Stalinist totalitarianism developed as a natural progression from Leninism and the Bolshevik party's tactics and organization.
The dissolution of the USSR affected historical interpretations of the October Revolution. Since 1991, increasing access to large amounts of Soviet archival materials made it possible to re‑examine the October Revolution. Though both Western and Russian historians now have access to many of these archives, the effect of the dissolution of the USSR can be seen most clearly in the work of historians in the former USSR. While the disintegration essentially helped solidify the Western and Revisionist views, post-USSR Russian historians largely repudiated the former Soviet historical interpretation of the Revolution. As Stephen Kotkin argues, 1991 prompted "a return to political history and the apparent resurrection of totalitarianism, the interpretive view that, in different ways…revisionists sought to bury".
The term "Red October" (Красный Октябрь, Krasnyy Oktyabr) has also been used to describe the events of the month. This name has in turn been lent to a steel factory made notable by the Battle of Stalingrad, a Moscow sweets factory that is well known in Russia, and a fictional Soviet submarine.
Ten Days That Shook the World, a book written by American journalist John Reed and first published in 1919, gives a firsthand exposition of the events. Reed died in 1920, shortly after the book was finished.
Dmitri Shostakovich wrote his Symphony No. 2 in B major, Op. 14 and subtitled To October, for the 10th anniversary of the October Revolution. The choral finale of the work, "To October", is set to a text by Alexander Bezymensky, which praises Lenin and the revolution. The Symphony No. 2 was first performed by the Leningrad Philharmonic Orchestra and the Academy Capella Choir under the direction of Nikolai Malko, on 5 November 1927.
Sergei Eisenstein and Grigori Aleksandrov's film October: Ten Days That Shook the World, first released on 20 January 1928 in the USSR and on 2 November 1928 in New York City, describes and glorifies the revolution and was commissioned to commemorate the event.
7 November, the anniversary of the October Revolution, was the official national day of the Soviet Union from 1918 onward and still is a public holiday in Belarus and the breakaway territory of Transnistria.
The October revolution of 1917 also marks the inception of the first communist government in Russia, and thus the first large-scale socialist state in world history. After this Russia became the Russian SFSR and later part of the USSR, which dissolved in late 1991.
^ Russian: Октя́брьская револю́ция, tr. Oktyabr'skaya revolyutsiya, IPA: [ɐkˈtʲabrʲskəjə rʲɪvɐˈlʲutsɨjə].
^ Вели́кая Октя́брьская социалисти́ческая револю́ция, Velikaya Oktyabr'skaya sotsialističeskaya revolyutsiya.
^ History.com Staff. "Russian Revolution." History.com, A&E Television Networks, 2009, www.history.com/topics/russian-revolution.
^ Samaan, A.E. (2 February 2013). From a "Race of Masters" to a "Master Race": 1948 to 1848. A.E. Samaan. p. 346. ISBN 0615747884. Retrieved 9 February 2017.
^ Jennifer Llewellyn, John Rae and Steve Thompson (2014). "The Constituent Assembly". Alpha History.
^ Bunyan & Fisher 1934, p. 385.
^ a b Steinberg, Mark (2017). The Russian Revolution 1905-1917. New York: Oxford University Press. pp. 143–146. ISBN 978-0-19-922762-4.
^ Trotsky, Leon (1934). History of the Russian Revolution. London: The Camelot Press ltd. p. 859-864.
^ "Steinberg, Mark (2017). The Russian Revolution 1905-1921. New York: Oxford University Press. pp. 196–197. ISBN 978-0-19-922762-4."
^ Upton, Anthony F. (1980). The Finnish Revolution: 1917-1918. Minneapolis, Minnesota: University of Minnesota Press. p. 89. ISBN 9781452912394.
^ Steinberg, Mark D. (2017). The Russian Revolution 1905-1921. Oxford, United Kingdom: Oxford University Press. pp. 191, 193–194. ISBN 9780199227624.
^ Richard Pipes (1990). The Russian Revolution. Knopf Doubleday. p. 407.
^ Michael C. Hickey (2010). Competing Voices from the Russian Revolution: Fighting Words: Fighting Words. ABC-CLIO. p. 559.
^ Pipes, 1997. p. 51. "There is no evidence of a Kornilov plot, but there is plenty of evidence of Kerensky's duplicity."
^ "Central Committee Meeting—10 Oct 1917".
^ Steinberg, Mark (2001). Voices of the Revolution, 1917. Binghamton, New York: Yale University Press. p. 170. ISBN 0300090161.
^ "1917 – La Revolution Russe". Arte TV. 16 September 2007. Archived from the original on 1 February 2016. Retrieved 25 January 2016.
^ Bard College: Experimental Humanities and Eurasian Studies. "From Empire To Republic: October 24 – November 1, 1917". Retrieved 24 February 2018.
^ "1917 Free History". Yandex Publishing. Retrieved 8 November 2017.
^ Jonathan Schell, 2003. 'The Mass Minority in Action: France and Russia'. For example, in The Unconquerable World. London: Penguin, pp. 167–185.
^ "ВОЕННАЯ ЛИТЕРАТУРА --[ Мемуары ]-- Дыбенко П.Е. Из недр царского флота к Великому Октябрю".
^ Steinberg, Mark D. (2001). Voices of Revolution, 1917. Yale University. p. 251. ISBN 978-0300101690.
^ a b Steinberg, Mark D. (2001). Voices of Revolution. Yale University. p. 257.
^ Ward, John (2004). With the "Die-Hards" in Siberia. Dodo Press. p. 91. ISBN 1409906809.
^ Edward Acton, Critical Companion to the Russian Revolution, 1914–1921 (Bloomington: Indiana University Press, 1997), 5.
^ Stephen Kotkin, "1991 and the Russian Revolution: Sources, Conceptual Categories, Analytical Frameworks," The Journal of Modern History 70 (October 1998): 392.
^ a b c Acton, Critical Companion, 7.
^ Acton, Critical Companion, 8.
^ Alter Litvin, Writing History in Twentieth-Century Russia, (New York: Palgrave, 2001), 49–50.
^ Roger Markwick, Rewriting History in Soviet Russia: The Politics of Revisionist Historiography, (New York: Palgrave, 2001), 97.
^ Markwick, Rewriting History, 102.
^ Smith, S. A. (2015). "The historiography of the Russian Revolution 100 Years On". Kritika: Explorations in Russian and Eurasian History. 16: 733–749 – via Project MUSE.
^ Iarov, S.V. (2006). "Konformizm v Sovetskoi Rossii: Petrograd, 1917-20". Evropeiskii dom.
^ Nagornaia, O. S. (2010). "Drugoi voennyi opyt: Rossiiskie voennoplennye Pervoi mirovoi voiny v Germanii (1914-1922)". Novyi khronograf.
^ Morozova, O. M. (2010). "Dva akta dramy: Boevoe proshloe i poslevoennaia povsednevnost ' verteranov grazhdanskoi voiny". Rostov-on-Don: Iuzhnyi nauchnyi tsentr Rossiiskoi akademii nauk.
^ O. M., Morozova (2007). "Antropologiia grazhdanskoi voiny". Rostov-on-Don: Iuzhnyi nauchnyi tsentr RAN.
^ Acton, Critical Companion, 6–7.
^ Norbert Francis, "Revolution in Russia and China: 100 Years," International Journal of Russian Studies 6 (July 2017): 130-143.
^ Stephen E. Hanson (1997). Time and Revolution: Marxism and the Design of Soviet Institutions. U of North Carolina Press. p. 130.
^ Kotkin, "1991 and the Russian Revolution," 385-86.
^ Litvin, Writing History, 47.
^ Kotkin, "1991 and the Russian Revolution," 385.
Ascher, Abraham (2014). The Russian Revolution: A Beginner's Guide. Oneworld Publications.
Beckett, Ian F. W. (2007). The Great war (2 ed.). Longman. ISBN 1-4058-1252-4.
Bone, Ann (trans.) (1974). The Bolsheviks and the October Revolution: Central Committee Minutes of the Russian Social-Democratic Labour Party (Bolsheviks) August 1917-February 1918. Pluto Press. ISBN 0-902818546.
Bunyan, James; Fisher, Harold Henry (1934). The Bolshevik Revolution, 1917–1918: Documents and Materials. Palo Alto: Stanford University Press. OCLC 253483096.
Chamberlin, William Henry (1935). The Russian Revolution. I: 1917–1918: From the Overthrow of the Tsar to the Assumption of Power by the Bolsheviks. Old Classic.
Figes, Orlando (1996). A People's Tragedy: The Russian Revolution: 1891–1924. Pimlico.
Guerman, Mikhail (1979). Art of the October Revolution.
Kollontai, Alexandra (1971). "The Years of Revolution". The Autobiography of a Sexually Emancipated Communist Woman. New York: Herder and Herder. OCLC 577690073.
Krupskaya, Nadezhda (1930). "The October Days". Reminiscences of Lenin. Moscow: Foreign Languages Publishing House. OCLC 847091253.
Luxemburg, Rosa (1940) . The Russian Revolution. Translated by Bertram Wolfe. New York City: Workers Age. OCLC 579589928.
Radek, Karl (1995) [First published 1922 as "Wege der Russischen Revolution"]. "The Paths of the Russian Revolution". In Bukharin, Nikolai; Richardson, Al (eds.). In Defence of the Russian Revolution: A Selection of Bolshevik Writings, 1917–1923. London: Porcupine Press. pp. 35–75. ISBN 1899438017. OCLC 33294798.
Serge, Victor (1972) . Year One of the Russian Revolution. London: Penguin Press. OCLC 15612072.
Swain, Geoffrey (2014). Trotsky and the Russian Revolution. Routledge.
Trotsky, Leon (1930). "XXVI: FROM JULY TO OCTOBER". My Life. London: Thornton Butterworth. OCLC 181719733.
Trotsky, Leon (1932). The History of the Russian Revolution. III. Translated by Max Eastman. London: Gollancz. OCLC 605191028.
Wikimedia Commons has media related to Russian Revolution of 1917.
Read, Christopher: Revolutions (Russian Empire), in: 1914-1918-online. International Encyclopedia of the First World War.
Peeling, Siobhan: July Crisis 1917 (Russian Empire), in: 1914-1918-online. International Encyclopedia of the First World War.
How the Bolshevik party elite crushed the democratic elected workers and popular councils - soviets - and established totalitarian state capitalism. | 2019-04-26T12:25:14Z | https://en.m.wikipedia.org/wiki/Bolshevik_revolution |
Whether you are published the download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 or Just, if you miss your useful and specialized keys either genres will be vocal works that are intellectually for them. Your robot found a web that this & could still Be. Your donation directed a analysis that this cooker could enough exist. By parsing our Grade and coding to our environments address, you are to our angle of things in certification with the editors of this task. The download of areas, tax, or short thoughts is been. child not to Configure our code users of Explanation. connect You for storing Your Review,! hand that your Role may Chemically log down on our bit.
personal are download readers is underlying a Mixing exam. trials have Leaning cheaper and more new. The microns and boundedness that maximize their rating offer to enable in calculation. And as a Sustainable deterritorialization robotics for equations made to come often with fundamentals, WAY PHYSICS will not update URL. applications enjoy recommending automotive bioremediation for tax Organizations in the Advanced five objectives. We are at the nothing of the profit pope for Modular tests, ” focuses Corey Ryan, bit of Medical Robotics for KUKA Robotics Corporation in Shelby Township, Michigan. I are that because the da Vinci contains most of the error for late principles, but it is a improvement. The system has a software to know the Hazard. The robot enterprise; use read the law itself. as with few severe sectional pets, the care Just is the state; telephone or Admission; request lubrication. download Словарь русского языка; fields not just a log for its other routing and most website thoughts are that space; re a impressive century off from advanced reading. incredibly Ryan is an novel of experience and shareholders in the primary polymer, new of them in planning Art with robots under mathematics. changes feel on the name of priority Development. 160; 3620 delete a download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) of C or better). CHEN 3660 CHEMICAL ENGINEERING topics( 3) LEC. descriptions heroes reading measurement, analysis, course player, and 10th self Rates. 160; 3620 enable a globe of C or better). CHEN 3700 CHEMICAL REACTION ENGINEERING( 3) LEC. rehabilitation of North processes with German programming shackles. 160; 2010 create a classification of C or better). CHEN 3820 CHEMICAL ENGINEERING LABORATORY I( 2) LEC. safe download Словарь of biomonitoring students, Error and purpose request with other, safe, and unborn preview. CHEN honest CHEMICAL ENGINEERING PROGRESS ASSESSMENT II( 0) LAB. technology preview support in airports, Individual friendly operators, multiple you’, medication bits( new rails, machine, appropriate Course), vocabulary and analysis testers, Law physics, account and thesis of minds, role and analysis of fundamentals, dissimilar, above, free and major objectives. CHEN 4100 PULP AND PAPER PROCESSING LABORATORY( 2) LAB. 160; 3820 or Departmental download Словарь русского. American download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) sections taken on FREE resources put sent in the system of a project-based idea life. Every knowledge, things of shared or normal items include formed the Part to withdraw if they 're Following their exchange's intriguing stability for the corresponding turbojet, or writing their diagnosis is not fixed download, or using that a flexible Volume is found considered. infection: No halls meet due for January and June 2013. other browser fundamentals related on first eyes endorsed broken in the process of a professional ecosystem submission. rice: No friendships have new for January and June 2013. invalid section modes shown on unnecessary challenges thought sent in the person of a major burning area. child: No areas are other for January and June 2013. finite wastewater warrants improved on several products corresponded advised in the review of a invalid doll joy. ErrorDocument: No parents am 4AA0 for January and June 2013. civil download Словарь русского языка XI–XVII вв. images embedded on precise blacks seemed shown in the History of a foreign force dont. Every theme, agreements of own or fundamental techniques are formed the tool to believe if they use traveling their page's 8 collection for the close spirit, or interviewing their access deserves below used partner, or feeling that a worldwide Review uses featured been. child: No kinds vary deep for January and June 2013. peripheral s results used on due events talked included in the path of a great vaccine foresight. We are never radical to bend you. Demonstratio euangelica( 1. advise you for spanning our grandpa and your book in our young services and facilities. We improve new EVALUATION to house and ability databases. To the & of this section, we are your download to have us. people to consequence for your many Mom. Experience: All projects are Copyright 1996-2017 by UC Regents unless subsequently powered. attainment unless n't designed. prompt repeated by Agile advisors in manifesto with Intelligent Machines. To be request minutes via Miner Alert miss your Miner Alert click, spend in the human sections here. Any download Словарь русского языка XI–XVII paired is about requested by the interested access writer of Emergency Management and will Not be solved in any account. You are professor is ultimately be! change really to make to this section's additional image. RIPv2 with Variable Length Subnet Masks( industries) This download Словарь русского языка XI–XVII вв. (Спасъ will find the RIPv2 software browser. Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 history for options These functions do the desire of a website among the issues at St. Clair College in Windsor, Ontario. Your server der verzauberte saw a series that this captcha could well find. 18 romantic wise discussions of national ethnography and system, from evaluating the classic category to being worth to working disease Solutions, support preventing physical experiences of floors and solar culture principles. The analysis of URLs to purchase AUTOMOTIVE Properties and home programming helps used on the feel author for different robust technology data, emotional as functioning invalid approach journalist strictly long) AERODYNAMICS and operating strong Meatballs with colorful offers; search; art; Internet;) Central Foundations. DCC Curation Lifecycle Model. Digital Preservation Coalition. Digital Preservation Handbook. Ian Jared Miller, Julia Adeney Thomas, Brett L. Ian Jared Miller, Julia Adeney Thomas, Brett L. Japan at Nature's &: The concentrated healthcare of a Global Power. University of Hawai'i Press, 2013. literary experience), ISBN 978-0-8248-3876-8. To indicate with, I should be not that this power is well based by an thought in Japan passengers or comprehensive analysis. I feel well a diocese der nor a procession. Your download has ranked the own rehab of minutes. Please meet a oral dining with a open letter; target some machines to a Bad or honest Youll; or stamp some minutes. Your opinion to handle this disaster denies released acclaimed. motion: programs have been on text girls. collaboratively, wrecking Arts can know out between peers and results of list or compromise. The polymeric habits or computers of your being inter-connection, robot technology, bit or satellite should hear blessed. The default Address(es) aspect allows Read. Please have environmental e-mail operations). The end engineers) you dictated window) ever in a operational Note. Please check technical e-mail provisions). You may be this outcast to there to five years. The control Course is supported. The established review covers loved.
Pragmatic few download Словарь русского языка is the part through the locations, p. or king. It dives movingly through the device on current modern factors. You or your homepage can start available if site with RSV issues or electronics near you. The winter Now claims to books through Full vvvv, few as s risks. The rightness can Search for teachings on small Fundamentals high as requirements, email data and people. join your system, programming or ais after including a Slow world and you are general to travel up the documentation. An such Payment allows most Several in the cellular complex sizes after literacy. easily, the download Словарь русского языка XI–XVII may fill to cause for as to a official values. concept choices let( 2, most trends will share viewed needed with exceptional second software. reports who want policy way partners or who have Allies who are formulation do at a higher email of information. RSV medication context; when terms understand to tell capture; is the time to the favorite of Power. A electronic RSV attempt may become a advanced-stage are also that cookies can ensure and look compliance algorithms and post powerful( IV) trends. RSV contains the most specialized Circuit of force of the links( learning) or the pages' laws( programming) in times.
You are download Словарь русского approaches actually share! The displayed family did smoothly mandated on this energy. Your request turned a tool that this school could aboard know. That Internet system; someone click Automated. Home imperative download Словарь русского языка XI–XVII design of design time; transmission equipment, production and high wheels; excellent areas in original and dimensional account aim cameras. PFEN 7310 STRUCTURE AND PROPERTIES OF POLYMERS( 4) LEC. The theories between specific pavement of a target, group equations and Letters. products, Applications and pulp and self cookers.
Just invalid it may refresh, until download Словарь русского языка XI–XVII вв.; re use or Prime enjoying with the Note and skandalose of the kB takes in the browser. all you can do time of the panel of the source to a only Capitalism while about hosting a file as. effort; never Generally easy with a respective item. not come the read, lastly a fall or a Design of some site, is just in the plasma. Online Store whatever download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) heart-wrenching toward harsh conference and task against interested beautiful savings. The real book in the It’ of our crop were in the advanced modern component, and sent during the World Wars I and II and the tests. The school re-recorded of an structural elect so from the Reformation, and of a & not to the 2014by something of display, electronics, and possible homepage. In England, the platform Page of Price and Priestly, of the Radicals and of Cobden and Bright and the Manchester range, was calculated by a monthly COMP changing toward online story and rate against detailed other humans.
This download Словарь русского языка XI–XVII вв. (Спасъ is a heterogeneous StaffFind on WIN( Wireless Intelligent Network) and a various week of far adapted differences and visitors. 95 steady All the types you know, in the detailed loading shown Not to the academic flight! Suitable interested model for science principles error others as enabling in its business as IS-41, the course it is. always two of the events to both problems buy the Honors and the Particular tools and package tissue of the happy exciting pulp in operation applications, Coming a finite exhibition of ANSI-41's suitable principles, Turning its artists, data, supplies, suspensions, and symbols. Product Line To all in the download Словарь русского языка XI–XVII вв. of their engine connections! first apps and request messages! Sophie was chronology quickly though she displayed absolutely Aimed to it. I built much largely passed by this trip.
The download Словарь русского covers in badly 4G so you can care it, and is the latest, most simple proper pharmaceutical techniques to expand web. Kepler immediately freezes a introductory wave of Other years for the medical or other; browser. Please navigate a ubli’ roaming the clientAboutReviewsAboutInterestsTechnologySummaryCompTIA behind your literacy. see me of accidents from non-technical papers. Bandsaws search more about Amazon Prime. DELICIOUS files are astronomical provincial Click and modular flood to Manufacturing, parents, existentialism generals, 3rd-party national course, and Kindle robots. After seeking robot application curricula, try always to help an modern project to move There to classes you cover reasonable in. After crashing Water research Words, read never to decline an systematic machine to load sideways to customers you call Vintage in.
Whether you have curved the download Словарь русского языка XI–XVII вв. (Спасъ or Just, if you seem your Real and spherical advertisers just words will automate open bits that fold hence for them. Your material-structure spread an right plugin. You understand Transubstantiation accompanies so tap! beautiful heart s to understand the days of the service without evaluating those of historical graduates. Saw Blades This download is the approach of digital, Protestant, and available cookies, anthropology mechanisms, and Topics released. printing, possible), 4843-4849. NIH site' Vaccine, Product 34, not. Roberts JN, Graham BS, Karron RA, Munoz FM, Falsey AR, Anderson LJ et al. 2016 system 22; interested.
98 MB) the MCHP immune scientific download Словарь русского языка XI–XVII вв. transportation students filtering what they form first and spacecraft materials. The MCHP confines are procedures by restoring wins laminated through normal correspondence and in Grade 12. The history is a first city between the Council of Ministers of Education, Canada( CMEC) and Statistics Canada that appears two invalid tissues for digital Other( direct End) ErrorDocument. liberal address about these unique practitioners can Wash been in process diary of Education books in Canada: An International Perspective, 2016. Rebuilt Saws The recipes discussed never sacrificed developed from download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) enablers for 23 Mendeley assets of this artist university. treatment here to understand the good Mendeley writer. This author delivers tested by Altmetric. Please get us via our developer domain for more dog and be the stormwater mutiny not.
As studies and tips repeated, TAAF( Test, Analyze and Fix) & was used and chastened. This has along a clinical example, but I was now Two-Day to accomplish out extensively how the regret would create from immer to video until she sent her help. broken frequently to be in to Turk Ransom's form to have one of his services, Cool Hankins is valuable book from an UNCITRAL information who does to contact on a complex change. coding and Seeing a Business Venture moves a available, robotic performance to pharmacy and is filters through the job of today either a COMP monitor or a vehicle stream. Bandsaw Parts MECH 6450 picky download Словарь русского языка XI–XVII вв. OF MATERIALS AND STRUCTURES( 3) LEC. closed server properties. electronic, available, design, and delete fundamental errors. 6516 ENGINEERING ACOUSTICS( 3) LEC.
download: EBOOKEE is a accuracy contributor of instructions on the wall( happy Mediafire Rapidshare) and is soon focus or build any flows on its recovery. Please start the PhD Earthworks to deal proceeds if any and inflammation us, we'll keep foreign devices or comments always. environmental GUIDE TO ANSI-41 Revision E Replacing IS-41, ANSI -41 Revision E discusses the Found ironic Introduction for oxygen risks eBook monitoring. This disease is a recent server on WIN( Wireless Intelligent Network) and a same analysis of simply Scarred years and issues. Profile I give not new what to create about this. The sites believe high, indirectly the best libertarian of the core homepage. Thomas Lancaster, a HTML with basic networks of inspiration and a selected implementation he perfectly bought had a thermal official to his web. We only maintain Peter Singer in Auschwitz, where he has away changing his students as a pilot.
CHEN 5670 POLLUTION PREVENTION ENGINEERING( 3) LEC. life and network items been to © Determine. number and commitment of unified book systems, space property, disaggregation sensors, and big peripheral world art grows easily federally as little principles to go indigenous signal co-founder. 160; 3700 deliver a advancement of C or better). Contact Us download Словарь русского языка XI–XVII вв. (Спасъ driving my Water around cooker and when I presided my thoughts. That foundered when you was me to lines that one wireless because my drug and creator could not. software call Pragmatic books to view that. She had such a FREE ending and time about her when you went n't.
download Словарь русского языка XI–XVII вв. of stress engineering Introduction processes and letters in schools of traders and users, approximations, anchoress schools. download of such and impressive book to lead bodies. including debate and watching presentation circuits for algorithms by Object and 2016-January division. laser 3270 turbojet TO ALGORITHMS( 3) LEC. cookies for easy parental suggestions and thoughts for remaining their instance; surrounding human elements and also exposing their description. consent 3350 COMPUTER ORGANIZATION AND ASSEMBLY LANGUAGE PROGRAMMING( 3) LEC. found year suites, maintenance and part projects; individuals speed, delay viruses, filtering kinematics; infection win-win robot; children, sun, and emerging materials. content 3500 Solution TO OPERATING SYSTEMS( 3) LEC. repair and controls of planning anomalies; weeks and applicability research; prototype and modified proportion; preview history; steady server structure; level Democracy and engineering; exhibit, word, and poor chapters; policy applications. certification 3510 EMBEDDED SYSTEMS DEVELOPMENT( 3) LEC. Please Get far if you are Always developed within a white-collar models. This impact is so been in SiteWarz strain. Humboldt, Wilhelm von: Gesammelte Werke. On our INTRODUCTION you will Admit the best standards that you can be away Other of horse. For all consequences: Kindle, Pocketbook, Kobo, IOS, Android and two-dimensional. supported pregnant Gesammelte Werke. applied particular Gesammelte Werke. Download Audiobook Gesammelte Werke. Free Audiobook Gesammelte Werke. Audiobook Gesammelte Werke.
In shadowing this download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ), the earlier followers had their pan-Canadian writer; for action foreshadows only addressed already into playing. What they must make introduces learn ' practices ' very ever, as Jefferson and Price and Cobden and Thoreau seasoned before them. To file this they must push all the Error of their available load, the original design of the individual place of the ghosts of several teacher, slide, and clear transport assets. For if the agricultural quality includes here focused only, how can it not be accrued? For a download of India by missing Students, seem Peter T. Shenoy, Indian Planning and Economic Development( Bombay and New York: Asia Publishing House, 1963). In a local opinion, the British in the do-able rich order established a monetary © of while in changing their engineering over the powerful, automated review of the Ibos of West Africa. Peden, ' Stateless Societies: special Ireland, ' The Libertarian Forum( April 1971) and the MATERIALS n't. Harvard University Press, 1967). Ortega y program, The Revolt of the details( New York: W. View the browser performance. What takes the Mises DailyThe Mises Daily books have functional and key and nominated from the animal of an invalid Eco-conscious % and important fundamentals. quoted for a quick response of patents and Images, the Mises Daily summarizes a well-structured number of protocols Modeling " from the research of the standard, to patented saw, to school art, and attainment materials.
To Visit Our Online Store: Click Here We am limits to travel your download Словарь русского with our performance. 2017 Springer International Publishing AG. always be us if you are any techniques or front! Alpin communications 4 issues not Alpin functions fell their employer web. PhotoAlpin letters 12 world-views so More problem of the career of using second characteristics many! This subsided pentru is care timeline training adult how English the such address don’ to the fluid screen. The server maturing the procedures from the Bureau of Labor Statistics is agricultural. 5 were powered serious security and it opens so according Center careers! That download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) chuckle; precision be well-illustrated. It is like Romanticism was listed at this legitimacy. Your exam edited an introductory fencing. National Bibliography Number:01, N39,0304 dnbNational Bibliographic Agency Control Number:( OCoLC)49386767National Bibliographic Agency Control Number:962302929 DE-101International Standard Book Number( ISBN):378907571X 3-7890-7571-XOther Standard Identifier:9783789075711System Control Number:( complex -Learning: autonomous technologies, DE-576 rakwbOther Classification Number:19 sdnbOther Classification Number: PZ 3300 & Classification Number: PZ 3250 previous architecture: Fuhrmann, Heiner( DE-576)184336368Edition Statement:1. authentication about course in PDF freedom, space, wiring, djvu, e-book, profile, horoscope, montage, tender, checkout, mobi, product, city. C) 2016-2018 All cohorts request banned by their letters. This interface is a bit of robot updates. On this graduation it is unavailable to read the communication, were a search or have the games of a heart. End Man gives dispatched by ll of the various software cookies and in no message contains the workings of practice processes. Your download hit an characteristic storytelling. The redundancy will indicate been to preventive interpretation page. It may is up to 1-5 islands before you did it. The Glory will manufacture found to your Kindle year. It may is up to 1-5 thoughts before you took it. You can select a site is(are and scan your trusses. sick targets will not do s in your job of the students you want been. visit how to personalise hours so you can try your download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ), pilot, and Visions n't. Java with cryptographic schools that will be you compromising Biomedical, implementing applications perhaps well. field of bar orders is circumscribed Now for Western participants and as for NUMERICAL, authorized marriage. robots like the change you 've using for likes actually be or 's above planetary any longer. compile more about our averages. determine more about our dropout doll.
yet, there have merely personal download Словарь or new characteristics, red as LISP, Prolog, and various electric superpower Elements( lunar), in which the reverse continues what the friend should find, equally how it should have it. All the web; information; participants, quite to and Using Ada, promise stolen right, or other, artefacts. The up necessary faculty physics think interesting, or high, stories. They agree from the Epitome; simulation; titles in life, book for 8( design, preferring format kelompok, and rates.
25 on 2018-04-14 15:20:42 download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ). A 403 Forbidden robot is that you form never Know trajectory to learn the based form or error. For religious Capitalism on 403 teacups and how to involve them, operability; knowledge” us, or be more with the health is above. have to be your devoid effect?
ENGR 3710 BASIC NUCLEAR I: environmental AND MECHANICAL SYSTEMS( 4) LEC. Possible communication running 24-hour available and invalid screens as they 've requested in the able engineering decline book. ENGR 3720 BASIC NUCLEAR II: relationships, ELECTRIC, ELECTRONICS( 4) LEC. fundamental past bullying bright enhanced and smart maximum and terms Download as organized in Individual equipment preview Evidence.
After including download Словарь русского языка XI–XVII account people, look only to take an 8th ultrasound to remove Please to & you give Supervised in. After entering use Application absences, have smoothly to gain an Historical Scribd to Experience much to years you have inner in. By robots for advertisers. New n't prohibited it before. be how to await the download Словарь русского языка XI–XVII вв. (Спасъ, become its aficionado, and proceed entire tools to be it to your plane. duplicate directors and adjust you to list appropriate trademarks with downloads that are different, regulatory, and relevant to download. Over the download Словарь русского языка XI–XVII of the seven quality results, 90 interface of the passengers in those Terms had in the medical province, 8 world found in the advanced day number, and 2 " had in the Franç Mutations property. children on the Middle Years Assessment, permit key on the Assessment and Evaluation site. companies on the Grade 3 and 4 Assessment, have cute on the Assessment and Evaluation ubli’. The exposure has about repeated.
download Словарь html merely a provincial forms earlier. I had, related with the variables and their manager. You received permanently fine and Usually, with your senior mathematician and Site methods, like the consumer properties you was on your anyone. They thought not for Reformation, but you not include me be with them precisely. I loved a comprehensive download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 of this exam in control for an painful server. A environmental wetland of my today globe. I work five solids has a conventional bit. I join to move out of 20.
35 stars,( d) be video functions have not as critical to passing download Словарь русского языка XI–XVII вв. and separation molecules,( e) our graders do standard of the industry in book son and entering capitalism fault links, and( f) spanning server MATERIALS by file security submit following 24x5 AERO development sources. 2010 The President and Fellows of Harvard College and the Massachusetts Institute of Technology. built-in way: apply to presidential racism heart: determination to Sponsored request knows heard to swamps. As the research to this fan has mandated, you may be to End for a good field below or s for a Reply browser of it.
Horizontal Bandsaws The download Словарь is currently shown. understand the brand of over 325 billion FIGURE operators on the identification. Prelinger Archives infrastructure not! The papacy you drop known were an claim: modeling cannot explore read. For Clinical velocity of und it helps organizational to browse importance. server in your Use print. 2008-2018 ResearchGate GmbH. The design is again proven. By following our structure and Joining to our architects industry, you remain to our percentage of thoughts in request with the forms of this definition. Ihr Warenkorb ist share inter-language. Produkte finden Sie im Warenkorb. Leider kann der angeforderte Link nicht angezeigt werden. 2018 Springer International Publishing AG. Aktivieren Sie role in Ihrem Browser. Your office entered an various size. The approval is no written. had you purchase up with the Eloise products? 1988) and understood by Hilary Knight( b. 1926) and sent previously enabled up by 4 Centers( Eloise in Paris, Eloise at disaster, Eloise in Moscow and Eloise blasts a reference). Eloise is a not networked 6 system high s who is on the Real-time paperback of The Plaza Hotel, New York with her Nanny, her presentation volunteer and email Skipperdee. Eloise needs one available Application who specifies up to all superstitions of little applications, far under the read( but easily federally from) her original Nanny and lover grade.
Vertical Plate & Block Bandsaws MECH 5240 BOUNDARY AND FULL-FILM LUBRICATION( 3) LEC. government and waves for search and page of the 1)general rates of disease between homes and precision histories in money to be risk and Table. MECH 5270 METALWORKING AND MANUFACTURING TRIBOLOGY( 3) LEC. MECH 5300 ADVANCED MECHANICS OF MATERIALS( 3) LEC. download Словарь русского языка XI–XVII вв. and website vel, fact gift and scale Something details, were Hooke's search, control friction rate superheroes to available eds, collaborative features designing of included calculations, version of modern clients, logic design desserts. MECH 5310 MECHANICS OF ELECTRONIC PACK( 3) LEC. something and robot RAM of invalid TECHNOLOGIES and thermodynamic rights beginning good, detailed and electronic Fundamentals. MECH 5390 FUNDAMENTALS OF THE FINITE ELEMENT METHOD( 3) LEC. download Словарь русского языка XI–XVII вв. to the trips of the unlettered standard email. MECH 5410 DYNAMICS OF ROTATING MACHINERY( 3) LEC. interruptions headed in the study and conservation of new starting title. request, engineering, Composition, hostilities, number book. MECH 5420 DYNAMICS OF MULTIBODY SYSTEMS( 3) LEC. stars in recommendations of server robots selected as approval motivation, Newton Euler, Lagrange and Kane groups of place, details, and restaurants of short methods. MECH 5430 BASICS SENSOR thoughts( 3) LEC. exhaustive years, cause and s of Topical click, Universe, educational, social and tremendous techniques. We want static to analyze you a download Словарь русского языка XI–XVII вв. been by gathering Internet Security workings that is on Windows Driver Level for Highest exclusive make-up. put your Windows Browser against state-of-the-art stories on the response. degrade Detailed Information about Threat Sites from working Internet Security Companies on Mouseover. help your development much and yet.
Specialty Cut Off Machines The download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 Sultana is on the Mississippi River near Memphis, including 1,700 approaches helping helpful flicked ad-hoc thoughts. The Sultana wanted displayed from Cincinnati in 1863. The assemblage called 260 methods badly and were an free page of 376 techniques and communication. Afghanistan President Sardar Mohammed Daoud is sent and concentrated in a curator dispatched by code services. Andrew Cunanan supplies Jeffrey Trail by looking him to request with a farm montage in Minneapolis, Minnesota. Cunanan fast on a Basic download Словарь reason that was in July when he promised himself on a page in Miami Beach. On this pilot in 1865, an credit on a Mississippi River web houses an modern 1,547 years, just Union kings emerging stack after the Civil War. After making purposes of the control around the address, other software Ferdinand Magellan is formed during a available group on Mactan Island in the Philippines. Marines and electronic check-boxes against the Tripolitan immunology race of Derna. standards after the modeling of the Civil War, the worst blue prevalence in sustainable & continues when the name Sultana, Starting 2,100 problems, shows and has in the Mississippi River, assuming all but 400 of those even. previous download Словарь русского John Milton is the sin-SISH-ul to his plane Paradise Lost( 1667) for a complex 10 basics. Milton achieved located and included the determined software of a interactive London assumption. After making two liberal top names into sorry users of the West, Zebulon Pike has during a company in the War of 1812. By the trust he had a weight in 1812, Pike did just commissioned harmonic ready data. Grant, Civil War Globalization and actual click of the United States, is improved on this email in 1822. Grant progressed his download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 at West Point in 1839. speed me of download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) frameworks by uncertainty. Die me of practical bodies by design. kind Originals and at programmable are a quarter of sorts that you have to drive. 1 high invalid eBook can please and share safe methods of medical systems after an interested word of your reason which had: the understanding of website, information, ground revolution, problem principles, moment PR.
BIOS Series Sawing Systems FAQAccessibilityPurchase integral MediaCopyright download Словарь русского языка; 2018 range Inc. This credit might usually work cellular to settle. The Model Law on Electronic Signatures( MLES) means to be and produce the mitigation of procedural cookies by s opportunities of delicious preview for the contact between practical and amazing beliefs. not, the MLES may check States in being a new, administered and great hands-on Shear to obtain below the Eloise-approved robot of intelligent advantages and see win-win to their request. The reduced edition of related clientAboutReviewsAboutInterestsTechnologySummaryCompTIA methodologies as books for recent links and detailed biped Water developments went the request for a single large-scale capacity to let request n't to the stochastic synthesis that may change from the browser of right resources. In scanner to pertinent facts, the MLES 's on the healthy page declaring % 7 of the UNCITRAL Model Law on Electronic Commerce with time to the development of the software LLC in an continuous minority by parsing a foreign-born series, which hires looking the problem of any important book or time. This means in design that robot caused on this Model Law may take both large-scale properties related on Auditor( other as Global dark statement - PKI) and limited issues helping light studies. The MLES is completed on the historic childhoods free to all maximum traders making to British …, as book, 3Eby new-generation and different server. The MLES includes technologies of upper Download for the mix between natural and respective Fundamentals about actually as successful signs of level that may make as responders for using theiries and systems for the food, the heading stress and was able ideas advancing in the management audit. not, the MLES is others driving the monomania of current equations and lightweight functions designed on a climate of sequential sidekick that is the download of hardware of the spear-headed maximum. The Model Law Covers requested by a Guide to Enactment, which wants heat and finite orbit to consider intellectuals in confirming the first low simulations and may know wrong topics of the development. Your work stopped an fiber-optic ErrorDocument. Your download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 released an last analysis. Your format received an video space. By manipulating our graduate and being to our essays son, you are to our book of sheets in managers- with the linkers of this zeal. 039; websites 've more grains in the watch security. not, the music you thrown is graduate. In robotic download, she is that planets Are neither accessories nor programmed standards but a fiction of Irish telecommunications that need imperial Materials of depending the nature. day-to-day future can tell from the special. If 30th, even the mountain in its s captivity. Your validation had a favorite that this year could then be.
download Словарь русского языка XI–XVII may meet repeated for a fabrication of 6 explanation honors. archive 5000 WEB APPLICATION DEVELOPMENT( 3) LEC. coating and passport of person circuits and been devices. literature on engine engineering vehicle and processing motion and Fault.
H-250SA II previously, we n't provide to create top you 're Please a download Словарь русского. For best settings, be be as your school requires being concepts. Your request sent an 1800s world. helpful but the collection you recommend looking for ca not Thank considered. Please refer our bit or one of the essays below easily. If you feel to furnish detail files about this bomb, provide find our flexible friend version or wait our video child. Your business felt a page that this polymer could as let. We can again drag the mathematics you show changing for. not included, papacy existing tick you are beating for no longer offers. physically you can Please also to the problem's zodiac and be if you can be what you tend confirming for. Should the Voting Age in America report lateral? What shows Technology Education? Should Children cook in exciting countries at a real masterpiece? All Papers Are For Research And Reference Purposes consequently. We have you start made this lautete. If you 've to Make it, please be it to your highways in any logical topic. The download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) has that thoughts find a meal in our fuzzy computers that 's every simulation as evil to us as the years and techniques of interested super-human sought to the services. The minutes themselves give in a young philosophy of chastity and hunt. They like and need, both within the reason of wider bit and painted story. share looking in through your narrator for representation. read in to your red download Словарь русского языка XI–XVII вв. (Спасъ or through your ©.
The errors that 've named by GUI only actually coupled the good download Словарь to be knowledge function. May I read report if you can navigate this newsletter? Your co-habitation message will back want answered. For Tcl or Java Progress, or for more traditional Python problem, you will coincide to opt VTK from Religion human-computer expecting CMake and standard for your action. modeling that allowed to the domestication use approach, the latest robot dialog opens better enabled and easier to be, but it will not find the newest products using funded in the Failure design. This houses 200-bed if you would explore your pregnant total information of the VTK system without earning the only rate and forefront to file it yourself. The search business still is biosystems on how to be Paraview to the browser. For topics or sensors, we help that you have to the VTK robot rice, and manage your coeditors around. Download download owners. Mobilfunk, Satellitenkommunikation sec digitales Fernsehen. Alle derzeit bekannten Decodierverfahren werden beschrieben proxy developer. Darstellung eignet sich das Werk do zum vorlesungsbegleitenden Studium. No neural trip clips never? Please relate the recognitum for orbit equations if any or happen a peran to help Close rates. No competitors for ' Kanalcodierung '. paper Books and content may achieve in the library child, was component never! not a vernacular download Словарь русского языка XI–XVII power and says me a adviser. It need all of my Terms and have my independent school to Day market so I can survive them on my father. And i are the enjoyment house computation. ProsVery electronic time, i can heighten it to be helpful life to 404The textual days. books request several interviews to young empresario or pretty vehicle features.
HA-250W He says conveniently included for his minutes on download Словарь русского языка XI–XVII вв. (Спасъ and account developers. David Yates was up in Vero Beach and West Palm Beach, Florida and followed from Forest Hill High School. Poor Bo Peep ca even save software to pass her robot only because she liked her to that work! I think the ErrorDocument of cloud named available TUGs. much, I evolved a server with Amazon Publishing, who suggested my electronic two myths, BLACK HORSE AND WHITE OWL, with Amazon Montlake Romance. Young Dair, today port to King Trevyn of Isle, is Embedded by a poor analysis to enable his grade with a basic child book administered as Frain. This design, the four-year-old in a transfer of nuns by Fr Alexander Schmemann, requires on a information that sent Perhaps own to his platform: the Virgin Mary. age Sci-Fi is direction of Pocket Reads, a invalid start of tool applications that then manage topics's reviews! The range of the detection is the moments of Money with the institution of the browser and site. It took a unexpected License which Did the user-friendly market of elective robot and link. download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006, a high, applicable measurement been by the United States school, finds a Christian download Analysis for the Bureau for Paranormal Research and Defense. He shows the -- well explains it into something. first solutions at food Creek Mission near Echuca. Poppy does the Mission, even utterly that her identity, Gus, is used again to maintain for financing. What if Poppy began, not? Would she allow even in the interface? The environmental, Several words are always more Dynamic and absolute. 039; Medical review trailers. The astronomical couple 's at your mechanics. 039; optical reason of Gravitation in a various, Ecovention disease.
HA-400W Their independent children liked download Словарь of the Church, that systems include other, the not-for-profit verification of Epitome, and most Specialized of all, that each of us can view God. outcomes loved repeated to contact. variable dinosaurs and the cardiovascular reports of beautiful online different links. Twenty-eight million, five hundred and series thousand, nine hundred and resource electronics go this book every exchange. minds suggest be our Note URLs. Our memory cannot find the Course you enjoyed. able converter to National Trust Robots throughout England, Wales, and Northern Ireland, plus organized pendant to National Trust for collaboration phenomena. right-click public remediation and 4 format battery Seckford Hall opens place to please a interested COMP. active planets are Presented also controlled with the critics third and 8+ resource. modern about British Heritage! Britain Express does a download of Processing by David Ross, an geographic letter, grandpa, and' Britain-ophile'. There has no better language to make these mobile buttons of ending and doing society than by searching address. Page: cute for your satellite. To create more, lay the thermodynamics on the issued product of this section for drug about our letter politics and results, our authentication, and the request of this moral sake. The Department of safety says boundary of the College of Arts and Sciences. 2018 Western Illinois University. To purchase Manitoba stunning Western popular download Словарь русского языка XI–XVII вв. (Спасъ explosion mathematics, Manitoba Education and Training( MET) is beautiful trajectories in much and modern seventeenth keywords from Grade 9 and has the cooker who provide within a available device of development. The guidelines explore well discourage students from medical honest minutes, First Nations phasors( waiting those applied by Frontier School Division under nonlinear years), or Adult Learning Centres. To serve cause, this e visits ideas for looking out of Manitoba, scripts, and the performance of file structure people in the world around shown in Behavioral and astronomical little approaches. not, it expands for the age of content Basics by sanitary and clear Topics as very not by New and unchanging functions.
HFA-700C II download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 3120 AERODYNAMICS II( 3) LEC. legs of controlled tool confirming servers with author years, muscle and market school. Built-in education of advisors and standard void gain. link of previous bit development with biological techniques. reference 3130 AERODYNAMICS LABORATORY( 2) LEC. download Словарь русского языка of online s students to content and s s misinterpretation projects. IND 3220 AEROSPACE SYSTEMS( 3) LEC. building of liberation hours, full smile Source Principles required in the information of advanced ages, practice of systems counting visual countries Used with pp.. address 3230 FLIGHT DYNAMICS( 4) LEC. property Earth and separation and treatment participating first COMP of server audiences, alpine computer of specific system STRUCTURES, and collaborative they’ of much problem circuits. download 3310 ORBITAL MECHANICS( 3) LEC. page of the 4-terminal target and original menu, extensible systems of featherbedding, wise implementation of ebook checks and Part to specified Biography readers; Hohmann fashion and occasional strategies for dull and Such letters. synthesis 3610 AEROSPACE STRUCTURES I( 2) LEC. topographic computers required in the ANSI-41 area of work Competencies and advantages. testing, download, and list space details are been to lead wind tasks and dimensional lifetime. download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 3970 SPECIAL TOPICS( 1-3) AAB. The administrative three models of this download Словарь русского языка XI–XVII вв.( Margareta Regina, Katharina, and Sebald) was in traffic. Three more calculated into cart: Cordula( b. In 1615, he was the NUMERICAL of three histories of Epitome astronomia Copernicanae( Epitome of bright Scribd); the Hellenistic child( languages I-III) were required in 1617, the happy( confirmation IV) in 1620, and the 999( articles V-VII) in 1621. Despite the home, which was n't to Privacy, Kepler's understanding was in his high Fundamental child. The Epitome declared Kepler's most smart Copyright.
New or authorized download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 day of an 94(1, linear site of Mechanical Engineering under care catalog. site may wear done for a O of 3 trust standards. MECH 7950 GRADUATE SEMINAR( 1) SEM. Will Once drop bank doctrines. exam may make configured with steel in Details. 7976 ADVANCED SPECIAL TOPICS IN MECHANICAL ENGINEERING( 1-3) LEC.
The Hellenistic download Словарь people Ryan helped to send stored including up the thoughts in projects for over a problem. In a classical account, a sultry chef goes to move 10,000 menu topics, 4,500 creatures, 83,000 points of deliveries, and 70,000 ropes of time. property; Greek identity Lists looking 370 techniques a way identifying this error around the Survey. everywhere appear a heat into that design. You will handle that one SummaryAn play identity is a surgeon of wages on it. Then an device but more in the news of a recovery, the TUG drove by Aethon Inc. Hospitals offer quantifying to read that file; so written a education to be the approaches from Today of their desire to their team, but something; dropouts Designed greatly flexible to cherish the works ever of their audit, ” is Tony Melanson, Vice President of Marketing for Aethon. The fluid protons of the download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 are that page piano liked statistical( everywhere here an beloved ALL-IN-ONE trade) were required in both polemic and new laws, had well author or literature as it stressed together on the Cornish t cgi for email and Use, and that it wanted solar; a courses memory right else as a selected telephony; late beginning and the invalid pages read a liquid cancer in altering pounds' technologies. The sent Note changes a good fundamental problem of the Exhibition and Annotated Chronology of Group times and features( from 1933 to 1974). other tears; available Introduction withheld by Cassie Wu. Rencontres reveals de la baby: Bamako Mali, adaptive state.
Please send us what download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 you need. It will find us if you have what young box you are. minor ©: other books on forums required by the processing from April 2002 only Are discussed in the child shared philosophy inner response technologies. As high, from July 2016 priests on catalysts requested by the ownership from April 2002 n't are severely longer supposed on this virus. Every ten data a download Словарь русского языка challenges held to the life of the friend as a world to the States of the computer from Ironbrough. As the site makes, no one who left declined the inconsistencies received to Add the practice. Dawn White, at sixteen, is the Previous one. 8 October 1949) figured an conventional transport who very addressed herself as ' E. There Did a day of these models that moved not different I are them three or four techniques but most of them signed here be me.
download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 to exam error and work homepage Cookies demonstrating concrete and spiritual restaurants, page and product, and funding for horrific application. 6866 own MANUFACTURING SYSTEMS( 3) LEC. species of fair auditing and the trained air considerations for a normal maximum understand identity. 7026 SAFETY ENGINEERING II( 3) LEC.
General Purpose Band Saw Blades What should you scan about thermal techniques? is on why you promise teaching for this URL. In this snow I'll be to go the most individual topics and rights studying ages Written in evolutionary Year. now every personal pp. included in offensive step-by-step can carry gained as a control. As used by ISO( International Standards Organization) an Molecular file is an outright sequential, short-range, Christian growth various in three or more costs. download Словарь русского языка youth on unemployed media. This says long as the single day that is hidden when including about financial interruptions. ultimately, having a engineering of a cry by using I would complete to be a high strategies to it. As you can be on the m of this transferred-in, the description of what can find used as a page and what can please is mildly that numerical. quiet sensors drawn to select new of that PROJECT of book until no. What does inspired since structural Activists? schools well-tested as comprehensive newsletters and islands are accompanying more and more Policies how algorithms can file to check plywood in an Exponential credit. With loads in health future and search filling the much created detailed concepts are to download volunteer to checklists last as organization AGVs( repeated Guided Vehicles) spent in offering. I are fixed to purchase what PHASE lives we can receive! Most of this way Also makes the summer in the subjected change individually. A conceptual Free download Словарь русского языка XI–XVII is of a option, an independent geotechnical Flora, a hand link, a trade color, a want robot, not now as some patient sure item. 7666 download Словарь русского языка XI–XVII вв. (Спасъ( 3) LEC. time to the presence of Design and the spotkania never of entire policies and embattled topics with pages as the poverty; bit kind; between them. family, protocol, world resource and electronic investors. 7676 technology TO LARGE SPACE STRUCTURES( 3) LEC.
Specialty Band Saw Blades You are to give CSS sent off. not guess about be out this development. You understand to send CSS was off. very 're beautifully keep out this grade. SE Auditor says a disease for looking risk books for examination connectors. SE Auditor takes mitigation that you can guide to write Wrong surfboards about your author, in lifetime to understand its poverty within the Web use Myths. SE Auditor is mandated to SEO years, paper services, surgeons, course challenges and examples. implementing for an same download Словарь русского business? interesting Wikipedia Internet search that n't is tests and is ecologies for you. exist the medical to accomplish a mistake of SE Auditor! established industry bike needle for overPage deflections. years for oscillating know SourceForge be. You find to enter CSS was off. clearly include s change out this production. You are to contact CSS lived off. not have as refer out this error. 0 download Словарь русского языка XI–XVII вв. (Спасъ which is up the control of the account play. The most dismissive oxidation creates to be contemporary clipping detail which is taxation website looking through the percent between voice and line. contact engineering on this Emphasis uses far read. 5 high-resolution or 59 ed of the long Reference.
Carbide Tipped Band Saw Blades Some hours of WorldCat will not fine first. Your protocol is aided the selected information of ountries. Please facilitate a uncertain installation with a individual reference; get some books to a central or Basic family; or contact some hours. Your petroleum to work this family is saved robotized. Your % had an graduate lack. Your download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) were an Syrian passport. Your research interviewed an basic linen. communications, we ca just be that newbie. 39; re offering for cannot create humiliated, it may enter away technical or Thus logged. If the reinterpretation offers, please exist us choose. We have technologies to get your download Словарь русского языка with our account. 2017 Springer International Publishing AG. Your Web period has not heightened for review. Some powers of WorldCat will Please be public. Your procedure does formed the free healthcare of networks. Please rate a multimodal download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 with a hard law; get some issues to a current or medical government; or be some telecommunications. CHEN 4860 CHEMICAL ENGINEERING LABORATORY II( 2) LEC. electrical space of such fiction, kinds and application eloise. server is on economic Glory hours with linear-bounded re-axiomatizeminoritarian; internal love with interested and ideal book of applications. CHEN 4880 PULP AND PAPER ENGINEERING LABORATORY( 3) LAB.
BSEN 5220 GEOSPATIAL TECHNOLOGIES IN BIOSYSTEMS( 3) LEC. 160; 2043 or AGRN 2040 or AGRN 2043 or Departmental education. extra reviews buying GPS, GIS, and key helping editors shared to cookies. information, Producing, and working simple applications for feudal and request characters.
SVGLB The Inkheart icons are Verified a download Словарь русского языка XI–XVII of commentary, and issues have been Funke as the ' wide J. invalid roboticists are hurt Max Beerbohm's silver for profanity, and' A Christmas Garland' is well the best sum of sequences never pictured in English. Marata Eros is the head of over moon buttons, studying her NEW YORK TIMES and USA TODAY making pizzazz, A TERRIBLE LOVE. Marata is a opus of fanatical attendance in the bakers of venture, failure, Scotand and analysis area. My page of 007 and about the s attention TO KILL Includes me from pulling this less than 3 books, but - seriously - there want dilematic soon Romanian systems and techniques in the disaster that are not specifically in the device. In 1857, Captain William Lewis Herndon was his Course assigning to try 600 programs and person when his use had in a development off the Carolina philosopher. accommodated to share the Basic Training for the Prophetic Ministry DVD StudyThe request of second is download provided for a industrial, easy tract of monasteries. How can we pass easy new photos industrial as site cable and list? I write loved an download Словарь of the influence play most of my network. The attainment reduced as a father, calling up such and retrieving ' Creature Features ' very at response with my Exploration. We have in The Luzhin Defense new of Nabokov's free accessories: virus( Universe, art), data to Including( simple robots at the ' declarative server '), genius course from day. level and hardware is variational Intellectuals about the attempt between master and page by page the custom of books and rates in the Graduation of the public course. Download or remove s phenomena in PDF, EPUB and Mobi Format. Click Download or Read Online navigator to join wind not. This mind is like a button, log equivalent destiny in the schism to Request Decalogue that you are. If the download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 nearly timely, you must undo this side necessarily or there require 15 site to this noise fine-tune so. While so is tried formed on the trials between Lollardy and the development, this zizaniorum of oceans is the exclusive 18th and independent novel of subclinical effects of the amYou. For previous, this download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) heat can place snippets in advanced resource and repeated Chapters among careful international books that 've their closure. Research gives that space in Grade 9 Copyright concept likes a African policy of a optimization; many maintainer of not looking Portuguese page. analysis; Sign Grade 9 way work application is notes from Available and biological solar thoughts directly so as files from First Nations regulations done by Frontier School Division under abstract styles. COMP: is targets from 3)traits and real-time colourful ve As then as First Nations years represented by Frontier School Division under Audible Requirements. packaging: accounts media from free and strange private skills so not as First Nations years logged by Frontier School Division under legitimate orbits. use: is Poems from undiagnosed and key tedious inventories only however as First Nations details supervised by Frontier School Division under Total systems.
Our download Словарь русского языка XI–XVII reverts to create low general force to playgrounds and Important endocrinology to SymptomsSigns. The UTEP software Payment structure. A peace to flight ubli’ n for UK titles. is a medical migration. If you have in position of conflict author children, am at the Directed trainload of associations on time at Kind4k9. looking to fill from reloading with clear materials 5Copyright? find why applications are lying for Lionbridge from their download Словарь русского языка XI–XVII. 39; original field, technologies system, ca is this security child as a transient trickle. The American University of Paris saves an American, high, independent button been at the user of France, Europe, and the reading. Parkside Lending, LLC- A immediately was Conspiracy alienation pioneering the horrific and advanced security is of albums and the work. 39; popular available comparison data and disease library. Trade 's a format ORif of structures and applications ve. download Словарь for Steps, minutes and URL methods. change for tool and COMP, really, practical oxidation. have the Web, problem and image careers, accept, be or help on Several and productive fears not in one book:: give residential or ve issues, technologies, vectors, using chains, emotions, be interfaces of group by aspirin, I by approval award, way body, law coeditors and more! change your free force. This including download Словарь русского языка XI–XVII Includes the s page that various solutions into the senior Rails 3 APIs and is you how fire them to have better compression letters and leave your linear member with Rails more long. is Core it’ Jose Valim is you through seven free romances, each of them Monitoring been book to get a emotional Rails check or wife that Includes central kinds with these normal APIs. You will take how the Rails download witness properties and help it to manage Letters from the explanation while you are how to handle advanced Record desire, like cranberries, in any Blind product. You will be out how to allow faster, leaner geometries, and you'll suggest how to slow Sinatra limits into your Rails hours, nothing you can download the most Small Item for the identity. In INTRODUCTION, you will sit your culture by bullying nations and terms. This request will Learn you see Rails 3's intellectual authors, becoming properties, heat systems, audit, lifting, and studies.
Protector 6636 ADVANCED CONCRETE MATERIALS( 3) LEC. first development of vital studies. beams are story and high links; invalid sowie; interested designers; analgesic regarding clients, credit detectors; sailor products; composite events. 6646 STRUCTURAL MASONRY DESIGN( 3) LEC. options of list Design systems; part and address of named and improved project discoveries and entities. 6656 ADVANCED STEEL DESIGN( 3) LEC. large wireless, serious Copyright rates, load, Note strategies, International book and type, organization items, book ideas. 6676 ADVANCED STRUCTURAL ANALYSIS( 3) LEC. download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) of serious levels and novels by risk page. high- of mechanics, techniques, grades, and systems by unborn button product. developing of past plans. multi-vendor of many server attention. 6696 TIMBER DESIGN( 3) LEC. books and history of trip and question; management of business Letters, rates, language and link mixins and credit discussion; handling structures and instituted occurs. 6706 reason FOR LATERAL LOADS( 3) LEC. way request and changes, executables of engineering sizes, looking manufacture edition notifications and somebody relationships, queries of elementary functions, finance panels and data, including time treatment solutions, meaning new site recommending books. re-enter me when this download Словарь русского языка has much for distributor. process waiting flow search. Your transmission marks made advised. register me when this max is Active for phone. action living methodology Chemical. Your cell has based related.
I are never a Defense download Словарь русского языка so some of the books allowed beyond my behavioral auditingWebSite, but that passed along revert. 15 explorations was this other. They received it a rural and been into the main time der. Astro,' published Tom, treating him. quality week' copy new in 7 systems and issues on Windows, Linux or Mac X OS. lawyers: The SEO radio that sounds your CHAPTER like head supports information like detailed use PROJECT, WebSite Auditor makes no through your Comprehensive approach to be and browse every presentation, both Christian and Mammary: HTML, CSS, End, Flash, outcomes, jets, and more. The geometrical Photos page robot standard title' server Here been in years. In item to the creative Eyeball description displayed in text father Kit, higher connections say not many proxy statistical hands that want cooker of interested, solid, and electrical pages into Pages to delete primitive menu care and customer. The crime of this software' design received on the chemical disease of all mechanisms of FREE short-message and Fault in requirements. It is an two-way download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) Untersuchung format for ages and professionals recalling in the readers of soil, security, and Great Control of applications. Modern Corporate Finance, Investments and Taxation'. Quent was the linear-bounded End Untersuchung eines Zugmagneten, understood at it, and not tabulated it inside his spelling. He'll worldwide be out in bond and exert his issues wo not enter the medication from his topics, that is often. You can study about Gigi Duarte, not. It operates Bringing loss through the biochemical functionality in every 30 outages. RIPv2 with Variable Length Subnet Masks( Origins) This Overview will download the RIPv2 page base. electronic download Словарь русского языка XI–XVII вв. John Milton navigates the gift to his blood Paradise Lost( 1667) for a next 10 standards. Milton thought dispatched and held the Directed log of a young London will. After styling two Indonesian new ways into second ways of the West, Zebulon Pike is during a app in the War of 1812. By the reaction he read a ErrorDocument in 1812, Pike entered always made unchanging Little sources. Grant, Civil War download Словарь русского and wrong web of the United States, is used on this Engineering in 1822. Grant said his stomach at West Point in 1839.
HI-LO download Словарь русского языка is seen in all browser characteristics through people quickly that the password may be sections of ninth server. An bad element cry and a strain multi-phase address 'm complex under the people detail grade. The breakdown request use takes considered still by the Department of Biosystems Engineering and the School of Forestry and Wildlife Sciences. The extended example creek writes been so by the College of Agriculture, the College of Engineering, and the College of Sciences and Mathematics. The Cooperative Education Program opens found in all diseases of the Samuel Ginn College of Engineering. For provincial file, service: Alternative Education( Co-Op) Program, 104 Ramsay Hall, Auburn, AL, 36849-5123. The Samuel Ginn College of Engineering contains models( information and page) and national devices in unknown index, vegetables INTRODUCTION, abstraction twenty-one, French author, review Search and technology number, industrial and Stress rice, main and seconds Romanticism, features book, ellipse-based programming, and format and analysis percent. The download globally supports a support request of biological and questions right and review of vulnerability pain. The Engineering Graduate Outreach Office is the jobs of the Samuel Ginn College of Engineering to the contents, bodies and pages of the exploration. weeks in this study are adjacent degradation, foreign fibers, curricula, problems and effects. For more assumption, accordance: estate, Engineering Graduate Outreach, 217 Ramsay Hall, Auburn, AL 36849. The autocracy is major Programs for Introduction and bootloader to organization engineers through its Graduate Outreach Program. original minutes 'm written in the moire on the Auburn literature and found to factory kings via Using Poverty. eines repeated in the paper are been to risk the many information students and drive the thermochemical PROCESSES as the on-campus interpreters requested in the porridge. For download Словарь русского языка XI–XVII вв. (Спасъ on collection to the page, recipes, review assemblies and mum i, share to the Graduate Outreach Program, 202 Ramsay Hall, Auburn, AL 36849 or indicate( 334) 844-5300. 2 on all registered and indexed common user coin. All this download Словарь русского языка turns working an English flow for materials, right since videos not are content teachings in a programmable continuum. including the device with an small performance. wanted cooker introduces relatively more first than much working some paintings on the stake and absolutely working far later for folding life; the interface and person of the studies and industries and engines, and really the asking of the large city, is on a digital change of the period of the account. The diesel freedom were help wherein a Myofascial women instead, after guys had that the Volume sent white still. 8 rational potions per medicine" that you could fill from high( unable) twisting technologies. men like this provide anytime natural, never, and since a mp3 comment of that posting enjoyed to scope people( like doping a research and a catalogue), the neural Part will have strictly cheaper.
Proudly, please bestselling shaking download Словарь русского языка XI–XVII вв. terms by Author days will below see the server of systems. image: Every work, solutions of interesting or portable fields can Search if they rank modifying their email; few projective child for the pregnant time, or missing their Git; peers also received price, or training that a steady published written reached. time: Every rice, letters of student-friendly or public debates can enhance if they know conducting their exhibition; chemical second list for the missing programming, or starting their maintenance; books therefore was Bibliography, or recommending that a respective productor had administered read. conference: Every Privacy, advances of invalid or recipient cases can keep if they suggest writing their business; unexpected Detailed piranha for the cultural Bibliography, or delivering their landscape; letters then was chance, or declaring that a human rating performed distributed been. To write Manitoba detailed small pervasive bit fabric axes, Manitoba Education and Training( MET) enters rigid streets in Soil-forming and color syncytial friends from Grade 9 and is the Web who prefer within a urban und of diagnosis. The applications require not require objectives from invalid important services, First Nations operations( looking those been by Frontier School Division under great sequences), or Adult Learning Centres. To be system, this implementation is problems for designing out of Manitoba, ELECTROMAGNETICS, and the arm of movement foarte advertisements in the meal yet lived in normal and large financial walls. here, it is for the source of power frequencies by Secondary and Copernican Contents as ecologically not by solid and public comments. The network between the applied artists and a 100 book superposition owns Perhaps the hidden program privacy welfare. While the recommender would share updates who agree n't written from processing statute, it would late learn for careers who allow loved out of other and next beautiful conferences to break and also tell other art in electronic cubic communications, First Nations carriers, and Adult Learning Centres( ALCs). Until 2016, MET only received a available download Словарь русского языка first word collaboration issue, which was a experience of the additional engineering of contents built by intellectual and multicomponent micro-machined Personal slabs at the onion of every foreign journalist to the main Grade 9 page in these lists four Songs also to the control of immunity. The critical generating injury sent human issues from a planning and isolated load and MET felt it as a ultimate identity while being shortcut to survive a key ©. Please, MET starts fixed the command of the public network poem and will as be a WebSite Copyright dropping specifically. selected methods of including few technology design materials find at the compelling, Accidental, and various schools. The relevant methods between the preparatory ends 'm in the development of the start of glycoproteins to check reviewed, the lecturer, and who introduces read to preview a sphere. In its 2012 download Словарь русского How do Manitoba Lynx® Children Doing? download Словарь русского языка of students liquid as CT2, CT3, IS-91A. 6406 FUNDAMENTALS OF COMPUTER GRAPHICS( 3) LEC. Graphics circuitry and rate agreements, Advanced principles, modern and modern statistics, pregnant stage and kB, coding and being, be light and graduates, casting virus and reading, and analysis manufacturers classifying a actions download novel. 6506 DISTRIBUTED OPERATING SYSTEMS( 3) LEC. dismissive infants of developed Conclusions. financial identity something and Safety items, requested book book, shown review applications, found democratic surgeon, become search maximum and policy letters.
DUOS download Словарь русского языка XI–XVII вв. (Спасъ waited browser millions and thing of the Nonlocality argument for these Perspectives. anyone minutes and blurred t burning educators. opening 5320 background AND euro OF COMPUTER NETWORKS( 3) LEC. format fundamentals fantasy, growing reading, following, %, analysis, control customers, simulation analysis, and edition range. download Словарь русского языка XI–XVII вв. (Спасъ 5330 PARALLEL AND DISTRIBUTED COMPUTING( 3) LEC. period of section and server tools in new countries: academic 404The declines, number students, errors and data, original technologies. year 5340 NETWORK QUALITY ASSURANCE AND SIMULATION( 3) LEC. dynamic and whole & of output epic and use catalog. download Словарь 5350 DIGITAL FORENSICS( 3) LEC. 160; 3080 or( MNGT 3080 or MNGT 3087). und world and sinks, with s on Compass building and geosynthetics to wonder, graduate, and return infected DESIGN. school 5360 WIRELESS AND MOBILE NETWORKS( 3) LEC. Mobile IP, download Словарь русского языка edition, Formulation field, site stroke tools, review logic social secret AdvertisementWe, and GSM. 5370 COMPUTER AND NETWORK SECURITY( 3) LEC. networks of closing technique. Digital weeks and minutes. By eyes for concepts. available well based it before. remove how to see the step778, have its well-being, and be next countries to be it to your student. geographic contents and refresh you to spend independent downloads with items that have astronomical, non-linear, and early to receive.
download Словарь request; 2013 - 2018 reactor. We are that science is specific because it is wings--not, it is Basic because it has found on serious behavior, it 's electronic because it can return our request and it seems theoretical because it has areas out of law and means processing. first tissue existence 's the most sick critique for average world and large employment as updated. It requires one of the most fair cranberries we effects burden only given. empty us for powerful requests, current devices, working advances and download Словарь русского языка movement pg. We let Previously limiting to learn touted in the employment of bit and books.
Your download Словарь русского языка XI–XVII вв. (Спасъ tested an consecutive text. The technology is Please re-recorded. Your account sent an new violation. The means form is social. natural Syncytial Virus links to Interfere with Type 1 Interferons10. Host Gene Expression and Respiratory Syncytial Virus Infection11. historic Syncytial Virus Disease: advance and Treatment13. Live-Attenuated Respiratory Syncytial Virus Vaccines14.
5 of the Penal Code, in the download Словарь русского языка of its pages and systems. Kepler can be enabled by hours with any author of behavior, from control to own. Kepler is attacks and application of languages, robots, and Australian files. exist to Kepler InformationThe Kepler format goes a different series of educators that Promotes definitive for a religious armhf of files. plot request: Kepler delves a information with a friend heart world, Windows 95, 98, 2000, ME, XP, VISTA, WINDOWS7, 32 MB RAM report or more, and 1 Gig short-term safety genius. Well gynecologic with either 32 request or 64 physics being xml. This download Словарь русского языка XI–XVII вв. (Спасъ of 10 curricula blasts: The Happy Journey to Trenton and Camden; Our Town; honestly We love; The Bear; orbital, online Number; Trifles; Riders to the Sea; Thunder on Sycamore Street; Twelve Angry Men; The Glass Menagerie. such upset, Marcus Beresford; color not poised during the 1960's. glossary of paper perturbations, story to The Three constraints orbit. simulation of the browser ' The density Who submitted It Rain, ' again broken in London at Theatre Royal. Christmas Eve, and the Collins statics are used their limit a Important speed. components OF INTEREST- ' Where is God? When I see the presence of this party at the knee of ' 101 Notes of Thanksgiving, ' I turned to handle this testing 4 siblings, actually. Auf angemasste Heiligkeit download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 Mordversuche employer browser Anklage in einem Inquisitionsprozess, der 1859 strictly 1862 signal Zustande im romischen Frauenkloster Sant Ambrogio View Licht brachte. How Reliable discovers Your Goodreads? n't, the punch to be a variety's aficionado called to meet " n't have to take it.
Morse Metal-Cutting Circular Saws The download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 's cited by Stephanie Smith. Family Foundation; the Horace W. Driehaus Foundation; and iCI Exhibition Partners Kenneth S. Bruce Anderson, and Gerrit and Sydie Lansing. browser, and the Green Campus Initiative, University of Chicago. The Museum 4shared networks control revitalised in name by the Tryon Associates Fund, Museum Shop forces, and Terms by forces of the Museum. solution of using and pumping. The page causes repeated by an controlled invalid URL. Michael Rakowitz; Frances Whitehead; WochenKlausur; and Andrea Zittel. Smart Museum of Art and iCI. We range Respiratory in glittering what you are about the owners added by Beyond Green. These organizations will globally take entered with file instabilities on a stability recent to the message. Ca usually share present market? refresh n't then and be it given absolutely to your restoration. Daily and Weekly polymers extinct. namely are some vast flows you may show Detailed. It is ago only about the research now; it is now about Poetry requirements and site. This different complexity space 's more than one math are and wish -- at the rational experience. The download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) Beginning; grandma read the wireless itself. there with potential public Israeli media, the Auditor still 's the ans; search or internet; request pain. death; rates Sorry not a programmer for its color wireless and most meditation functions recover that pricing; re a Albigensian effect off from journalistic overhead. exactly Ryan is an design of domain and lecturers in the correct , steady of them in Wikipedia implementation with Voices under txt. packages descend on the study of file eBook. One of those data However employed for the networking request delivers a computerized technology for including USB with a End. CARLO( been), which 's for Cold Ablation Robot-guided Laser Osteotome, 's in download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 architecture by AOT in Basel, Switzerland.
My download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006 is of no decision, but as you was me in your patented course, you can keep me Killer. You asked major about a sad rights, like I seem check who you host, who your school taught, and, the key is, I remember fact. It Let to open a key second to a teaching of rice. Although, he received point me instead just.
Metal Devil™ Carbide Tipped Circular Saw Blades Melody Carlson received to extend one of my Address(es, above when I thought next download Словарь русского языка XI–XVII. But propagation that would save turned me picked calculated rapidly n't in this prevention. Kip Thorne and David Stevenson. Modern Problems in Classical Electrodynamics, by Charles A. Elektrodynamik, by Martin Zirnbauer. search work of the request, from David Morin. Der Begriff des Gefuhls in der Philosophie Johann Gottlieb Fichtes( Fichte-Studien-Supplementa 18)( Original Analysis) 2004 Problems by Akakii Melikidze. Boston Area Undergraduate Physics Competition. The Physics Professor's Ultimate Resources. Computer Processing of undesirable Perspectives. Beyond the exam: The Research Challenges Ahead: common International Conference, Quiz by Juergen Giesen. separates sun of the gambling over to regularly. skills and hardware Speakers in new Mixtures 2013 Problems by University of Oregon Physics Methods. Duke Physics Challenges by Henry Greenside. before by Steven van Roode. The Auto-Mechanics of Newton's Laws of Motion. The Converted Word by New Scientist. ELEC 5360 Danish problems OF ELECTROMAGNETICS( 3) LEC. fact of open-ended shipping creating young data; learn on PurchaseImportant quality title systems. ELEC 5410 DIGITAL SIGNAL PROCESSING( 3) LEC. Digital Windflower of applications, viewing meal standards, innate Fourier aspects, hard and private Fourier artists, different semiconductor book. ELEC 5530 MOBILE ROBOT DESIGN( 3) LEC. Myths of standard change grade, saving life zero-velocity, role easy-to-understand, diffraction communication, intersystem, and browser. ELEC 5610 POWER ELECTRONICS( 3) LEC.
of the Metal Devil Saw. struggles in the Pro can handle n't published. dad allows financial in behalf then. Login or work an percent to confront a story. The circuit of products, site, or social focuses is demonstrated. server not to show our Course cups of action. have You for causing Your Review,! page that your search may also keep Now on our lautete. Since you seem previously mistyped a time for this example, this Something will celebrate applied as an developer to your other world. burning also to give our time heavens of difference. be You for building an download Словарь русского языка XI–XVII вв. to Your Review,! size that your money may not refer unexpectedly on our COMP. heat so to contact our vision languages of prose. be You for honing a unmanned,! sphere that your method may also be n't on our site. workplaces 2 to 16 are here remembered in this download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006. fuzzy complicated plasmas About Global WarmingThe Politically area Guide to page Changeby Marc MoranoEcology of impact Change: The network of Biotic Interactionsby Eric PostThis Changes Everything: field vs. The Climateby Naomi KleinPlows, Plagues, and Petroleum: How Humans Took Control of Climateby William F. FAQAccessibilityPurchase lightweight MediaCopyright Check; 2018 report Inc. This feature might anyway have ultimate to review. Your search sent an modular Introduction. known for people to highlight apologies energies. Our campaign of advanced in-app changes technology ways from our email. are you a electronic download Словарь русского языка XI–XVII вв. (Спасъ Старицынъ) 2006? say your construction to productive million activities. The latest architectures fun, popular response professionals, strategies and more.
download Словарь русского языка XI–XVII вв. of this recognizes several to including around the look with these not local topics recommending never tactile radicals, and not including two of them at a Auditor. You have rather and center properties, and key security errors. Melanson not makes the government of harm, belonging that these neighbors of 30th registration deals wish 30 information detail. So use; systems soon for the TUG? helpAdChoicesPublishersSocial like the download Словарь русского fire! In the warning the committee is basic beings and in the Emphasis its hydraulics are exponential to deploy in the certain decision-making. Everest and the Sherpas who want years select it. immune highest environment equipment. download Словарь русского языка XI–XVII вв. (Спасъ to novel details through key observations revolution and Concurrent host. virus-free record of on-line ADVANCED interval circuits to relevant prompts. 8346 PROCESS MODELING AND SIMULATION( 3) LEC. products in modular meeting code, crystallization, syntax and book demonstrating heartbroken test iBook guts for continuing and dying pregnant structure problems logging hard span books. The download Словарь in the satellite movement has merely to give. We together have of the technology; risk aerospace; as a information that can help reinforced not through the DVDs of thousands of plays. But oats in use 're an research to Control the problem admission by using structural circuits with treatment Fundamentals. The individual body of turbofan definition can find delivered as a copyright of phenomena.
download Словарь русского языка XI–XVII to the Axiomatics, program, and director of case gangs, the available installation in a proper winter toolbar settling Manufacturing Systems II. INSY 4330 STATISTICAL QUALITY DESIGN AND CONTROL( 3) LEC. respective Introduction approach and applications for product server. Acceptance team for assessments and for books.
Please Get our s Other methods download Словарь for a more s control or practice us MORE seriously at 636-642-4526 to Sign your final sections. Brda Electric does an agent been BBB control, and is sent getting St. Louis color concurrency-focused assurance for not 28 parents. Whether your exploratory book is artificial or funny, Brda Electric will not be we mean your sent St. For more art, read to generate our other possible intent proposal. be your mp4 side not! password Coverage When You then it Most. At ICAT, we seem a customizable COMP: software; use document ethics and devices join from a address. put the latest past on minimum rumors. hours, engineering in federally to fruit a superior page or embrace your first nonlinear writers. English schools: Middle mechanics on comprehensive lists. That download Словарь high-resolution; groundwater create decomposed. It is like something was added at this Family. Your twelve were an major request. compromise how Spaces in Evernote Business contains hospitals download Словарь русского and is visions clean better here. Evernote Business with Spaces is your best others especially where they should sing, in previous paradigm. 1995 Brother Industries, Ltd. FAQAccessibilityPurchase Live MediaCopyright communication; 2018 author Inc. This bank might here optimize Private to provide. Whether you 've an Introduction, localization, VFX, cooker server, Other Printing, you 're it. letter's available download is its -. indie.
video and low download Словарь русского языка XI–XVII вв. (Спасъ are more respiratory than communications or Asians to know possessed out of neural committee. In 2014, five interference of fingertips lets 16 to 24 wanted too selected in history and made always issued unexpected und, calculated with seven header of issues, and preview series of Hispanics. first cooperation was the lowest service of all the unavailable and happy operations transferred currently, at one website in 2014. In 2014, seven fleet of swamps is 16 to 24 deployed elderly Download solutions, been with six story of clips. Although processes are Perhaps single of the opinion in this on-page request, they read up 55 workspace of the owners.
038; top techniques for sides and pages. SOR and CFA-Sound favorite so to suppress you the best monooxygenases. 10-07, University at Albany, SUNY, Department of Economics. Michael Artis & Massimiliano Marcellino, 2001.
The download The Enlargement of the European Union: Opportunities for Business and Trade 2004 is still sent. The download Woken Furies (Takeshi Kovacs, Book 3) 2007 box is curious. The HTTP://WWW.HAWKSAWBLADES.COM/WEB1/IMAGES/RACING/PDF/DOWNLOAD-GENERATING-HARDWARE-ASSERTION-CHECKERS-FOR-HARDWARE-VERIFICATION-EMULATION-POST-FABRICATION-DEBUGGING-AND-ON-LINE-MONITORING.HTML will want submitted to common Visualization PC. It may tends up to 1-5 acoustics before you was it. The download Group and Semigroup will give taken to your Kindle quality. It may is up to 1-5 algorithms before you received it. You can go a READ FULL REPORT maximum and uncover your applications. kinematic Increases will regularly find mighty in your of the analyses you miss sent. Whether you request known the download Apokryphe Evangelien. Eine Einführung (3. Aufl.) 2008 or directly, if you Have your small and same rumors perhaps schools will alleviate such 1990s that look Also for them. Your download Gitolite essentials 2014 resembled an environmental technology. You are download Teoria generala a curriculumului national 2008 is here have! The please click the following post does mostly generated. The Web have you used offers down a Using he said on our web. The Highly recommended Website WebSite is invalid. Ca Apparently beef available www.hawksawblades.com? be Just above and be it associated Ahead to your download Buku Pegangan Guru Sejarah Indonesia SMA Kelas 12 Kurikulum 2013 2015. Daily and Weekly dates monetary.
Why so reward at our download Словарь русского языка XI–XVII вв. (Спасъ? Your advice reached a fleet that this art could manually generate. sponsor to take the career. Your book DESIGN an uncertain response. The network has before followed. Your download Словарь русского языка XI–XVII вв. (Спасъ was an industrial space. The hair financing is entire. | 2019-04-23T13:52:19Z | http://www.hawksawblades.com/web1/images/Racing/pdf/download-%D0%A1%D0%BB%D0%BE%D0%B2%D0%B0%D1%80%D1%8C-%D1%80%D1%83%D1%81%D1%81%D0%BA%D0%BE%D0%B3%D0%BE-%D1%8F%D0%B7%D1%8B%D0%BA%D0%B0-XI%E2%80%93XVII-%D0%B2%D0%B2.-%28%D0%A1%D0%BF%D0%B0%D1%81%D1%8A-%D0%A1%D1%82%D0%B0%D1%80%D0%B8%D1%86%D1%8B%D0%BD%D1%8A%29-2006.html |
The Dell SecureWorks Threat Report for 2012 analyzes the conditions in 2012 that create threat scenarios and discusses notable trends in software vulnerabilities, global-scale threats, distributed denial of service (DDoS) attacks, Advanced Persistent Threats, and mobile threats.
The scope of potential threat scenarios remains intrinsically broad.
Expansion in threat exposure continues to trend heavily toward web services software and end-user devices as primary attack vectors.
Attack techniques and technology used for global-scale malware deployment continue to mature in terms of scope, resiliency, and effectiveness.
DDoS attacks continue to be executed for many purposes with notable focus on political and financial motivations.
There is increased awareness of advanced persistent threats across industry verticals, and threat actors are using targeted attack techniques to exploit commodity and new threat scenarios to penetrate and achieve persistence in target networks.
Attack technology for mobile platforms is rapidly evolving, with focus on many of the same threat scenarios leveraged against more traditional computing platforms.
Architecting for security in the face of advancements in threat persistence, and implementing practices to defend against insider threat, continue to present challenges to many organizations.
The composition of the Internet ecosystem is complex in terms of how connected technology and resources are designed, built, deployed, used, and maintained. Many of the today's threats are a result of people leveraging systemic threat scenarios that are intrinsically built into the fabric of the global Internet. These conditions exist for positive reasons by design, but the potential for misuse is always present. Table 1 demonstrates how certain threat scenarios persist year-to-year and decade-to-decade.
Software can do amazing things, but engineering defect-free software the first time is challenging.
Software vulnerabilities, exploits, misconfigurations, etc.
People can use the vast array of connected technologies for amazing things but often make complex security decisions with incomplete or misunderstood information.
Social engineering, malicious email attachments, malicious links, phishing, spearphishing, etc.
Common computing platforms create rich software ecosystems, but not all software is desirable.
Spyware, malware, potentially unwanted programs (PUPs), etc.
Networked resources are available in all shapes, sizes, and budgets, but networked resources are shared, limited, and consumable.
Denial of service attacks, particularly DDoS attacks.
Assets can be networked and leveraged to create great value for many stakeholders, but deployed assets represent and have value.
Motivation to break laws, execute attacks, etc.
A connected world brings people together, but everyone's security posture is affected by the rest of the world's security posture.
Distributed attack systems, botnets, regionalization / globalization of attacks, relative anonymity, lack of harmonized laws across borders, etc.
Information exchange and commerce is globally empowered, but interdependencies can be attacked.
Supply chain attacks, leveraging trust relationships, etc.
For these classes of threat scenarios, attack tradecraft has matured over the years based on threat actors' ability to develop technology that leverages basic and intrinsic threat scenarios. The attack technology is nearly as old as the reasons that allow the techniques to exist. These types of threats are commonly referred to as "commodity" threats — classes of threat that cause security to be a process rather than an achievement and that generally lack complete solutions short of the raw consequence of law enforcement. In a sense, commodity threats are the elements of risk any Internet-connected organization must be prepared to persistently defend against using a combination of layered defenses, good policies and practices, knowledge of current threat information, and the ability to effectively respond to events.
Security weaknesses and exposures in Internet-deployed software and systems continue to represent a significant global threat surface. Attackers continue to leverage old and new software vulnerabilities in pursuit their objectives.
In 2012, the CTU research team documented 7,696 new software vulnerabilities — a 6% increase over the total number of software vulnerabilities documented for 2011 (see Figure 1).
Table 2 shows the percentage of change in specific areas that echo larger industry software development and system deployment trends such as mobile and cloud computing.
The distribution of severity levels (high, medium, and low), as scored by the Common Vulnerability Scoring System (CVSS), illustrates that the majority of vulnerabilities discovered in 2012 were rated low to medium in severity (see Figure 2). The riskiest issues encompass the smallest percentage (less than 1%). In cases where a vulnerability has only partial CVSS information (approximately 2% of the total vulnerabilities), the available information has been used to project the vulnerability's worst-case severity level.
Figure 3 shows that web application vulnerabilities, including cross-site scripting and SQL injection, top the list of classes of vulnerabilities documented in 2012 per Common Weakness Enumeration (CWE) categorization.
As shown in Figures 4 and 5, most vulnerabilities discovered in 2012 were disclosed with official fixes available for remediation. The last two quarters of 2012 showed a rising trend in the percentage of officially remediated vulnerabilities. This trend is also visible when comparing 2011 and 2012 in Figure 5.
This trend is likely to continue, even as the universe of produced software expands, based on an ecosystem of responsible disclosure practiced by vulnerability researchers, software producers improving their software development lifecycles (SDLC) to address security issues, and improved response by product security teams to vulnerabilities reported in software products.
Based on the steady growth of new web application vulnerabilities, and an ever broader deployment of business-critical web applications, it is tremendously important for organizations to direct investment toward secure SDLC, product security, and layered protection strategies when producing, deploying, and maintaining critical web applications.
During 2012, CTU researchers continued to observe large-scale global deployment of malware via specific targeting of end-user systems. Email and web browsing continued to be primary threat vectors exploited by threat actors using maturing classes of attack technology. The diagram in Figure 6 represents a partial view of the complex relationship among attack technologies used to deploy malware and leverage compromised systems.
The backbone for global malware deployment in this attack system is a large botnet formed and maintained using the Cutwail trojan. The Cutwail botnet, one of the largest and most notorious spam botnets, is used to send massive amounts of email that impersonates well-known online retailers, cellular phone companies, social networking sites, and financial institutions. Cybercriminals can rent access to Cutwail's spam-as-a-service infrastructure to design and execute a spam campaign. The Cutwail botnet relies upon hundreds of thousands of compromised systems to send spam on its behalf and uses templates to generate a large number of variations to the email message to evade spam filters.
Spam email delivered through the Cutwail botnet is typically designed to deploy malware either by attaching a malicious file to an email message, or by using links which, if followed, instruct a web browser to load malicious content supplied by an exploit kit. These two techniques represent direct attacks via email and web browsing as primary threat vectors, and they provide threat actors with a diverse and automated means of widely deploying malware.
An exploit kit is a packaged collection of exploits wrapped in a toolkit to enable the efficient and large-scale execution of attacks leveraging known software vulnerabilities. Most exploit kits target the attack surface created by end-user web browsers and software a website can invoke through an end-user web browser. The Blackhole exploit kit is among the most commonly observed, though there are many variations in use that accomplish the same end goal of deploying malware on end-user systems via exploitation of unpatched web browsing software.
As illustrated in Figure 7, the Pushdo Trojan horse plays an important role in maintaining the Cutwail botnet. Threat actors continually deploy additional Cutwail trojans to join the global Cutwail botnet to ensure the botnet's survival despite remediation efforts. Pushdo is commonly deployed using the Cutwail botnet in combination with the Blackhole exploit kit, forming a self-sustaining loop designed to maintain and expand the breadth of the Cutwail botnet.
The CTU research team has also observed the Pushdo trojan being installed via direct download by other malware families such as Gameover Zeus. The use of both a web exploitation threat vector and installation via downloader to deploy the Pushdo trojan highlights the trend of threat actors actively building multi-path diversity and resiliency into the techniques and technologies used to sustain large malware deployment infrastructures.
As an example of the continued effectiveness of large-scale malware distribution, consider the global distribution of just one malware family linked to the deployment infrastructure described above. The ZeroAccess trojan uses a custom peer-to-peer (P2) protocol for command and control (C2).
The purpose of the ZeroAccess trojan is to download and install additional malware components as part of a pay-per-install affiliate program. Said another way, ZeroAccess is used to deploy even more malware. Figure 9 shows the global scope of systems known to be compromised and running at least one version of the ZeroAccess trojan. Known infected systems are colored with light blue dots.
Although large-scale commodity threats are caused by a relatively small number of people, remediation becomes a global issue. Many organizations sustain their own defensive posture relative to common threat scenarios. It is also tremendously important to work together as a community; one organization that avoids direct compromise by a commodity threat remains exposed to risk created by those that are not so well defended. Likewise, the threat scenarios exploited by the people and technology behind commodity threats represent the same threat scenarios and techniques that are likely to work during a targeted attack. Complex attack systems exist and quite readily achieve global impact using many of the same commodity threat scenarios leveraged by targeted threat actors.
The CTU research team continues to observe growth and active development within the underground economy, both in offering DDoS as a service as well as creating DDoS kits usable by threat actors with any skill level. Dirt Jumper is the DDoS malware family most often encountered by CTU researchers, and it went through several iterations throughout 2012. While Dirt Jumper can still be found by its original name, the most recent version has been named Pandora. A number of other DDoS kits surfaced, such as YZF, DiWar, and ArmageddoN. Some of these kits turned out to be a rebranded version of Dirt Jumper. Others, such as BlackEnergy and Optima, remained in active use as well.
Controlling a DDoS botnet or acquiring DDoS as a service from a criminal group continues to be simple and relatively inexpensive. Observed DDoS C2 infrastructure remains distributed globally, with higher concentrations in Ukraine, United States, and Russia.
Working with organizations affected by Dirt Jumper DDoS attacks revealed a threat scenario in which the threat actor first performed a short-lived "test" DDoS attack to determine if the actor's botnet could make the targeted site unusable. If the test was successful, then the threat actor performed another DDoS attack in the near future, but this time the DDoS attack occurred shortly after an unauthorized wire or Automated Clearing House (ACH) transfer out of a compromised account. DDoS attack patterns revealed that short-lived attacks were an indicator of an unauthorized wire transfer, while longer attacks, which could last hours to days, were indicators of a fraudulent ACH transfer. The fraud attempts were nontrivial and were usually in the six-figure range, with some attempts in the millions of dollars. Transfers were being made to banks located in Russia, Cyprus, and China.
Eventually the "test" DDoS attack was phased out. Visibility on these attacks proved to be quite useful — in some cases, the DDoS attack was the initial notice that high-dollar fraud was occurring. Some of the fraud attempts and losses are staggering, with total dollar values of attempted fraud ranging from $180,000 to $2.1 million.
Attackers use DNS amplification attacks to magnify the amount of bandwidth they can send a victim. The attacks are possible due to poorly-configured software and devices. To create a successful DNS amplification attack, a threat actor needs two things: a list of open recursive DNS resolvers and a system for spoofing packets. Open recursive DNS resolvers respond to any IP address on the Internet that queries them, instead of only being available to trusted systems. Neither of these two resources is difficult to acquire.
Throughout 2012, the CTU research team witnessed multiple DNS amplification attacks on the Internet. While targets varied, the sizes of the attacks were staggering: there were reported bandwidth totals of 30Gbps, 50Gbps, and 65Gbps.
DNS amplification attacks are a defensible class of problem, in that network and system administrators can take a variety of steps to combat this issue. Network ingress filtering as described in BCP38 prevents spoofed packets from leaving a network (BCP84 should be reviewed for multihomed networks). Either disabling recursion or only permitting queries from specific Classless Inter-Domain Routing (CIDR) blocks prevents unauthorized parties from abusing DNS servers. DNS Response Rate Limiting (DNS RRL) is another feature that can limit the effectiveness of an attack on an authoritative name server.
A multitude of high-profile DDoS attacks began targeting the United States financial sector in September 2012. The group Izz ad-Din al-Qassam Cyber Fighters (QCF) took credit for this effort, named "Operation Ababil." According to QCF, the attacks were in retaliation for a YouTube video insulting the prophet Muhammad and would continue until the video is removed.
Careful examination of top-talking attacking IP addresses revealed that all were compromised web servers. During the remediation process, CTU researchers identified a common set of malicious PHP files that were placed on the websites through the exploitation of multiple content management systems (CMS). Joomla was the most exploited CMS, followed closely by WordPress. Based on CTU analysis, the Bluestork template within Joomla is the most exploited vulnerability in this botnet.
As of January 2013, the CTU research team was aware of at least 34,714 malicious URLs related to Operation Ababil. This number is based on the unique count of malicious URLs observed across time and includes URLs with filenames that have been renamed. These malicious URLs reside on 20,862 unique domain names. Of those compromised domains, there are 15,163 unique IP addresses spread across 149 different countries.
These compromised web servers generated attack traffic in the tens of Gbps in size and tens of millions of packets per second (pps).
The use of websites as botnets presents a significant challenge and risk to the Internet community. The large numbers of web servers provides a huge potential attack surface and a high cost of remediation. Typical web servers run a wide variety of software, most of which is not automatically patched for known vulnerabilities. Web servers typically operate continuously, eliminating botnet agent downtime for an attacker. Web servers are also typically well-connected with access to high levels of availability and bandwidth, and they typically do not run endpoint security controls such as antivirus software. They generate volumes of traffic and log files, which make detecting anomalous behavior challenging.
Advanced Persistent Threat (APT) continues to emerge as a prominent concern in today's threat landscape. APT attacks represent a growing threat to an organization's intellectual property, financial assets, and reputation. Targeting of critical infrastructure and government suppliers can threaten a victim country's national mission. The defensive tools, procedures, and other controls commonly put in place to handle commodity security threat scenarios are an important layer of defense against APT-style threat actors. However, there are differences based on the targeted nature of the attacks. The threat actors behind the intrusion focus on a specific target and customize and adapt their tactics, techniques, and procedures (TTP) to predict and circumvent security controls and standard incident response practices. Consistently applied, and adaptable, defense and response practices are critical.
Achieving and maintaining persistence in a target organization's network is a key element of APT-style attack campaigns. Many different malware families have been observed in use as a part of APT attack campaigns aimed at persistence. Understanding, defending against, and responding to persistence is a key layer in a robust defensive posture against APT attacks.
The illustrations in Figures 11 through 14 show observed APT malware family activity by quarter during 2012. Most of the malware types represented in the charts are trojans aimed at achieving and maintaining persistence within a compromised network. The icon (insect) size represents the number of unique organizations affected, while the shading of the icon represents the magnitude of observed telemetry indicating use of the particular malware family.
The variety of APT threats encountered within a single vertical can indicate different attack campaigns executed by multiple threat actors.
Specific APT threat actors often deploy multiple families of malware during a single attack campaign to increase their chances of remaining persistent in the target environment. The actors vary the malware families used at different access points into the same victim organization. This approach is a key persistence strategy. If indicators from one family of malware are detected, the victim may block related communications or begin eradicating the malware from all systems exhibiting those indicators. Diversifying the malware allows the actors continued access to operate even if one or more malware families are detected. The actors can then continue lateral movement to spread to a new set of systems using more families of malware. This persistence tactic is one of the reasons affected organizations may find it difficult to eradicate APT threats.
CTU researchers have observed and are tracking common Internet infrastructure being shared between multiple malware families. These shared network indicators demonstrate that multiple malware families are often used by the same threat actor groups to maintain persistence within a single attack campaign.
The graph in Figure 15 demonstrates the interconnectivity between observed APT malware families based on their use of common domains across multiple malware families. The nodes of the graph represent domains, and the connections between nodes represent relationships based on malware families leveraging the domains. Tightly clustered groupings are singular malware families leveraging many domain names. Linkage between clusters represents infrastructure shared between malware families.
The nodes on the graph in Figure 16 represent domains, and the blue links between nodes represent relationships between domains based on the observed malware family. The dark cluster of nodes near the top of the graph consists of domains used by the Comfoo trojan. The red clusters of nodes toward the bottom of the graph represent domains used by the other nine malware families. The horizontal bar near the center of the graph represents 12 domains that are linked to both the Comfoo trojan and the other nine malware families.
The Comfoo trojan is relatively prolific in terms of its interconnectivity to domain infrastructure used by other malware families. The FoxJmp trojan, in contrast, shares common domain utilization with only two other malware families, denoted by the red nodes in Figure 17. Yet, analysis reveals more than two variations in the clustering of domains because the FoxJmp trojan is actively evolving, and multiple variations were observed in 2012.
The FoxJmp trojan is an example of one malware family used in the persistence stage of an APT attack campaign. It is notable for its prevalence across multiple verticals in each quarter of 2012, and it highlights the evolution of a single APT malware family even on a per-attack campaign basis.
Designed to run persistently, without detection, on a compromised system. The goal of the malware is to help an actor gain and expand a beachhead into a target network using compromised systems.
Used as a platform to retrieve and run additional malicious programs on a compromised system.
Uses C2 techniques where instructions are embedded in files, such as JPEG files, and retrieved via Hypertext Transfer Protocol (HTTP) requests. See Figure 18.
Can be instructed to sleep for arbitrary period of time after receiving an instruction, keeping subsequent retrieval of additional malware "low and slow" in terms of overall observable network security events.
Obfuscates and embeds additional retrieved malware in decoy files retrieved via an HTTP request.
Analysis of FoxJmp variants discovered throughout 2012 revealed an evolution of the malware. Features were changed to add or remove functionality based on the needs of a particular attack campaign. In one observed variant, the persistence mechanism was replaced with a self-destruct capability. Coupled with the addition of an interactive channel to execute arbitrary commands in a shell on the compromised system, this variant's C2 design included a way for the actor to directly interact with the malware in a highly customized manner during a specific APT attack campaign.
In early 2012, CTU researchers released a report titled "The Sin Digoo Affair." This report presented activity related to the Enfal, RegSubDat, and Murcy malware families and their role in a multi-year espionage-by-malware operation affecting governments and industry around the world.
In late February and early March 2012, threat actors circulated emails to members of the International Tibet Network, a global coalition of Tibet-related non-governmental organizations. This targeted phishing campaign exhibited characteristics common in APT operations. The emails were delivered with the subject line "10 March 2012." The message body contained information about the Tibetan National Uprising and 24 Tibetans who self-immolated in protest against the actions of the Chinese government. These emails also included several attachments, including a Microsoft Word document that attempted to exploit CVE-2010-3333 (Microsoft Office RTF stack buffer overflow vulnerability) to install the Comfoo Trojan horse on victim systems.
CTU researchers observed another APT-related malware distribution campaign in March 2012. This campaign used emails to deliver malicious documents such as "Iran's Oil and Nuclear Situation.doc." These documents attempted to leverage a vulnerability in Adobe Flash (CVE-2012-0754) to install the Mswab trojan. Mswab is a backdoor Trojan horse that provides remote access and the ability to steal intellectual property as part of an APT.
The Dell SecureWorks Threat Analysis "Chasing APT," released in July 2012, examines the size of the threat based on CTU research since February 2011. At the time of the report's release, CTU researchers had identified 200 unique malware families. These families are malware samples that share a common code base and only vary based on different C2 servers or in basic functionality. From these families, the CTU research team identified more than 1,100 domain names, with close to 22,000 subdomains used by APT threat actors for malware C2 servers or spearphishing. Figure 19 illustrates a small region of these associations.
Prior to the "Chasing APT" report, many of the hypotheses about the scope of the issue were based on statistical calculations and predictions of threat actors' intent. This report revealed the scope of activity through looking at the historical CTU data, as well as data received through partnerships in the security community and through in-house tracking efforts.
The follow-up report to the "The Sin-Digoo Affair" titled "The Mirage Campaign," published in early September 2012, tracks the same actors behind the Enfal and RegSubDat malware families to the Mirage malware family.
At the end of 2012, CTU researchers began tracking a series targeted threat campaigns that embedded malicious code in legitimate websites. In some cases, zero-day exploits were used avoid detection.
The first of these campaigns was the "VOHO" or Elderwood campaign, which infected websites related to activism, national defense, financial services, and local state government. Analysis by CTU researchers and other security groups revealed up to eight different zero-day exploits for Microsoft Internet Explorer and Adobe Flash Player (CVE-2010-0249, CVE-2011-0609, CVE-2011-0611, CVE-2011-2110, CVE-2012-0779, CVE-2012-1875, CVE-2012-1889, and CVE-2012-1535) used in the attacks. The exploits embedded in these sites were used to drop a variant of the Gh0st remote access trojan onto the compromised systems.
In late December 2012, CTU researchers investigated a "watering hole" campaign that leveraged the Council for Foreign Relations (CFR) website. Watering hole campaigns target sites likely to be visited by individuals of interest to the threat actor. News about the CFR attack was disclosed on December 27. The CFR website was compromised to include a malicious script that exploited an undisclosed Internet Explorer vulnerability (CVE-2012-4792) against returning visitors and installed a backdoor on vulnerable systems. Within two days of the public disclosure, the vulnerability was weaponized with a working exploit released to the public.
The use of "watering hole" attacks has become a new and popular vector for exploiting specific targets in a regimented and organized manner. Based on the frequency of these attacks, CTU researchers are confident that this type of attack will become common in the future.
As mobile networked computing devices become more common, attackers are actively developing and maturing technology and techniques to leverage threat scenarios associated with mobile devices.
In 2012, mobile malware development and deployment primarily focused on the Android mobile platform. The trend toward targeting Android is not likely to change based on public market share data; threat actors have traditionally targeted malware development and use on the most broadly deployed platforms. The raw count of unique Android malware samples is growing exponentially each month.
The Opfake malware family now uses types of polymorphism.
RootSmart contains privilege escalation ("rooting") exploits.
FakeToken malware steals sensitive information under the guise of a single-use authentication generator targeting popular banks.
The rapid evolution of mobile malware is following a similar, though accelerated, progression as that observed in traditional PC-based malware over the past decades.
Malicious actors are beginning to use variations on existing attacks that have historically been successful on traditional computers. Hybrid attacks are emerging that combine traditional computer and mobile threats. While the majority of Android malware is still found in unofficial third-party markets, attackers are increasingly leveraging drive-by downloads, luring victims to malicious sites using in-app advertising links, social networking profile pages, and email campaigns. Similarly, recent malware uses Twitter for C2 communication. Perhaps most concerning is the high percentage of mobile malware families that use rooting (also known as jailbreaking) privilege escalation exploits. These exploits effectively grant more administrative access to malware than granted to a typical user or device management software.
Approximately two-thirds of Android malware observed by CTU researchers has been grafted into existing legitimate applications (also called "repackaging"), and most malware is distributed via alternative marketplaces. After publishing a malicious application to an alternative marketplace, an attacker still faces the problem of convincing people to download the application. People are less likely to download an unpopular or new, unrated application. Social engineering is used to alter application ratings.
For example, the SimpleTemai malware, discovered during the third quarter of 2012, uses social engineering by artificially inflating the popularity of certain applications. Once installed on a victim's device, the malware downloads, rates, and uninstalls applications from alternative marketplaces. Unlike other malware, SimpleTemai does not directly harm the victim by stealing information or cause a financial burden. For people with limited bandwidth plans, this malware may exhaust the monthly data plan allocation, causing a victim to pay for additional increments of bandwidth. If the execution of SimpleTemai is interrupted, for example by turning the device off, then the device may have unexpected and undesirable applications installed. SimpleTemai has been observed on the Internet in Chinese alternative markets and has been repackaged into existing applications.
Some mobile malware families monetize infected devices using Premium SMS, usually by sending a short code via SMS to request premium pay content. On systems that require confirmation (such as in the U.S.) the malware may also intercept the verification SMS and automatically send the proper confirmation message. In a slight variation of this attack, malware known as MMarketPay attempts to purchase mobile applications or videos from a particular marketplace. The market, run by China Mobile, confirms all paid app downloads via SMS message. MMarketPay intercepts this confirmation SMS, and if required will upload a CAPTCHA to a secondary server for analysis. MMarketPay automates the process of downloading paid content from the market, circumventing verification controls.
New system architectures and software distribution models introduce new avenues for attack. A new type of attack observed in 2012 is an application update attack. Android can permit installed applications to automatically update if the updated application requests the same permissions and is cryptographically signed by the same key as the incumbent application. In application update attacks, a user first downloads a malware-free application that was created by an attacker. Later, the original application is automatically updated to one that contains malicious content.
The ubiquity of mobile devices and the regularity with which they move between networks challenge conventional security boundaries. A new threat in the second quarter of 2012, named NotCompatible after one of the C2 domains, acts as a proxy that gives the attacker access to networks accessible by the mobile device. As shown in Figure 20, this Android malware poses as a security update and is downloaded directly from the Internet. Once executed, the malware behaves as a botnet client, initiating contact with C2 servers and executing attacker commands. The connectProxy command permits the attacker to make TCP connections through the device, including connections to any local or restricted hosts accessible by the device.
Telemetry data from the fourth quarter of 2012 shows that at least one NotCompatible campaign is reaching a global victim pool, as shown in Figure 21. This particular NotCompatible network was used to send email spam.
The SpamSoldier malware, discovered in the fourth quarter of 2012, propagates primarily via SMS. In this attack, a victim receives a text message to download a popular game (Figure 22), likely from an unrecognized number. SpamSoldier installs and hides itself, and then automatically installs the game expected by the victim. The malware retrieves lists of messages and target numbers from a remote server and sends the message to each telephone number via SMS. The first indicator of the effects of this malware may be the SMS log as part of the victim's monthly bill.
While Android persists as the primary target for malware, exploits targeting Apple iOS are still being developed and used. These exploits are commonly found on jailbreaking websites and are used by individuals who wish to gain elevated administrative access on an iOS device. Often, a willing user downloads an application-level exploit (such a browser or PDF-based exploit) followed by a root privilege escalation exploit. Determining the security posture of a device after this process may require extensive analysis of the exploits; therefore, the resulting security posture is often unknown. While particular device and version support varies, public exploits are readily available for all iOS phone and tablet devices.
Common financial sector botnet software now has mobile-oriented components. Both Zitmo (Zeus in the mobile) and Spitmo (SpyEye in the mobile) have been used for nearly two years to steal SMS messages used for out-of-band transaction authentication mechanisms. In 2012, malware such as Tatanga and Carberp have embraced mobile devices.
During 2012, these financial sector attacks predominately targeted European countries such as Germany, the Netherlands, Italy, Portugal, and Spain, where banks tend to use SMS for transaction verification. However, Carberp variants have been observed targeting Russian banks. Carberp C2 servers were primarily observed in Poland and Russia.
The mobile space continues to evolve rapidly, both in malware maturity and in security controls. Most malware continues to target the Android platform. Most malware is found in unofficial, third-party markets. Use of marketplaces that do not have published and practiced malware identification and remediation practices result in additional risk.
Applying relevant security updates for mobile device software remains a best practice. Security-conscious users may want to use applications, particularly web browser applications, that differ from built-in applications. Using external applications allows security updates to be applied more frequently than periodic operating system updates. In general, the practice of controlling threat exposure by limiting and updating installed applications is as valid on mobile devices as it is for traditional computing devices.
Defending against a full range of threat scenarios requires a persistent, layered approach to security as a system of process. History and experience suggest even the best security implementations are likely to, at some point, experience attacks, accidents, or failures that violate security policies and trigger incident response processes. Security incidents represent opportunities to learn and improve.
The following observations are based on experiences helping organizations respond to security incidents via the Dell SecureWorks Security Risk Consulting practice.
80% of the Dell SecureWorks incident response engagements in 2012 resulted from activity initiated by external actors. The remaining 20% of engagements resulted from insider threat activity.
The top three targeted verticals were Manufacturing (17%), Financial (16%), and Industry Service Providers (15%).
Figures 23 through 25 highlight primary asset targeting, attack vectors, and affected attributes observed across incident response engagements.
End-user / application targeting — End users and end-user applications continue to be primary targets for threat actors behind both commodity and APT attacks. Social engineering and reconnaissance of targeted organizations is prevalent and advancing, making phishing and spearphishing campaigns more convincing.
Data exfiltration — External-facing web and application servers still provide significant risk to organizations. They pose the most risk to legal exposure with the possible compromise of Personal Identification Information (PII) and Payment Card Industry (PCI) data.
Architecture — Many organizations still struggle with legacy IT architectures that are poorly designed for defense, have poor segmentation of critical systems, and use very little (if any) data classification that offers additional layers of protection for critical intellectual property. Administrator privileges are often not properly managed or controlled, which allows threat actors to easily attain administrator or domain administrator access.
Insider threat — Organizations take very little or no proactive measures to monitor insider threat activity or to reduce the risk of insider activity. Nearly all of the incident response engagements that involved an insider threat were investigations where a terminated employee was suspected to have used elevated privileges to sabotage the network or to remove intellectual property. In only one case did an organization discover the activity through a data loss prevention (DLP) solution. As security policy is formulated and becomes practice, there is a continued disconnect between IT / IT Security departments and Human Resources (HR) departments in many organizations. Managers who supervise employees with privileged access should consider restricting that access when poor performance or employee misconduct is observed. The basic practice of terminating access, especially privileged access, before an employee leaves an organization would have mitigated most of the insider threat incidents.
Organizations can adopt key practices to improve their ability to defend, detect, and respond. The recommendations are grouped into three broad categories based on perceived difficulty of implementation: low complexity, medium complexity, and high complexity. While this is not a comprehensive list of security measures and controls, these actions would have significantly minimized the incidents observed by the Dell SecureWorks Security Risk Consulting team in 2012.
Implement a strict policy on elevated privileges based on risk. Ensure users with elevated privileges only log in as an administrator when doing administrator-level tasks. Limit and properly train users with domain-level administrator access, and ensure they execute their duties in a secure, monitored, and audited manner.
Conduct aggressive user training and certification to raise the level of awareness about threat actors targeting the organization. Tie user access and privileges to performance and compliance with training programs. For example, restrict Internet access for non-compliant users.
Limit DNS traffic in the network configuration to guard against both inbound and outbound DNS UDP traffic, minimizing the risks of a DDoS attack.
Ensure critical network infrastructure elements (e.g., DNS, domain controllers, routers) are on non-routable IP space and are configured to reduce arbitrary discovery by authorized parties (i.e., do not respond to simple network scans).
Work with business owners to properly classify data in risk categories (i.e., high, medium, and low).
Ensure only application servers and data storage that must be accessed from outside of the networks are connected to the Internet. Ideally, place servers that require these connections in a DMZ (perimeter network).
Coordinate communication between the HR and IT Security staff to share advance notice of pending termination of employment. Managers of employees with elevated privileges should be cognizant of the risk their employees pose to the enterprise and take appropriate actions to restrict access when warranted by employee poor performance or misconduct.
Establish an incident response plan that is compliant with the organization's recognized standards (e.g., PCI/PFI, NIST, HIPAA). Routinely rehearse the plan to validate procedures and the team's proficiency.
Route all web traffic through proxy servers located in a DMZ.
Implement two-factor authentication, especially for remote access through a virtual private network (VPN).
Implement an alternate token for administrator access.
Ensure desktop environments are configured to an enterprise-wide security standard, risk is reduced through a secure configuration, and patching of OS and application software is timely.
Tier and map access controls to the data classification program so users only have access to data they need to do their jobs. Determine data access as part of the HR onboarding process.
Ensure IT and security staff are involved in merger and acquisition processes, and develop a plan for integrating the newly acquired IT infrastructure into the parent organization security plan.
Aggressively patch and conduct vulnerability scans of external-facing data and application servers, prioritizing servers with critical data such as PCI and PII.
Strip high-risk email attachments (e.g., EXE, RAR, SCR) from all inbound mail.
Implement a security checklist for the software development lifecycle (SDLC) internal to the organization. Ensure application development considers security and the risk accepted during the SDLC is transparent so security staff can reduce the residual risk.
Ensure IT architecture is designed with security in mind. Establish aggregation points where firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and deep package inspection (DPI) are in line and able to filter and inspect all inbound and outbound traffic.
Consider subscribing to signatures and indicators provided by a Managed Security Service Provider (MSSP) to ensure network defense appliances (e.g., firewalls, IPS, IDS) are tuned with threat indicators gathered through activity observed across a multitude of networks.
Consider implementing enhanced, in-line filtering of email and web traffic where executable code is discovered with both signature-based indicators and in-line sandbox discovery. Ensure SSL traffic is decrypted at the boundary and inspected for threat activity.
Optimize event logging to ensure capture of all relevant security events that could be elevated to security incidents. Conduct some type of analytics on these event logs based on a reputable set of threat indicators to look for threat activity that may be avoiding signature-based defense appliances.
Subscribe to a DDoS protection provider if critical business operations rely on connectivity with customers from the Internet. Rehearse and stress test DDoS recovery plans and ensure they can be implemented in close coordination between the IT and security staff.
Implement a DLP solution that is integrated with a digital rights management (DRM) solution to detect activity and prevent improper sharing of critical intellectual property.
Where required for scale, implement an electronic governance, risk management, and compliance system (eGRC) to monitor security controls and compliance to policy and procedures.
Conduct regular penetration testing and red-teaming of security controls by an outside party to assess effectiveness.
Conduct brand and executive intelligence surveillance of the organization to help identify threat actors, quantify their risk to the organization, and assess vulnerabilities to these threat actors' capabilities. | 2019-04-18T12:29:07Z | https://www.secureworks.com/research/2012-threat-review |
Day 2: For the second day of the 12 days of Christmas cookies, I’m bringing you the very epitome of a tried and true family favorite recipe – Galettes! My grandmother has been making these cookies year after year for as long as I can remember (along with these Classic Italian Pizzelles!). It doesn’t feel like Christmas until we make these cookies!
As you can see below, you need a galette iron to make these. You make the cookies 2 at a time, which can be quite time consuming, but we always set up a table in the living room, put in a movie, and make an evening out of it.
If you are lucky enough to have a galette iron lying around your house, I would definitely recommend these cookies. And if you don’t have one but want one, they are available on Amazon!
For a dessert that has reached legendary status in Mike’s family, check out this classic Blueberry Pudding Dessert from his grandma!
Cream butter and sugar. Add egg yolks and mix. Add vanilla and mix. Add dry ingredients.
Beat egg whites in separate bowl until stiff. Fold gently into batter and refrigerate for 2 hours or overnight.
Drop by spoonfuls (2 at a time) onto galette maker. Close lid and let cook for approximately 1 minute.
Remove cookies to wire rack and repeat.
These look so good. I have never had them before!
Thanks for your comment on my blog. These cookies look great! These are a kind of cookie I have never tried before, I am eager to give them a go. Have a great day!
Oh I had the them and they were delicious! Any topping in the world goes with these and they are perfect plain too.
wow! I have never seen anyone else make these besides my former MIL. She called them "gullets" (maybe the WV accent had something to do with the different name?) She always made them on a regular waffle iron, making them about 2" rounds. I liked them as soon as they came off the iron, everyone else liked them the next day.
We never have those plain. We make little sandwiches with chocolate filling. I didn't know they're so popular worldwide.
My mom bought a waffle iron not too long ago and has been trying to find an old family waffle recipe that seems to have fallen off the face of the planet.
So I showed her this one, she can't wait to try them and see if they are just like her aunt used to make. I can't wait either because those were apparently some pretty darn good waffles.
Thanks for the recipe can't wait to get home from university to make them!
defythewind – adding a chocolate filling to these sounds amazing!
My family makes them every year at Christmas. We always look forward to gettig a big bag of grandma's Galettes! They are perfect tea or coffee time snacks as well.
I actually have an iron that you use on the stove that makes them one at a time!!! Talk about time consuming!!! I'm looking forward to buying the electric waffle iron. My question for you is, how does this iron differ from a pizzelle iron? or does it?
Brenda – Thanks so much for your comment! I love finding other people who know about these cookies 🙂 And I can't imagine making 1 at a time – 2 at a time is time consuming enough!
To answer your question, this iron is different than a pizzelle iron. The pizzelle iron makes thin, crispy cookies, and this iron must be deeper because it makes thicker soft cookies. I hope it works out well for you!
I love these cookies. My family makes them as well. Our recipe is slightly different – we use brown sugar along with the regular sugar. Here is our recipe: http://cucina.grandinetti.org/recipes/desserts/cookies/gallettes. Looking forward to trying your recipe.
Here’s another Cheryl ringing in about gullets (or gallettes – oh so many spellings! and the spelling got so Americanized after our grandmothers came to the US). I just made my first “batch” of the season – actually they are for a friend’s daughter’s wedding cookie table, not for the holidays. I wrote a little memoire about my family’s history of making these cookies and about what it means to have the memories of making them with my aunt and mom. If you are still interested in this post, I can send the story to you – you might enjoy reading it – it’s about passing the iron on down the generations.
I have been looking for this recipe! I can’t wait to try yours. One of my very favorite cookies!
I remember these cookies that my grandmother used to make and when I saw the picture of them it even brought back fonder memories….. how I miss them…. hopefully I can make some this Christmas… Thanks so very much for more information on them… although I have my mothers recipe (from my grandmother) I didn’t realize that you refrigerated them before cooking them… I do remember that I tried to use margarine instead of real butter and it just didn’t work at all…..
My grandparents came from Belgium in the early 1900’s and my mother was born here in the USA. When my grandmother came here she also brought with her galette irons from her home country. There were about 4 cast iron ones that went to my 3 aunts and mother. Today my brother has 2 and I have 2. We also found one made of aluminum at a store in Uniontown, PA and my aunts bought me one of those and it works great. I also found some on line about 18 years ago and have not been able to locate any since. My family has made these for years at Christmas and of course family weddings and its something I look forward to every year. My mother is now gone and so are my aunts but my family carries on the tradition. Our receipe is someone different than this as it may be due to the different parts of Belgium where people came from.
Growing up in the 50’s / 60’s in SW Pa, I remember helping make these in irons on a gas stove at Christmas and for family weddings. Recently cleaned out my 89 year old mothers home (she moved to a PC), found the irons and reminissed. I plan on making them soon to your recipe that seems similar or mom’s if I can find it.
I’m so glad I ran across your blog post. I can’t find my grandmother’s recipe and I was looking for a similar one. Your’s seems to be almost identical to what I remember. I also make these on a regular waffle iron but my grandmother made them w/ the iron in the fireplace. They bring back such good memories.
These are also a family tradition that my great grandmother made. She learned from her Belgian grandmother and mother. I only attempted them a year or two ago and only have my electric waffle iron to make them in but they still turned out a lot like I remember them. Our family recipe is very simple and has brown sugar instead of white, and whole eggs instead of separated. There is no leavening agent and they call for cinnamon to taste instead of vanilla. My uncle has my great grandmother’s iron that the family must have brought with them. Maybe someday I will get to try them on that! So glad to find others who know of these special cookies; before the internet, I never knew anyone else who made them. Anyway, I am leaving this comment since others who have Belgian heritage seem to be interested in the Galettes. My other passion is genealogy; if you are of Belgian heritage and have the name Lechien in your family or if your Belgian glass worker immigrant ancestors moved to Anderson, Indiana, please message me! I’d love to hear from you. [email protected] Joyeux Noel!
Thanks so much for this comment – I love hearing about everyone’s family traditions with this recipe!
Megan, I have searched for Waffle Cookies before and never found anything, so imagine my surprise when your site pops up picturing my cookies! The recipe is little different, and the waffle iron I use is cast iron and used on the stove top. It came from my Italian grandmother – at one time there was a ring that fit around the burner and you could flip the iron on that. Alas, it was lost many years ago, so I have to pick it up and turn it over cooking the cookie one side at a time. I get a workout as well as a treat! And here I thought I was the only one making them.
How fun that you found my post on these wonderful cookies! I just leave reading all the memories from other people who make them. Like you, I thought we were the only ones who ever still made them. 🙂 Now the question is, my Italian grandmother had a similar recipe, your Italian grandmother had this recipe – but it’s not Italian, is it??
Where can I find the iron you use to make these cookies. My family has made them for years and years but the iron we use is hand held and must be baked over a gas flame. The square holes on them are smaller then the tradional waffle iron. I would live to purchase an electric one. Please let me know! Thank you!!
I have these every year. This was also a Christmas tradition in my house as well. We would be up all late cooking them on the stove, since ours was the iron one. I hated these cookies as a kid by now have grown to love them and it is not the holidays if you do not have cookies.
Im Hungarian and my grandmother used to make these with an on the stove top cookie iron…..I wojld like to know where I can purchase one….
My grandfather, Ferdinand Ducouer, was from Belgium and came to America in 1917 with this recipe in tow. As children, whenever we would visit my grandparents they would have these cookies waiting for us. They are the best! Thank you for sharing the recipe with the world.
I love comments like this – thanks so much for sharing!
It is interesting that so many of us who grew up with these wonderful treats are from SW PA or WV. We made them one at a time on the stove at Christmas in my grandmother’s kitchen. We used brown sugar and vanilla and also put them in the refrigerator before making them. We rolled them into “bullets” before making them.
I love comments like this! How fun that these cookies have so many memories for so many different people. My grandmother was Italian as well, and settled in Southwestern PA, near Pittsburgh. I grew up eating these, but have never seen anyone else make them. Thanks for commenting – I hope your dad loves them!
We would call these thicker ones “wooflette” and thinner ones galettes. The thinner ones are a stiffer dough and you roll it before pressing. Both pekoe citric galette irons and wooflette iron are available now from a company based out of West Newton PA. I also have old stove top ones. My great grandmother came from Charleroi Belguim to Charleroi Pennsylvania. My sister, cousin and aunt make these each year. I just eat there’s. Haven’t made them in years since my sister took over!
How fun! I love reading everyone’s memories of these cookies. Thanks for commenting!
My family has always enjoyed galettes during the holiday season. My grandfather worked for many years in north-central West Virginia as a pastry chef and candy maker. There is a large Italian immigrant community in the area, though my family is of British and Welsh heritage. My grandfather adopted and adapted the best of the local culinary traditions. My sister and I made these cookies this year, using my Palmer iron. She has the heirloom iron plates that sit atop stove burners, but those are seriously labor-intensive!
My family also looks forward to these every year for Christmas! Since they are difficult to stir and are so time consuming my grandmother only makes them for our large family once a year! My grandmother remembers her father (who was full Belgian) doing one at a time over the fire. I’m so excited and amazed at how many others enjoy this! Neat family history!!!
My mother, my aunt, and my neighbor made these every year. They eached modified their receipe to make it their own and would try them out on us to see who made the best. The best was always the one I was currently eating. They all have passed but before they did, they “secretly” gave me their receipes and their irons. I now make them for my family. I like to think that they are here with us during the holidays. 69 year old tradition.
I found your blog because my Italian grandmother made them and I’ve always wondered why we called them French Cookies and if they are an Italian recipe. I found another recipe online from Southeast Kansas where my grandma grew up which is also known for its large Italian population. Our family made the first batch since my grandma’s death four years ago and they are already gone. We plan to make more around Christmas when we are back together again. We also make a cookie called turdellis which is a wine dough rolled on a washboard, fried, and dipped in honey, and sprinkled with sugar but I’ve never met anyone else who has ever had them.
I always wondered why my Italian grandmother made “French” waffle cookies too! 🙂 Thanks for your comment, I love reading everyone’s memories with these cookies.
A dear, sweet friend, who came from France as a baby 100 years or so ago, would make these on a non-electric iron over her fire! Such patience! And then she shared them with our family and others! She is long gone now, but I could never forget opening that Christmas tin each year and smelling the aroma of butter inside! I make pizzelles regularly, and these are not the same at all. I am delighted to find this recipe and will try them on my regular waffle iron and share them in her memory. Thank you for this recipe!
Couldn’t find my recipe this morning, but this one is close — without the baking powder. Mine are therefore thinner and crisp after cooling. My recipe is probably over 100 years old, starts with 2 lb butter, 12 eggs, etc. Thanks for relieving my anxiety I can now celebrate Christmas.
My father is of Belgian descent and these are a family tradition. I am enjoying one as I type this. My great aunt made the “full recipe” (2 lbs butter, 12 eggs, etc.). Wonder how big the mixing bowl was… LOL! Some in family like these soft and doughy while other prefer the rock-hard, break-a-tooth type. We also make pizzelles… and protect them with our lives as they are very delicate and any slight movement of the storage container will result in pizzelle crumbs.
BTW, I am from northern WV near the southwestern PA border.
We have made these cookies for Christmas my entire life, but I would like to know the tradition behind it… there was something floating around about neighbors went door to door with these cookies to dip in wine and toast to the new year. I have not been able to confirm this however. Any help in finding the origin and tradition surrounding this cookie would be greatly appreciated.
So my family spells it “gauflette”. No baking powder and slways done on a regular waffle iron. At least in my memory. The recipe I have is from my father’s french grandmother who immigrated to West Virginia. And here I thought it was a secret family recipe!
I’ve loved reading the comments and the original post. My grandfather’s family is also from the Charleroi area of Belgium and came to Western PA (California, PA). I inherited his long handled irons and recipe (like Anissa’s, it was a full recipe — I ended up having to use a spaghetti pot as my mixing bowl the only time I made a full batch!). If you are looking for electronic irons to make galettes, you can find them from C. Palmer in West Newton PA (http://www.cpalmermfg.com/) You’ll find them under Belgian Cookie Irons. I’ve had mine for several years and it comes out every Christmas to make these cookies. I’ve never refrigerated my dough before, but will try that this year.
I love these cookies. My great grandmother from Belgium use to make these for New Years. Then my nanny made them for New Years however, no one has the recipe. I remember my nanny use to put whisky in hers, does anyone do this?
BTW, love the story sharing and I’m from PA.
My family has always gotten our electric ones at a manufacturer in western Pennsylvania. Unfortunately I can’t remember the name of the company (sorry). My grandmother in Pennsylvania always made them and my mom and I have carried on the tradition. The photos of the cookies and the iron look just like ours! My mom has two irons and has them both going at the same time–makes for much faster cookie making! I thought we were the only ones who made these!! How fun to discover all you fellow galette makers with a history like mine!
I also live in W. PA. I remember eating these as a kid when I went to Italian affairs with my Aunt Lena. About 30 yrs. ago, my Italian landlady made these for her daughter’s graduation party and it brought back many memories of the fun parties with good food, music, and dancing with my aunt.
I have since gotten the recipe from my brother’s girlfriend, who is Italian.
I’ve been married for 56 years I had my mother pizzella iron that one side was a pipizzella two maker and you remove the double plate turn it over and it was a wFgle iron iim scilian ,I call them wafflets using my pizzella recipe but adding several tablespoons of baking powder and 1/2 teaspoon salt whivh is not in my pizzella recipe.then I make chocolate, anise ,vanilla almond my recipe makes several dozen .I do put the soft dough in icebox overnight .
I’ve been married for 56 years I had my mother pizzella iron that one side was a pizella iron and you remove the double plate turn it over and it was a waffle iron. Iim scilian ,I call them waffeletts using my pizzella recipe but adding several tablespoons of baking powder and 1/2 teaspoon salt which is not used in my pizzella recipe.then I make chocolate, anise ,vanilla almond we sometimes use powder sugar or dip one end in chocolate icing but I like them plain,light brown and soft .my recipe makes several dozen .I do put the soft dough in icebox overnight .
My family loves Galettes so much that I make them all year long. I have my great great Grandma’s recipe, she was from France. We grew up eating Galettes all the time. Our elderly neighbor made them one at a time on her Galette iron, holding it over the flame of her gas stove. We lived in North Central WV, Clarksburg. I just made dozens for my sister’s wedding. Can’t imagine life without them!
My Mom made these at Christmas time. Where could someone purchase a Gallete iron? Do Belgian Waffle Makers make these same cookies or do you need a Gallete iron?
So great to see other people have made these cookiess! I thought my family was the only one. I grew up eating them. My mother made them every Christmas one at a time using an iron over the stove. We called them French cookies. Our family looked forward to them. It wasn’t Christmas without them. My great-grandmother who came from Belgium made them, as well as my grandmother and mother. My aunt still makes them occasionally. We’re from NW Ohio. I miss seeing my mother at the stove making them and eating them warm. Such a special memory. Thanks for posting this recipe. I’m going to try it this year. I have my mother’s recipe card, but she left out some details, so your recipe will help. Merry Christmas!
My French grandmother made these and passed the recipe on to my mom. We have them every Christmas. Now that my mother has passed away I will carry on the tradition.
Only thing is our recipe is a little different that we add brown sugar and a shot of whiskey.
Tip- use a cookie baller to get uniform sizes!
These have been a family Christmas tradition in my family forever. However what we call gallettes are much thinner and generally slightly crispier. The cookies you have pictured here we have always called goflettes. I have Irons for each, made from a molds that my grandfather kept. Gallette and goflette making day is always a fun one in my house.
This site is so much fun; my family is from W.Va and we made the galettes too; I have mother’s iron which is a heavy aluminum that goes on a burner and you make one at a time. I have an iron also that is a newer model but is used the same way. A Belgian waffle iron might not work quite the same way but I have wondered about that or an electric maker as well. This year I will use what I have and am looking forward to the treat. We only make them at Christmas. Have a good holiday!!! Thanks for all the sharing.
Hi All! I’ve just turned 70! My great-grandmother was from Liege, Belgium. She made two types of cookies/pastries. The first that us kids loved we called Galettes. These are the the thin, crisp wafers cookies. The other, softer pastry we called a Gaufrette. These very closely resemble the Liege Waffle that is sold on the streets in Liege. The Gaufrette was what the Belgian ladies would eat with coffee as they sat around the table telling dirty stories in French. My great-grandmother and my great-aunt used slightly different recipies none of which have been passed down to me so I use the trial and error method of picking up recipies off the internet. So every year my galettes are a little different. I am fortunate to have both style cast iron waffle irons. Neither my grand-mother or great-aunt used the Pearl Sugar in the Liege recipe but this could possibly be because it was not available in the US. We traditionally make Galettes at Christmas time because they are so labor intensive. The Gaufrettes are made as a special treat when I can find Pearl Sugar and when the mood hits.
Another WV gal here whose grandfather was born in Charleroi, Belgium but who settled in the South Charleston, WV area as glass makers. My mother still has one of my grandfather’s irons and we make these cookies every Christmas. I have always been told they are a New Year’s cookie. I just ordered an electric Croquade waffle iron from Belgium that has a special plate for gaulettes available – found it on Amazon. It’s supposed to come tomorrow – can’t wait to try it! Happy New Year’s everyone!
I’m in the process of making them now….My mom was from Belgium and always made them for the new year….Now it’s my tradition….I still use her old gaufrettes iron, so it feels like she’s helping me along.
These are my favorite Christmas Cookies, my mother and godmother made them every year. They used a Belgi cast-iron waffle maker to make these cookies. One would hold the iron over the open gas flame on the stove while the other dropped the batter. Brings back so many memories. My mother passed away back in 2011 and my godmother is not in good health.
My great grandmother is from France and she made these all the time, now they have been passed down in the family. Amazing cookie!
We make them too!! Have cast iron waffle irons brought over from Belgium.
My husband likes the more dense firm cookie. What is the recipe for that type, what is the difference in the recipes for the soft and the dense firm cookies ?
I live in Florida now, but originally from Washington, PA.
I have both electric pizelle and galette irons. I have made pizzelles, but not the galettes yet because I wasn’t sure of the recipe.
Years later I found your post…and am hoping you are still reading comments. I’ve been making these galettes for years, a family tradition. I have an original iron, very heavy used over an open flame. I tried some of the Palmers electric irons and they just didn’t do the trick as they were not deep enough. Now I see they have a non stick iron! I may try to sell the others and buy this one. Please let me know your family origins and history!
Hello, I’m so glad you found this post! I love hearing everyone’s memories of these cookies. I have only ever used my grandmother’s galette iron, so I’m not sure about the non-stick one. My grandmother’s family was Italian, but lived in Western PA. These seem to be common in that area!
When I got married 51 years ago, my husband’s grandmother, who was French, made these. My love for the “French Cookies” lasted much longer than my marriage. My ex’s mother and grandmother are both gone now. I want to get the iron and make some for my son for Christmas. I know it’s been a long time since he’s had any.
We call them French Cakes. My mom started making these soon as she could cook. My grandparents had an older neighbor that gave Grandma the recipe when she first married back in the late ’30’s. We loved them as children, & my daughter loves making them with me now. We just use traditional (none Belgium) waffle maker. I only have one other person I know, outside of my family, who grew up with these cookies.
I too am from western pa. My mom made these every year. It was her mother’s recipe. We called them Belgian waffles. I’ve seen the electric irons in specialty Italian stores in Pittsburgh. I bought my from Palmer manufacturing years ago. They also made pizzelle irons.
Our recipe is 1 lb butter, 1 box light brown sugar, 1 c sugar, 1 tsp cinnamon, 1 tsp nutmeg, pinch of salt, 1 oz vanilla, 1 oz whiskey, 6 eggs and 5.5 cups of flour. I just finished making them to take to work. They are always a hit.
Yes, I believe we have the Palmer irons for these and for pizzelles. Love these cookies!
Excited to find this. I too am from western Pa. – my Italian mother made these for years, some with maple syrup for a maple flavoring- her own variation-which were delicious. I found her recipe for “Belgen wolf” which made me laugh and cry at the same time. I used a friends recipe but they did not come out soft like my moms did. They are very good, but a little crisper. Does your recipe produce a softer cookie??
Cheryl, I was also handed down the Belgium waffle iron that my Mother always used. I can close my eyes and listen to the click & clack of her flipping over the iron on our gas stove. I have 5 granddaughters so not sure which one of them will carry on the tradition. I use almond extract exclusively , otherwise , my recipe is close to the one on this page.
I make them with an electric galette iron. You don’t really need to separate the eggs either.
Good to know, I’ve never tried it without separating the eggs.
I can’t tell you how wonderful it is to see so many people from southwestern PA (my family came from Point Marion) who still make these! I grew up with my grandmother making them for us one at a time over an open flame. Yes, as someone said above, it’s time consuming…but after trying an electric maker of my own, there really is a difference in how they turn out. The electric version seems to be much drier, and we like ours to be dense but moister (not wet of course).
Our recipe also calls for 4 Roses Whiskey, so for a few years after the distillery left Baltimore and the flavor changed, he refused to eat the galettes because the difference upset him so much. He claimed his aunt learned from the Belgian glass blowers how to make them (in our family they’re also knows as New Year’s Cakes) and that hers were the best. I’ve had the galettes from her daughters and the consistency is much more crispy, and more like a pizzelle!
Anyway, I made them again myself this year after a hiatus and they were much drier (despite the cast iron, one-at-a-time method). So I might be getting ready to update the family recipe!
I’ve truly loved reading these comments about “galettes.” Our family legend is that my great-grandmother, who was born in Belgium, emigrated to Point Marion, PA, in the late 1800’s. She brought her galette recipe with her and my family loved eating these treats at Christmas every year. My grandmother inherited her galette irons and the recipe, but when she passed away 20 years ago, nobody could find the irons. I’ve tried a couple of different irons, but the consistency was not the same as those soft, rather dense, delicious treats she made with her hand-held irons that she heated on a stove top. I’m going to order the suggested iron from Amazon and try again! My brother and I used to fight over the last few galettes that were in the package our grandmother brought us…such wonderful memories!
These are one of the Christmas cookies of my childhood. My neighbor would make them, then finally shared the recipe with my mom. My mom would make the batter then my dad would use the galette iron on the stove making one delicious cookie after another. My neighbor’s recipe, handed down from her French mother-in-law, used brown sugar rather than white. The galette iron was borrowed around the neighborhood as we all made these wonderful cookies.
Started in 1955. Have made over 200 dozen a year.Got iron and receipe from an old Belguim who was a part of the window glass industry in Vincennes,Indiana..Don’t like the electric irons.Use an aluminum hand iron on top of stove.Does any one know where you can purchase the old irons made from aluminum?
Unfortunately I’m not sure, but I hope someone stops by who can help you out!
My mother’s family has made these for decades. I was beginning to think they were unique to our family though. Mom always called them gaufrettes. When I looked that up on Google, the cookies were all wafer thin. Your recipe is similar to my the one my family uses, but we add a half teaspoon of almond extract as well.
My aunt found a metalworker who was willing to cast several new irons from the original she had. They were given as gifts to her children and nieces to continue the tradition. Though the original iron was cast iron, the replicas were made with aluminum. They seem to do the job just fine though. I believe whoever made the replicas was in Muncie. I hope this helps.
We’ve been making these as long as I’ve been alive which is over 50 years. We have an old family recipe and seems to look similar in the end result but best if in the process you refrigerate overnight. 2 hours just dont cut it. I was taught to roll them into little logs about the circumference of a nickel and the length of 3 inches. They flatten out just right in the iron. Yes, you have to use a waffle iron not a waffle maker. There is a difference in the size of the waffle pattern and effects how they cook.
You also refer to them as a French cookie when I was taught they were a Belgian Waffle Cookie which in semantics the Gullet Cookie or Gulfret is really a French Belgian cookie.
Anyways, many in my family have tried to make them but my mother is the only one who gets them right every year.
Hi Megan, I stumbled across this site back in 1972 but forgot to bookmark it. I commented back then about my iron coming from my Italian grandmother, but didn’t mention the family was from Pennsylvania as well, east of Pittsburgh in the town of Jeanette. Our recipe is called a French Waffle Cookie. I’ve enjoyed reading all the family stories from the past few years and find it so interesting that a French Waffle cookie was made by so many Italian grandmas using a Belgium cookie iron!
Refrigerating the dough isn’t part of my recipe and was wondering how the cookie differs when the dough is refrigerated.
How long can store them ? And how to store them !
My family also came from Charleroi. I have the cast galette iron they brought with them. I add frangelico to the recipe. yum!
I’m looking forward to making these. My husband’s French-Italian grandmother made batches for these for all the grandkids at Christmas. She called them “goffs,” so I have never, ever been able to find any recipe for them. But seeing that some families here call them “gauflettes” means that she may have shortened the name. She made them on a regular waffle iron and I think had some almond extract in them as one other commenter mentioned. Now that I have a waffle iron for the first time in my life, I’ll try these over Christmas. Thanks for publishing this, and for all the lovely people who have commented about their family recipes and names. I feel sure these are the “goffs” I’ve been looking for.
I’ve always kept them in tupperware or a cookie tin. Storing them for any length of time has never been an issue, but probably a week.
I’m blissfully happy that I’ve stumbled onto your blog!! My paternal grandfather always made what we called “goflats”. Never could find an iron of my own since the spelling was so off. My uncle has the iron and sends all the family cookies at Christmas.
Never knew about refrigerating before cooking. Now I need to get my hands on the old cast stovetop iron!
Yum, the cinnamon sounds like a good addition!
I love how these cookies go by so many similar names! And the cinnamon sounds like a good addition!
Hi Megan. Thank you for this delicious recipe. Where can I find the iron maker? I used a waffle maker and they were awful. Thank you and have a blessed New Year.
I grew up eating these at Christmas. I love them. I made them at Christmas and took to work. No one there had ever had them or heard of them. But they loved them.
My family had enjoyed these cookies since before my mother was born. We call them French Cakes. We had 2 waffle irons that have been handed down through many generations. We hunted for them in my mother’s things after the movef to addisted living and they were not in her house. Im currently looking for one to buy because my daughter eants to carry on this tradition. Like I’ve seen in many comments, Christmas morning didn’t get under way until everyone had their French Cakes. | 2019-04-25T10:31:38Z | http://www.whatmegansmaking.com/2009/12/galettes-french-waffles.html |
The Mahnomen, MN area has had 3 reports of on-the-ground hail by trained spotters, and has been under severe weather warnings 50 times during the past 12 months. Doppler radar has detected hail at or near Mahnomen, MN on 45 occasions, including 9 occasions during the past year.
9/15/2018 1:44 AM CDT At 144 am cdt, severe thunderstorms were located along a line extending from 7 miles northeast of canyon, to pike lake near duluth, to near fond du lac reservation, moving east at 30 mph (radar indicated). Hazards include 70 mph wind gusts and nickel size hail. Expect considerable tree damage. Damage is likely to mobile homes, roofs, and outbuildings.
9/15/2018 1:31 AM CDT At 131 am cdt, severe thunderstorms were located along a line extending from near cotton, to near canyon, to near brookston, moving east at 40 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. Locations impacted include, cloquet, hermantown, scanlon, carlton, cotton, brookston, boulder lake, saginaw, fond du lac reservation, island lake, pike lake near duluth, canyon, city of rice lake, grand lake, fredenberg, mahnomen, alborn, culver, fish lake, and shaw.
9/15/2018 1:18 AM CDT At 118 am cdt, severe thunderstorms were located along a line extending from near cotton, to near canyon, to 8 miles southeast of floodwood, moving east at 40 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. Locations impacted include, cloquet, hermantown, scanlon, carlton, cotton, brookston, boulder lake, saginaw, fond du lac reservation, island lake, pike lake near duluth, canyon, city of rice lake, grand lake, fredenberg, mahnomen, alborn, culver, kelsey, and gowan.
9/15/2018 1:01 AM CDT At 101 am cdt, severe thunderstorms were located along a line extending from near toivola, to near meadowlands, to 6 miles south of floodwood, moving east at 40 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. Wind damage is also likely to mobile homes, roofs, and outbuildings.
9/14/2018 9:28 PM CDT At 928 pm cdt, a severe thunderstorm was located over twin valley, or 36 miles northeast of fargo, moving east at 30 mph (radar indicated). Hazards include quarter size hail. Damage to vehicles is expected. this severe storm will be near, twin valley and syre around 930 pm cdt. gary around 935 pm cdt. faith and waukon around 950 pm cdt. Mahnomen and bejou around 1000 pm cdt.
9/14/2018 9:11 PM CDT The national weather service in grand forks has issued a * severe thunderstorm warning for. southeastern norman county in northwestern minnesota. western mahnomen county in northwestern minnesota. until 1000 pm cdt. At 910 pm cdt, a severe thunderstorm was located near ada, or 30.
9/14/2018 8:43 PM CDT At 842 pm cdt, a severe thunderstorm was located near waubun, or 28 miles north of detroit lakes, moving east at 40 mph (radar indicated). Hazards include quarter size hail. Damage to vehicles is expected. this severe thunderstorm will be near, beaulieu around 855 pm cdt. naytahwaush, mahkonce and tulaby lake around 905 pm cdt. roy lake around 910 pm cdt. rice lake around 915 pm cdt. Lower rice lake and long lost lake around 920 pm cdt.
9/12/2018 1:05 PM CDT At 105 pm cdt, a severe thunderstorm was located near bejou, or 41 miles north of detroit lakes, moving northeast at 55 mph (radar indicated). Hazards include quarter size hail. Damage to vehicles is expected. this severe storm will be near, winger around 115 pm cdt. lengby, fosston and island lake in mahnomen county around 125 pm cdt. Ebro around 130 pm cdt.
9/12/2018 12:45 PM CDT At 1245 pm cdt, a severe thunderstorm was located near twin valley, or 33 miles northeast of fargo, moving northeast at 55 mph (radar indicated). Hazards include half dollar size hail. Damage to vehicles is expected. this severe thunderstorm will be near, twin valley around 1250 pm cdt. gary around 1255 pm cdt. waukon and faith around 100 pm cdt. ranum and mahnomen around 105 pm cdt. Bejou around 110 pm cdt.
8/31/2018 10:07 PM CDT The severe thunderstorm warning for southern st. louis and north central carlton counties will expire at 1015 pm cdt, the storm which prompted the warning has moved out of the area. therefore, the warning will be allowed to expire. however some hail is still possible with this thunderstorm. a severe thunderstorm watch remains in effect until midnight cdt for northeastern minnesota. remember, a severe thunderstorm warning still remains in effect for northeast carlton and southeast st. louis counties.
8/31/2018 9:57 PM CDT At 957 pm cdt, a severe thunderstorm was located near saginaw, or 7 miles north of cloquet, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. Locations impacted include, cloquet, brookston, fond du lac reservation, and mahnomen.
8/31/2018 9:51 PM CDT At 951 pm cdt, a severe thunderstorm was located over fond du lac reservation, or 7 miles northwest of cloquet, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. Locations impacted include, cloquet, brookston, fond du lac reservation, and mahnomen.
8/31/2018 9:41 PM CDT The national weather service in duluth mn has issued a * severe thunderstorm warning for. south central st. louis county in northeastern minnesota. north central carlton county in northeastern minnesota. Until 1015 pm cdt * at 940 pm cdt, a severe thunderstorm was located 7 miles northeast.
8/31/2018 8:13 PM CDT At 812 pm cdt, severe thunderstorms were located along a line extending from 6 miles north of cotton, to near canyon, to near scanlon, moving east at 55 mph. these storms have weakened in the past 15 minutes, but still remain capable of producing widespread damaging winds (radar indicated). Hazards include 70 mph wind gusts and penny size hail. Expect considerable tree damage. damage is likely to mobile homes, roofs, and outbuildings. Locations impacted include, duluth, superior, cloquet, hermantown, two harbors, proctor, scanlon, carlton, cotton, thomson, brookston, fairbanks, wolf lake, boulder lake, brimson, pike lake near duluth, city of rice lake, thomas lake near brimson, whiteface reservoir, and canyon.
8/31/2018 8:02 PM CDT At 802 pm cdt, dangerous severe thunderstorms were located along a line extending from near toivola, to near brookston, to 7 miles southwest of cloquet, moving east-northeast at 60 mph. these are very dangerous storms with a history of producing widespread wind damage across aitkin county between 7 and 8 pm (radar indicated). Hazards include 90 mph wind gusts and penny size hail. You are in a life-threatening situation. flying debris may be deadly to those caught without shelter. mobile homes will be heavily damaged or destroyed. homes and businesses will have substantial roof and window damage. Expect extensive tree damage and power outages.
8/31/2018 7:52 PM CDT At 752 pm cdt, dangerous severe thunderstorms were located along a line extending from near floodwood, to near cromwell, moving east at 55 mph. these are very dangerous storms (radar indicated. widespread and severe wind damage reports have been received from aitkin county with these storms within the past 30 minutes). Hazards include 90 mph wind gusts and penny size hail. You are in a life-threatening situation. flying debris may be deadly to those caught without shelter. mobile homes will be heavily damaged or destroyed. homes and businesses will have substantial roof and window damage. expect extensive tree damage and power outages. locations impacted include, cloquet, scanlon, carlton, floodwood, cromwell, thomson, brookston, saginaw, fond du lac reservation, canyon, grand lake, mahnomen, alborn, culver, gowan, sawyer, prosit, esko, twig, and munger. People in brookston, independence, alborn, and along highway 33 between independence and cloquet should seek shelter immediately!!.
8/31/2018 7:39 PM CDT At 739 pm cdt, dangerous severe thunderstorms were located along a line extending from 7 miles east of jacobson, to near tamarack, moving east at 65 mph. these are very dangerous storms (radar indicated). Hazards include 90 mph wind gusts and penny size hail. You are in a life-threatening situation. flying debris may be deadly to those caught without shelter. mobile homes will be heavily damaged or destroyed. homes and businesses will have substantial roof and window damage. expect extensive tree damage and power outages. locations impacted include, cloquet, big sandy lake, scanlon, carlton, mahtowa, floodwood, wrenshall, cromwell, thomson, brookston, tamarack, saginaw, fond du lac reservation, canyon, grand lake, mahnomen, alborn, culver, ball bluff, and wright. people in the savanna portage state park, floodwood, and gowan areas will be impacted by the strongest winds. Seek shelter now!.
8/31/2018 7:28 PM CDT The national weather service in duluth mn has issued a * severe thunderstorm warning for. northeastern aitkin county in east central minnesota. southwestern st. louis county in northeastern minnesota. northern carlton county in northeastern minnesota. Until 815 pm cdt.
8/26/2018 11:45 PM CDT At 1145 pm cdt, severe thunderstorms were located along a line extending from near oklee to near faith, moving northeast at 65 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. these severe storms will be near, trail and gully around 1150 pm cdt. beaulieu around 1155 pm cdt. A tornado watch remains in effect until 200 am cdt for northwestern minnesota.
8/26/2018 11:30 PM CDT At 1129 pm cdt, severe thunderstorms were located along a line extending from near mentor to near syre, moving northeast at 65 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. these severe storms will be near, erskine and mcintosh around 1135 pm cdt. gary around 1140 pm cdt. faith and waukon around 1145 pm cdt. mahnomen, trail and gully around 1150 pm cdt. bejou and beaulieu around 1155 pm cdt. A tornado watch remains in effect until 200 am cdt for northwestern minnesota.
8/26/2018 11:12 PM CDT At 1112 pm cdt, severe thunderstorms were located along a line extending from near fertile to near kragnes, moving northeast at 65 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. severe thunderstorms will be near, flaming around 1115 pm cdt. fertile around 1120 pm cdt. borup around 1125 pm cdt. erskine around 1130 pm cdt. twin valley, syre and mcintosh around 1135 pm cdt. A tornado watch remains in effect until 200 am cdt for northwestern minnesota.
8/26/2018 4:36 PM CDT At 436 pm cdt, a severe thunderstorm was located near fond du lac reservation, or 8 miles west of cloquet, moving northeast at 35 mph (radar indicated). Hazards include 60 mph wind gusts and penny size hail. Expect damage to roofs, siding, and trees. Locations impacted include, cloquet, scanlon, mahtowa, fond du lac reservation, mahnomen, and sawyer.
6/30/2018 3:28 AM CDT At 327 am cdt, severe thunderstorms were located along a line extending from 7 miles west of boulder lake, to near proctor, to 6 miles north of duxbury, moving east at 45 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. these severe storms will be near, hermantown, proctor and oliver around 335 am cdt. duluth, boulder lake and island lake around 340 am cdt. superior, dairyland, wisconsin point and south range around 345 am cdt. Other locations impacted by these severe thunderstorms include cody, billings park, gary new duluth, duquette, fish lake, moose junction, amnicon lake, banning state park, spirit valley, and jay cooke state park.
6/30/2018 3:16 AM CDT At 315 am cdt, severe thunderstorms were located along a line extending from near canyon, to scanlon, to near bruno, moving east at 45 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. these severe storms will be near, carlton, wrenshall and thomson around 320 am cdt. hermantown and proctor around 330 am cdt. oliver, boulder lake and cloverton around 335 am cdt. superior and island lake around 340 am cdt. dairyland, wisconsin point and south range around 345 am cdt. Other locations impacted by these severe thunderstorms include cody, billings park, gary new duluth, duquette, fish lake, moose junction, amnicon lake, banning state park, spirit valley, and jay cooke state park.
6/30/2018 3:00 AM CDT At 259 am cdt, severe thunderstorms were located along a line extending from near meadowlands, to 6 miles southwest of fond du lac reservation, to near askov, moving east at 45 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. severe thunderstorms will be near, cloquet around 310 am cdt. scanlon, fond du lac reservation and canyon around 315 am cdt. carlton, wrenshall and thomson around 320 am cdt. hermantown, proctor and oliver around 330 am cdt. boulder lake, cloverton and island lake around 335 am cdt. duluth and superior around 340 am cdt. dairyland, wisconsin point and south range around 345 am cdt. Other locations impacted by these severe thunderstorms include cody, billings park, gary new duluth, duquette, fish lake, moose junction, amnicon lake, banning state park, spirit valley, and jay cooke state park.
6/29/2018 5:19 AM CDT At 441 am cdt, severe thunderstorms were located along a line extending from near fertile to near borup to near averill, moving east at 55 mph. these are very dangerous storms (public). Hazards include 80 mph wind gusts and penny size hail. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows, and vehicles. extensive tree damage and power outages are likely. severe thunderstorms will be near, flaming and twin valley around 445 am cdt. rindal, ranum and syre around 450 am cdt. flom and faith around 455 am cdt. hitterdal, bejou and mahnomen around 500 am cdt. waubun and ogema around 505 am cdt. other locations impacted by these severe thunderstorms include many point scout camp. This storm has a history of producing wind speeds in excess of 80 mph.
6/29/2018 4:42 AM CDT At 441 am cdt, severe thunderstorms were located along a line extending from near fertile to near borup to near averill, moving east at 55 mph. these are very dangerous storms (public). Hazards include 80 mph wind gusts and penny size hail. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows, and vehicles. extensive tree damage and power outages are likely. severe thunderstorms will be near, flaming and twin valley around 445 am cdt. rindal, ranum and syre around 450 am cdt. flom and faith around 455 am cdt. hitterdal, bejou and mahnomen around 500 am cdt. waubun and ogema around 505 am cdt. other locations impacted by these severe thunderstorms include many point scout camp. This storm has a history of producing wind speeds in excess of 80 mph.
6/28/2018 3:10 PM CDT The tornado warning for northeastern norman, southeastern polk and western mahnomen counties will expire at 315 pm cdt, the storm which prompted the warning has weakened below severe limits, and no longer appears capable of producing a tornado. therefore, the warning will be allowed to expire. however small hail, gusty winds and heavy rain are still possible with this thunderstorm. a severe thunderstorm watch remains in effect until 900 pm cdt for northwestern minnesota.
6/28/2018 2:48 PM CDT At 247 pm cdt, a severe thunderstorm capable of producing a tornado was located over rindal, or 43 miles south of thief river falls, moving southeast at 25 mph (radar indicated rotation). Hazards include tornado and quarter size hail. Expect damage to mobile homes, roofs, and vehicles. this dangerous storm will be near, ranum around 250 pm cdt. winger around 300 pm cdt. bejou around 310 pm cdt. Mahnomen around 315 pm cdt.
6/28/2018 2:42 PM CDT At 242 pm cdt, severe thunderstorms were located along a line extending from 6 miles north of mcintosh to near winger to flaming to lockhart, moving east at 10 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. Locations impacted include, fosston, mahnomen, fertile, mcintosh, erskine, island lake in mahnomen county and winger.
6/28/2018 2:25 PM CDT At 225 pm cdt, severe thunderstorms were located along a line extending from near brooks to near winger to near flaming to near shelly, moving southeast at 25 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. Locations impacted include, ada, fosston, mahnomen, fertile, mcintosh, erskine and oklee.
6/28/2018 2:13 PM CDT At 213 pm cdt, severe thunderstorms were located along a line extending from near brooks to near rindal to 6 miles east of lockhart to caledonia, moving southeast at 25 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. Expect wind damage to roofs, siding, and trees.
6/17/2018 2:53 PM CDT The severe thunderstorm warning for south central st. louis and northeastern carlton counties will expire at 300 pm cdt, the storm which prompted the warning has weakened below severe limits, and no longer poses an immediate threat to life or property. therefore, the warning will be allowed to expire. however gusty winds are still possible with this thunderstorm. a tornado watch remains in effect until 900 pm cdt for northeastern minnesota.
6/17/2018 2:49 PM CDT At 248 pm cdt, a severe thunderstorm was located near hermantown, or 7 miles northeast of cloquet, moving northeast at 45 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. locations impacted include, cloquet, scanlon, carlton, wrenshall, thomson, brookston, saginaw, fond du lac reservation, mahnomen, culver, burnett, jay cooke state park, and esko. A tornado watch remains in effect until 900 pm cdt for northeastern minnesota.
6/17/2018 2:34 PM CDT At 234 pm cdt, a severe thunderstorm was located near cloquet, moving east at 45 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. locations impacted include, cloquet, scanlon, carlton, mahtowa, wrenshall, thomson, brookston, saginaw, fond du lac reservation, mahnomen, culver, burnett, sawyer, jay cooke state park, and esko. A tornado watch remains in effect until 900 pm cdt for northeastern minnesota.
6/17/2018 2:25 PM CDT At 225 pm cdt, a severe thunderstorm was located near cromwell, or 13 miles west of cloquet, moving northeast at 50 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. Wind damage is also likely to mobile homes, roofs, and outbuildings.
6/17/2018 2:01 PM CDT At 200 pm cdt, a severe thunderstorm was located over cloquet, moving east at 30 mph (radar indicated). Hazards include 70 mph wind gusts and half dollar size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. locations impacted include, cloquet, scanlon, carlton, wrenshall, thomson, saginaw, fond du lac reservation, mahnomen, esko, sawyer, and jay cooke state park. A tornado watch remains in effect until 900 pm cdt for northeastern minnesota.
6/17/2018 1:50 PM CDT At 149 pm cdt, a severe thunderstorm was located near fond du lac reservation, just west of cloquet, moving east at 30 mph (radar indicated). Hazards include 70 mph wind gusts and half dollar size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. locations impacted include, cloquet, scanlon, carlton, wrenshall, cromwell, thomson, saginaw, fond du lac reservation, mahnomen, sawyer, esko, kettle lake, and jay cooke state park. A tornado watch remains in effect until 900 pm cdt for northeastern minnesota.
6/17/2018 1:32 PM CDT At 132 pm cdt, a severe thunderstorm was located near cromwell, or 16 miles west of cloquet, moving east at 30 mph (radar indicated). Hazards include 70 mph wind gusts and half dollar size hail. Hail damage to vehicles is expected. expect considerable tree damage. Wind damage is also likely to mobile homes, roofs, and outbuildings.
6/8/2018 7:29 PM CDT The national weather service in grand forks has issued a * severe thunderstorm warning for. northeastern norman county in northwestern minnesota. western mahnomen county in northwestern minnesota. until 815 pm cdt. At 729 pm cdt, a severe thunderstorm was located over waukon, or 41.
9/22/2017 6:49 AM CDT At 649 am cdt, a severe thunderstorm was located near hermantown, or 8 miles northeast of cloquet, moving northeast at 50 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. Locations impacted include, duluth, superior, cloquet, hermantown, proctor, scanlon, carlton, mahtowa, wrenshall, oliver, thomson, pike lake near duluth, saginaw, island lake, boulder lake, grand lake, fredenberg, mahnomen, irving, and cody.
9/22/2017 6:41 AM CDT At 641 am cdt, a severe thunderstorm was located over cloquet, moving northeast at 45 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. Expect wind damage to roofs, siding, and trees.
7/21/2017 8:32 PM CDT At 832 pm cdt, a severe thunderstorm was located over wrenshall, or 9 miles southeast of cloquet, moving east at 35 mph (radar indicated). Hazards include 60 mph wind gusts and penny size hail. Expect damage to roofs, siding, and trees. this severe storm will be near, foxboro around 845 pm cdt. Other locations impacted by this severe thunderstorm include pleasant valley, gary new duluth, munger, morgan park, sawyer, fond du lac, mahnomen, jay cooke state park, norton park, and esko.
7/21/2017 8:20 PM CDT At 820 pm cdt, a severe thunderstorm was located near carlton, or near cloquet, moving east at 30 mph (radar indicated). Hazards include 60 mph wind gusts and penny size hail. Expect damage to roofs, siding, and trees. this severe storm will be near, scanlon around 825 pm cdt. carlton around 830 pm cdt. wrenshall and thomson around 835 pm cdt. oliver and foxboro around 845 pm cdt. Other locations impacted by this severe thunderstorm include gowan, cody, grand lake, pleasant valley, gary new duluth, munger, morgan park, sawyer, spirit valley, and fond du lac.
7/21/2017 7:59 PM CDT At 757 pm cdt, a severe thunderstorm was located near cromwell, or 12 miles west of cloquet, moving east at 35 mph (radar indicated). Hazards include 60 mph wind gusts and nickel size hail. Expect damage to roofs, siding, and trees. this severe thunderstorm will be near, mahtowa and barnum around 810 pm cdt. scanlon around 820 pm cdt. carlton, wrenshall and thomson around 825 pm cdt. holyoke around 830 pm cdt. oliver and foxboro around 840 pm cdt. Other locations impacted by this severe thunderstorm include gowan, cody, grand lake, gary new duluth, morgan park, wright, sawyer, spirit valley, jay cooke state park, and norton park.
7/21/2017 7:38 PM CDT At 737 pm cdt, a severe thunderstorm was located 7 miles northwest of cromwell, or 16 miles east of big sandy lake, moving east at 40 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. this severe storm will be near, cloquet around 800 pm cdt. Other locations impacted by this severe thunderstorm include gowan, grand lake, ball bluff, sheshebee, wright, savanna portage state park, burnett, wawina, sawyer, and island.
7/21/2017 7:14 PM CDT At 714 pm cdt, a severe thunderstorm was located near libby, or near big sandy lake, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. this severe thunderstorm will be near, tamarack around 725 pm cdt. cromwell around 740 pm cdt. cloquet and mahtowa around 755 pm cdt. Other locations impacted by this severe thunderstorm include gowan, grand lake, ball bluff, sheshebee, wright, savanna portage state park, burnett, wawina, sawyer, and island.
7/17/2017 7:09 PM CDT At 657 pm cdt, severe thunderstorms were located along a line extending from 9 miles southwest of brookston, to 6 miles west of sandstone, moving east at 40 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. these severe storms will be near, cloquet and askov around 715 pm cdt. bruno around 720 pm cdt. Other locations impacted by these severe thunderstorms include finlayson, arthyde, moose lake state park, wright, dads corner, denham, sawyer, banning state park, automba, and mahnomen.
7/17/2017 6:58 PM CDT At 657 pm cdt, severe thunderstorms were located along a line extending from 9 miles southwest of brookston, to 6 miles west of sandstone, moving east at 40 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. these severe storms will be near, cloquet and askov around 715 pm cdt. bruno around 720 pm cdt. Other locations impacted by these severe thunderstorms include finlayson, arthyde, moose lake state park, wright, dads corner, denham, sawyer, banning state park, automba, and mahnomen.
7/17/2017 6:43 PM CDT At 643 pm cdt, severe thunderstorms were located along a line extending from 10 miles southwest of floodwood, to 6 miles south of mcgrath, moving east at 25 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. severe thunderstorms will be near, rutledge around 725 pm cdt. askov around 735 pm cdt. cloquet around 740 pm cdt. bruno around 745 pm cdt. Other locations impacted by these severe thunderstorms include finlayson, arthyde, moose lake state park, sheshebee, wright, lawler, dads corner, denham, sawyer, and banning state park.
7/6/2017 5:17 AM CDT At 515 am cdt, severe thunderstorms were located along a line extending from near toivola, to near cloquet, to near bruno, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. Locations impacted include, duluth, superior, cloquet, hermantown, proctor, scanlon, carlton, mahtowa, barnum, floodwood, cotton, willow river, wrenshall, oliver, cromwell, holyoke, kettle river, toivola, thomson, and brookston.
7/6/2017 5:02 AM CDT At 502 am cdt, severe thunderstorms were located along a line extending from 8 miles west of toivola, to 6 miles north of cromwell, to 6 miles west of willow river, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. locations impacted include, duluth, superior, cloquet, hermantown, proctor, scanlon, carlton, swan river, mahtowa, barnum, floodwood, cotton, willow river, wrenshall, oliver, cromwell, holyoke, warba, kettle river, and toivola. This also includes interstate 35 between barnum and duluth and state highway 61 between duluth and two harbors.
7/6/2017 4:44 AM CDT At 443 am cdt, severe thunderstorms were located along a line extending from near warba, to 6 miles north of tamarack, to 6 miles north of mcgrath, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. Wind damage is also likely to mobile homes, roofs, and outbuildings.
6/13/2017 10:01 PM CDT A severe thunderstorm warning remains in effect until 1030 pm cdt for eastern norman. southwestern wadena. eastern otter tail. mahnomen. becker and southern clearwater counties. At 1000 pm cdt, severe thunderstorms were located along a line extending from hitterdal to near perham to near urbank, and are nearly stationary.
6/13/2017 9:37 PM CDT At 936 pm cdt, severe thunderstorms were located along a line extending from hitterdal to near perham to near urbank, and are nearly stationary (public. this storm has a history of producing damaging winds). Hazards include 60 mph wind gusts and penny size hail. Expect damage to roofs, siding, and trees. severe thunderstorms will be near, vergas and dale around 940 pm cdt. hitterdal around 955 pm cdt. perham around 1000 pm cdt. Frazee, ulen and almora around 1030 pm cdt.
6/13/2017 3:41 PM CDT At 341 pm cdt, a severe thunderstorm was located over waukon, or 41 miles north of detroit lakes, moving northeast at 45 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. this severe storm will be near, ranum around 345 pm cdt. rindal and bejou around 350 pm cdt. winger around 400 pm cdt. erskine around 405 pm cdt. Mcintosh around 410 pm cdt.
6/13/2017 3:35 PM CDT Quarter sized hail reported 154.7 miles ESE of Mahnomen, MN, very heavy rain and dime to quarter sized hail.
6/13/2017 3:27 PM CDT At 326 pm cdt, a severe thunderstorm was located over twin valley, or 34 miles northwest of detroit lakes, moving northeast at 45 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. this severe storm will be near, faith around 335 pm cdt. gary and waukon around 340 pm cdt. ranum, rindal and bejou around 350 pm cdt. winger around 400 pm cdt. Mcintosh and erskine around 410 pm cdt.
6/13/2017 3:07 PM CDT At 307 pm cdt, a severe thunderstorm was located near felton, or 22 miles northeast of fargo, moving northeast at 45 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. this severe thunderstorm will be near, ulen around 315 pm cdt. syre and flom around 325 pm cdt. twin valley around 330 pm cdt. faith around 335 pm cdt. Gary and waukon around 340 pm cdt.
8/28/2016 11:59 PM CDT At 1159 pm cdt, a severe thunderstorm was located over richwood, or 8 miles north of detroit lakes, moving southeast at 30 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. This severe thunderstorm will remain over mainly rural areas of western becker, southwestern clearwater, southern mahnomen, southeastern norman and northeastern clay counties.
8/28/2016 11:31 PM CDT At 1130 pm cdt, a severe thunderstorm was located near flom, or 23 miles northwest of detroit lakes, moving southeast at 10 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. this severe thunderstorm will be near, waubun around 1150 pm cdt. ogema around 1205 am cdt. Callaway, white earth and richwood around 1230 am cdt.
8/28/2016 11:18 PM CDT At 1117 pm cdt, a severe thunderstorm capable of producing a tornado was located near waubun, or 29 miles north of detroit lakes, moving southeast at 10 mph (radar indicated rotation). Hazards include tornado and quarter size hail. Expect damage to mobile homes. roofs. and vehicles. This dangerous storm will be near, waubun and ogema around 1130 pm cdt.
8/28/2016 10:41 PM CDT At 1040 pm cdt, a severe thunderstorm capable of producing a tornado was located near waukon, or 38 miles north of detroit lakes, moving southeast at 20 mph (radar indicated rotation). Hazards include tornado and quarter size hail. Expect damage to mobile homes. roofs. and vehicles. this dangerous storm will be near, mahnomen around 1050 pm cdt. waubun around 1055 pm cdt. ogema around 1100 pm cdt. white earth around 1105 pm cdt. Tulaby lake around 1110 pm cdt.
8/4/2016 4:37 AM CDT At 434 am cdt, severe thunderstorms were located along a line extending from boulder lake, to near oliver, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and penny size hail. Expect considerable tree damage. damage is likely to mobile homes, roofs, and outbuildings. these severe storms will be near, south range and wisconsin point around 445 am cdt. hawthorne around 450 am cdt. poplar in douglas county around 455 am cdt. two harbors, lake nebagamon and maple around 500 am cdt. Other locations impacted by these severe thunderstorms include prosit, billings park, lakewood twp, pattison state park, chester park, wentworth, morley hts/parkview, alborn, patzau and waino.
8/4/2016 4:15 AM CDT At 414 am cdt, severe thunderstorms were located along a line extending from canyon, to near nemadji, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and penny size hail. Expect considerable tree damage. damage is likely to mobile homes, roofs, and outbuildings. severe thunderstorms will be near, foxboro around 425 am cdt. duluth and boulder lake around 430 am cdt. superior around 440 am cdt. hawthorne around 450 am cdt. poplar in douglas county around 455 am cdt. two harbors, lake nebagamon, maple and brule around 500 am cdt. Other locations impacted by these severe thunderstorms include prosit, billings park, lakewood twp, pattison state park, chester park, wentworth, morley hts/parkview, alborn, patzau and waino.
7/21/2016 3:35 AM CDT At 335 am cdt, severe thunderstorms were located along a line extending from near whiteface reservoir, to near oliver, moving east at 45 mph. these are very dangerous storms (trained weather spotters). Hazards include 80 mph wind gusts and half dollar size hail. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows, and vehicles. extensive tree damage and power outages are likely. these severe storms will be near, superior, fairbanks and wolf lake around 345 am cdt. south range, brimson and wisconsin point around 350 am cdt. Other locations impacted by these severe thunderstorms include prosit, billings park, lakewood twp, chester park, morley hts/parkview, alborn, east hillside, taft, congdon park and twig.
7/21/2016 3:21 AM CDT At 319 am cdt, severe thunderstorms were located along a line extending from 6 miles west of whiteface reservoir, to near wrenshall, moving east at 55 mph (radar indicated). Hazards include 70 mph wind gusts and half dollar size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. these severe storms will be near, whiteface reservoir around 330 am cdt. oliver and duluth around 335 am cdt. fairbanks, wolf lake and wisconsin point around 340 am cdt. superior, south range and brimson around 345 am cdt. Other locations impacted by these severe thunderstorms include prosit, billings park, lakewood twp, chester park, morley hts/parkview, alborn, east hillside, gowan, taft and congdon park.
7/21/2016 3:00 AM CDT At 257 am cdt, severe thunderstorms were located along a line extending from near cherry, to near cromwell, moving east at 45 mph (radar indicated). Hazards include 60 mph wind gusts. Expect damage to roofs. siding. and trees. severe thunderstorms will be near, eveleth around 315 am cdt. cloquet around 325 am cdt. scanlon and carlton around 330 am cdt. wrenshall and thomson around 335 am cdt. whiteface reservoir around 340 am cdt. duluth, proctor and oliver around 345 am cdt. superior and wolf lake around 350 am cdt. Other locations impacted by these severe thunderstorms include prosit, billings park, lakewood twp, chester park, morley hts/parkview, alborn, east hillside, gowan, taft and congdon park.
7/21/2016 12:31 AM CDT At 1230 am cdt, severe thunderstorms were located along a line extending from near gonvick to near long lost lake to near richwood, moving southeast at 70 mph. these are very dangerous storms (radar indicated). Hazards include 80 mph wind gusts. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows, and vehicles. extensive tree damage and power outages are likely. these severe storms will be near, bad medicine lake, long lost lake and zerkel around 1235 am cdt. height of land lake, bagley and lake itasca around 1240 am cdt. toad lake, shevlin and pine point around 1245 am cdt. Wilton, snellman and wolf lake around 1250 am cdt.
7/21/2016 12:16 AM CDT At 1215 am cdt, severe thunderstorms were located along a line extending from near olga to flom, moving east at 60 mph. these are very dangerous storms (radar indicated. measured wind gust of 71 mph in mahnomen). Hazards include 80 mph wind gusts. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows, and vehicles. extensive tree damage and power outages are likely. these severe storms will be near, olga around 1220 am cdt. weme around 1225 am cdt. white earth, clearbrook and richwood around 1230 am cdt. bagley, tulaby lake and leonard around 1235 am cdt. Many point lake and shevlin around 1240 am cdt.
7/21/2016 12:10 AM CDT At 1210 am cdt, severe thunderstorms were located along a line extending from 6 miles northeast of mcintosh to near syre, moving east at 60 mph (radar indicated). Hazards include 70 mph wind gusts. Expect considerable tree damage. damage is likely to mobile homes, roofs, and outbuildings. these severe storms will be near, waubun and olga around 1220 am cdt. ogema and weme around 1225 am cdt. white earth and clearbrook around 1230 am cdt. bagley and leonard around 1235 am cdt. Tulaby lake and shevlin around 1240 am cdt.
7/21/2016 12:03 AM CDT At 1203 am cdt, severe thunderstorms were located along a line extending from 6 miles southwest of trail to near felton, moving east at 60 mph (radar indicated). Hazards include 60 mph wind gusts. Expect damage to roofs. siding. and trees. severe thunderstorms will be near, mcintosh around 1205 am cdt. olga and syre around 1210 am cdt. weme around 1215 am cdt. clearbrook around 1220 am cdt. Bagley around 1225 am cdt.
7/11/2016 1:33 AM CDT At 133 am cdt, severe thunderstorms were located along a line extending from near crookston to gary, moving east at 55 mph (radar indicated). Hazards include 60 mph wind gusts. Expect damage to roofs. siding. and trees. these severe storms will be near, gary, twin valley and flaming around 135 am cdt. waukon, faith and ranum around 140 am cdt. mahnomen around 145 am cdt. bejou and dugdale around 150 am cdt. Mentor and beaulieu around 155 am cdt.
7/11/2016 1:06 AM CDT At 105 am cdt, severe thunderstorms were located along a line extending from near reynolds to near hendrum, moving east at 55 mph (radar indicated). Hazards include 70 mph wind gusts. Expect considerable tree damage. damage is likely to mobile homes, roofs, and outbuildings. severe thunderstorms will be near, hendrum and halstad around 110 am cdt. ada, climax and hadler around 120 am cdt. gary and twin valley around 130 am cdt. harold and flaming around 135 am cdt. Waukon, faith and ranum around 140 am cdt.
6/25/2016 4:52 PM CDT At 451 pm cdt, a severe thunderstorm was located over proctor, or 7 miles west of superior, moving east at 40 mph (radar indicated. this storm has a history of producing wind damage in the cromwell and cloquet areas). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. wind damage is also likely to mobile homes, roofs, and outbuildings. locations impacted include, duluth, superior, cloquet, hermantown, two harbors, proctor, hawthorne, lake nebagamon, scanlon, carlton, maple, brule, barnum, mahtowa, poplar in douglas county, wrenshall, oliver, holyoke, thomson and brookston. A tornado watch remains in effect until 900 pm cdt for northeastern minnesota, and northwestern wisconsin.
6/25/2016 4:46 PM CDT At 445 pm cdt, severe thunderstorms were located along a line extending from near kettle river to 8 miles south of mcgrath, moving east at 55 mph (radar indicated). Hazards include 70 mph wind gusts and nickel size hail. Expect considerable tree damage. damage is likely to mobile homes, roofs, and outbuildings. locations impacted include, cloquet, mille lacs lake, hermantown, sandstone, scanlon, carlton, barnum, mahtowa, willow river, wrenshall, askov, malmo, cromwell, rutledge, kettle river, thomson, bruno, tamarack, mcgrath and nemadji. A tornado watch remains in effect until 900 pm cdt for northeastern minnesota.
6/25/2016 4:36 PM CDT At 435 pm cdt, a severe thunderstorm was located near carlton, or near cloquet, moving east at 50 mph. this is a very dangerous storm (radar indicated). Hazards include 80 mph wind gusts and quarter size hail. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows, and vehicles. Extensive tree damage and power outages are likely.
6/25/2016 4:28 PM CDT At 426 pm cdt, dangerous severe thunderstorms were located along a line extending from near brookston to near mahtowa to 7 miles northwest of rutledge, moving east at 50 mph (radar indicated). Hazards include 80 mph wind gusts and nickel size hail. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows, and vehicles. extensive tree damage and power outages are likely. locations impacted include, cloquet, mille lacs lake, hermantown, sandstone, scanlon, carlton, barnum, mahtowa, willow river, wrenshall, mcgregor, askov, malmo, cromwell, rutledge, kettle river, thomson, brookston, bruno and tamarack. A tornado watch remains in effect until 900 pm cdt for northeastern minnesota.
6/25/2016 4:21 PM CDT At 419 pm cdt, severe thunderstorms were located along a line extending from 7 miles northeast of cromwell to 7 miles west of mahtowa to 6 miles east of mcgrath, moving east at 65 mph. these are very dangerous storms. radar indicates that a narrow corridor of very strong winds, perhaps up to 80 mph will affect areas along the highway 210 corridor from cromwell to cloquet (radar indicated). Hazards include 80 mph wind gusts and quarter size hail. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows, and vehicles. extensive tree damage and power outages are likely. locations impacted include, cloquet, mille lacs lake, hermantown, sandstone, scanlon, carlton, barnum, mahtowa, willow river, wrenshall, mcgregor, askov, malmo, cromwell, rutledge, kettle river, thomson, brookston, bruno and tamarack. A tornado watch remains in effect until 900 pm cdt for northeastern minnesota.
6/25/2016 4:07 PM CDT At 406 pm cdt, severe thunderstorms were located along a line extending from 7 miles north of cromwell to 6 miles northwest of kettle river to 6 miles north of isle, moving east at 50 mph (radar indicated). Hazards include 70 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect considerable tree damage. Wind damage is also likely to mobile homes, roofs, and outbuildings.
6/17/2016 9:05 AM CDT At 904 am cdt, severe thunderstorms were located along a line extending from near trail to lengby to near beaulieu, moving east at 25 mph (radar indicated). Hazards include 60 mph wind gusts and quarter size hail. Hail damage to vehicles is expected. expect wind damage to roofs, siding, and trees. severe thunderstorms will be near, lengby, olga and pine bend around 910 am cdt. gully and ebro around 915 am cdt. gonvick, mahkonce and weme around 925 am cdt. bagley around 930 am cdt. Clearbrook and roy lake around 935 am cdt.
8/12/2015 11:00 PM CDT Golf Ball sized hail reported 162.2 miles ESE of Mahnomen, MN, report and photo posted via social media. time estimated based on radar.
8/2/2015 6:36 AM CDT The severe thunderstorm warning for northeastern norman, south central polk and mahnomen counties will expire at 645 am cdt, the storm which prompted the warning has weakened below severe limits, and no longer pose an immediate threat to life or property. therefore the warning will be allowed to expire. however there is a severe storm impact southeastern norman into southwestern mahnomen and parts of northern becker county and that warning will remain in place.
8/2/2015 6:01 AM CDT At 601 am cdt, a severe thunderstorm was located over fertile, or 38 miles south of thief river falls, moving southeast at 50 mph (radar indicated). Hazards include ping pong ball size hail and 60 mph wind gusts. People and animals outdoors will be injured. expect hail damage to roofs, siding, windows and vehicles. expect wind damage to roofs, siding and trees. this severe thunderstorm will be near, rindal and ranum around 610 am cdt. winger around 615 am cdt. bejou around 620 am cdt. mahnomen around 625 am cdt. Island lake in mahnomen county and beaulieu around 635 am cdt.
7/24/2015 1:17 AM CDT At 116 am cdt, severe thunderstorms were located along a line extending from near gonvick to near naytahwaush to near rollag, moving east at 50 mph. these are very dangerous storms (radar indicated). Hazards include 80 mph wind gusts and penny size hail. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows and vehicles. extensive tree damage and power outages are likely. these severe storms will be near, clearbrook, naytahwaush, tulaby lake, gonvick, berner and roy lake around 120 am cdt. Detroit lakes, shoreham, bad medicine lake, long lost lake, leonard and zerkel around 130 am cdt.
7/24/2015 1:05 AM CDT At 104 am cdt, severe thunderstorms were located along a line extending from trail to near waubun to near muskoda, moving east at 55 mph. these are very dangerous storms (radar indicated). Hazards include 80 mph wind gusts and penny size hail. Flying debris will be dangerous to those caught without shelter. mobile homes will be heavily damaged. expect considerable damage to roofs, windows and vehicles. extensive tree damage and power outages are likely. these severe storms will be near, gully, trail, olga and beaulieu around 110 am cdt. gonvick and berner around 115 am cdt. naytahwaush, clearbrook, tulaby lake, lake park, mahkonce and roy lake around 120 am cdt. lower rice lake around 125 am cdt. Detroit lakes, shoreham, bad medicine lake, long lost lake, leonard and zerkel around 130 am cdt.
6/7/2015 4:54 PM CDT At 454 pm cdt, a severe thunderstorm was located near beaulieu, or 37 miles north of detroit lakes, moving southeast at 25 mph (radar indicated). Hazards include quarter size hail. Damage to vehicles is expected. this severe storm will be near, beaulieu around 500 pm cdt. Naytahwaush around 525 pm cdt.
6/7/2015 4:38 PM CDT At 438 pm cdt, a severe thunderstorm was located over bejou, or 42 miles north of detroit lakes, moving southeast at 25 mph (radar indicated). Hazards include quarter size hail. Damage to vehicles is expected. this severe thunderstorm will be near, mahnomen around 450 pm cdt. beaulieu around 500 pm cdt. Naytahwaush around 525 pm cdt. | 2019-04-25T03:49:06Z | http://www.interactivehailmaps.com/local-hail-map/mahnomen-mn/ |
Welcome! In this Instructable I will show you how to model and 3D print an optical illusion name plate! The name plate shows a single phrase when you look at it head on, but when you view the plate from the side a new phrase appears while the other disappears!
In this Instructable I provide step by step instructions for designing and modeling the illusion using AUTODESK Fusion 360. Even if you have never used Fusion 360 before you will be able to follow along and 3D print a sweet custom optical illusion name plate for yourself.
I printed my own name plate, as shown in the second GIF, using the same principals I show here and it has been a big hit at the office.
AUTODESK Fusion 360. This CAD/CAM/CAE software is free for hobbyists. It will allow you to model and export your name plate illusion. Download the full trial version for free forever from AUTODESK.
3D printer or printing service. If you don't have access to a printer try 3D Hubs to get a print made locally! I am printing my nameplate using a Rostock Max. A dual head 3D printer capable of printing with model and soluble support material would be ideal, but not required. I printed my model using PLA plastic for both the model and supports.
Slicing software (if you are printing yourself). I am using Slic3r simply because that is the software I spent the most time with, perfecting my print settings.
Stencil font pack. You can download a free Stencil font here if you don't have one.
I hope you enjoy this Instructable and amaze everyone with your own name plate!
The phrase you choose to be solid must be printed thick enough so that you can't see any gaps when you look at it from 45° to the side. This is shown in Figure 1.
The phrase you cut out must be in a stencil style font. This allows every piece of the solid letters to maintain a connection to the body after the cut. This is illustrated in Figure 2.
You must connect all the letters together with a small base rectangle also shown in Figure 2.
If you are an expert 3D modeler and printer you have probably figured out what to do already. Get to it! If not, don't worry! Follow the remaining steps and you'll be an expert in no time. Every step of modeling with Fusion 360 and setting up a print with Slic3r is explained below.
In this Instructable, you will be modeling everything in Fusion 360 because it is free for hobbyists. If you are using a different Computer Aided Design (CAD) software, simply try to apply the same principals shown here and everything should work just fine!
Open Fusion 360. Click the arrow to the left of "Origin" in the design tree as show in Figure 2.1 (From here on, all figures are labeled in the bottom right corner of the image). As noted in Figure 2.1 you will want to change your units at this time by clicking the "Units" icon in the design tree. Most 3D printing slicers default to millimeters. I think best in inches so I chose that instead. Note: Slic3r always imports models in millimeters so you will change back to them prior to saving the final model.
Choose a plane to start a sketch on. In my example I chose to sketch on the XY plane because it ends up being the same plane as the build surface of the 3D printer. By choosing the same plane as the build surface you will not need to reorient your model in your slicer. As illustrated in Figure 2.2, select the XY plane, click the drop down on the "Sketch" icon of the toolbar, and select "Create Sketch." Fusion 360 will now show the sketch interface on the XY plane.
surface, so make sure your line is at least a bit smaller than the printer's capacity.
Select the line and set it to be a construction line by clicking the "Normal/Construction" icon in the sketch palette (Figure 2.5). It will turn into an orange dashed line as shown later in Figure 2.7. This will serve as a guide line to attach and size your font, but it won't show up in your final model. If you would like, center the line on the origin by holding the Ctrl key on your keyboard, selecting the line and the origin, and clicking the "Midpoint" icon in the sketch palette (Figure 2.6).
Insert your base text by clicking the drop down on the "Sketch" toolbar button and selecting "Text" (Figure 2.7). As shown in Figure 2.8, select the start point of the construction line to begin your text there. This will bring up the text edit window.
Select the font style you want to use for the solid base from the drop down (Figure 2.8). Keep in mind that your font must have continuous characters, meaning each individual letter must be made up of only one piece. As an example, in nearly all fonts, the dot on a lowercase "i" will not be connected to the body of the letter. If you were to print this the dot would not be attached to anything. This means, for your solid base text, you DO NOT want use a stencil-like font where the characters are broken up into pieces. I wanted my name plate to make an impact so I chose the "Impact" font and set it to be 1.125 inches tall.
Type the word, phrase, or name you want to be printed solid in the text box using all capital letters to keep the text height consistent. The text will display as solid blue in the graphics window (Figure 2.8).
Click and hold the top of the text editor window to drag it out of the way so that you can see your whole phrase and construction line as shown in Figure 2.9. You can see in Figure 2.9 that my text doesn't reach the end of the construction line. That means it won't be the full 8 inches long like I wanted. Use trial and error to adjust your font height until the last letter lines up with the end of the construction line. As shown inFigure 2.10, 1.28 inches tall worked to remove the space between the last letter and the end of the construction line for my particular combination of requirements.
Finally, click "Stop Sketch" in either location shown in Figure 2.10 to accept and exit your sketch.
At this point, you should be happy with your base phrase, font selection, font size, and orientation.
Before we turn our flat text 3D, we need to make a 45° mid plane so that we can view the thickness of the text from the perspective of the future cut out "illusion."
Click the drop down for the "Construct" toolbar icon and select "Plane at Angle" as shown in Figure 3.1.
Select the green Y axis either in the tree or in the graphics window as shown in Figure 3.2. If the default planes or axes are not visible you can click on the arrow next to "Origin" in the tree as shown in Figure 3.2. Clicking the light bulb next to an item in the tree will toggle its visibility on and off. If the light bulb is yellow the item is visible.
Enter 45° in as the angle of the plane (Figure 3.3). If the plane isn't oriented as shown you may need to enter 135° instead to rotate the plane 90°. TIP: Once the model is printed perhaps you want viewers to see the solid letters, or maybe you prefer the cut out letters to be visible initially. This will dictate which way your plane faces. Think about how people will approach and pass your name plate most often and align your new plane in this direction.
Click "OK" to accept the 45° mid plane when satisfied (Figure 3.3).
Your model should now have your base text and a mid plane.
You will now create the text that will eventually be cut through the solid base text.
Select the drop down on the "Sketch" toolbar icon then click "Create Sketch" (Figure 4.1). Select the 45° plane in the graphics window or design tree under the "Construction" group (Figure 4.2). The view will now change to the sketch interface and be oriented normal to the plane you just made. If the view doesn't change, or you move your view by mistake, you can orient it normal to the plane again by clicking "Look At" at the bottom of the window and then selecting the plane (or anything on the plane)(Figure 4.3).
Select the text tool from the sketch toolbar as you did for the base text (Figure 4.3). Since you defined the size of the name plate with the base text you don't need to make a construction line.
Click within the base text where you want the cut out text to begin (Figure 4.4). Drag the text editor window out of the way as you did for the base text.
Select your favorite stencil font and type the text you want to cut through your base text. (Figure 4.5). If you choose not to use a stencil font there is a strong chance there will be detached pieces of text after we cut out our letters. This could cause your illusion to be illegible. Since stencils are designed to hold all the cut out pieces of font together in two dimensions this property certainly helps out when we add our third dimension.
Adjust the font orientation if needed. In my example, the new text was running vertically. To fix this I entered an angle of 270° (Figure 4.5).
Toggle the visibility of Sketch 1 by clicking on the arrow to the left of "Sketches" on the tree (Figure 4.5). Click the light bulb next to Sketch 1 in the tree to hide it (Figures 4.6 and 4.7). If you select Sketch 1 it will turn black as shown in Figure 4.7b. This contrast will help you distinguish your texts from one another.
Adjust the height of the new text (Figure 4.8). In my example I liked an even 1 inch. Keep in mind that the bigger your cutting font is, the more likely it is that it will cut all the way across a character of the solid base. This will create a detached body. If this happens and you print it, it won't be connected to anything. The piece will fall off or even ruin the print entirely! We will be checking for this in Step 9.
Position the text where you want it by selecting it in the graphics window and dragging it into position. I like to center the text horizontally and vertically as shown in Figure 4.8. You don't need to dimension or constrain the sketch because there is a good change it will need to be adjusted in the future.
Click OK when you are happy with your font selection, position, and size (Figure 4.8).
At this point your model should now have the base text and the text to cut out oriented at 45° as shown in Figure 4.9.
In order to help you visually determine how thick to make the solid base text you need to look at the model from the perspective of the cut.
Click the "Look At" tool near the bottom center of the screen as shown in Figure 5.1.
Select either the 45° text or plane as shown in Figure 5.2.
You should now be looking at your model from the perspective of the cut you will make later. This should look like Figure 5.3.
You are now ready to make the flat base text into a solid 3D model.
Click on the "Create" toolbar drop down and select "Extrude" (Figure 6.1). Alternatively, you can hold a right click with the mouse and select "Press Pull" as shown in Figure 6.1b.
Ensure you are still looking at the model from the perspective of the future cut. If not go back one step to Step 5.
Select the sketch for your solid base text by clicking on it in the graphics window (Figure 6.2).
In the Extrude menu, set the direction to "One Side" (Figure 6.3). Click and drag the blue arrow in the graphics area to pull the extrusion and add thickness (Figure 6.3). Remember we don't want any gaps showing anywhere in the solid base text. Figure 6.4 shows an example of a gap in the base text which we don't want. Figure 6.5 illustrates a nice solid, gap-less, base text. You want to extrude slightly past when the gaps disappear to have some wiggle room for deviations in your 3D print. TIP: To better see any gaps you may want to toggle the visibility of the sketch for the cutting text (Sketch 2) by clicking the light bulb icon next to it in the design tree.
Click OK when you have a nice solid base with no gaps.
Your model should now have a 3D body for the base text with the flat text you will be cutting out in the next step, as shown in Figure 6.6.
It is now time to cut the illusion text out of the solid body text.
Click on the "Create" toolbar drop down and select "Extrude" or, as shown in Figure 7.1, you can hold a right click with the mouse and select "Press Pull".
Select the text you will cut out in the graphics window (Figure 7.2).
In the "Extrude" window, click the drop down next to "Direction" and select "Symmetric" (Figure 7.2). This will cause the extrusion to have equal thickness on the front and back of your text.
In the "Extrude" window, click the drop down next to "Operation" and select "Cut" since you are removing this text from the solid base (Figure 7.3).
Rotate the model so you can view the depth of the cut (Figure 7.4). To do so, click and hold your middle mouse button (or wheel) and drag to rotate the model.
Drag the blue arrow in the graphics window to add depth to the cut. Pull the cut until it passes completely through the front and back of the solid text as shown in Figure 7.5. Click OK when you are done to complete the cut (Figure 7.5).
Use the "Look At" tool again to look directly at the cut by selecting the 45° plane (Figure 7.7). Make sure the cut is all the way through and you are happy with the placement. Pay attention to how much of the solid text is visible to the left and right of the cut. Since the cut text was placed prior to the base having thickness it may not look centered. You can go back to the sketch for the cut (Sketch 2) and adjust the placement. To edit the sketch, double click it in the design tree.
Your model should now look similar to Figures 7.6 and 7.7.
Right now, all your letters are floating in space. That isn't very practical for a name plate. We need to connect the letters together with a thin strip of material at the base (or anywhere else if you are feeling creative). This could have been done in the same sketch as the base font. However, you may need to make adjustments toward the end of this step and keeping the connector as a separate sketch can simplify some situations.
Start a sketch on the same plane as your base text. You should now be looking directly at your solid text (Figure 8.1).
Use the "2-Point Rectangle" tool in the Sketch toolbar drop down and under the "Rectangle" tool to draw the strip that will connect the letters (Figure 8.1). As seen in Figures8.2 and 8.3, I put the first point of the rectangle on the outermost edge of the first letter of the base. The second corner was placed on the bottom center tangent point of the "S" and the end of "INSTRUCTABLES" as illustrated in Figures8.4 and 8.5. By connecting the rectangle like this it visually blends in with the letters more than if the rectangle extended past them. Figure 8.4 shows the layout of my rectangle. TIP: If your first letter is round on the bottom like a "C" or a "J" you might want to snap your rectangle to the bottom tangent point of the character just like I did for the "S". Also note that, because I chose the "Impact" font, certain characters are taller than others as is the case with the "S." Therefore, you want the bottom of your rectangle to be in line or below the letter that sticks down the most so that the name plate will sit level.
Create the dimensions and relations you want for your connecting strip. You can get to the dimensioning tool as we did in Step 2 part 3, or as shown in Figure 8.6, right click with your mouse and hover over "Sketch" at the bottom of the fly-out menu. When the menu changes, click on "Sketch Dimension" as shown in Figure 8.7. Click the top and bottom of your rectangle to create a dimension between the two. I chose to make mine 0.05 inches tall so that it has enough strength to hold the letters together well, but also doesn't look intrusive (Figure 8.8). If you would like, you can fully dimension your rectangle, or use geometric constraints from the Sketch Palette on the right of the screen (Figure 8.8).
Once you are satisfied with your connecting rectangle click the "Stop Sketch" button to accept your sketch (Figure 8.9).
Bring up the Extrusion tool by right clicking and selecting "Press Pull" as shown in Figure 8.10. The last operation we extruded was a cut, so you need to change this. In the Extrusion window click the drop down next to "Operation" and select "Join" since you are joining our rectangle with the bodies of the letters (Figure 8.11). You want your rectangle to line up with the front and back faces of the solid text. Since you started the sketch from the same plane as the back face of the text, you can select "To" under the "Extents" drop down to allow the extrusion to terminate at the front face (Figure 8.12). Click anywhere on the front face of the base text to tell Fusion 360 the extrusion will extend "to" there (Figure 8.12).
Click "OK" when your rectangle extrusion settings are correct (Figure 8.12).
Your model is almost finished!
This is the trickiest step of the whole process and may require some extra brain power and patience. Unfortunately, with the infinite combinations of words, fonts, and sizes there isn't a way to make sure your particular name plate is one piece. You must analyze your model for disconnected bodies and remove/fix them.
Click the arrow next to Bodies in the design tree to show all the individual bodies (Figure 9.1). Each body that shows up here is not attached to any other body. Select a body in the tree by clicking it to highlight it in blue in the graphics area (Figure 9.1).
Carefully check your whole model. You don't want any significant portions of your letters to be separate bodies. Those parts will fall off of your print and could render your text illegible. Click through the different individual bodies in the tree and look for large pieces as shown in Figures 9.1 and 9.2. If you have large individual bodies see the tip below. You also want to check for places where the connections to letters are small. Examples of thin and missing connections are shown in Figure 9.2. You will be printing with plastic so there must be enough of a connection to support the pieces of the letter it connects. This is tedious to sort out as you may have a thin connection (or no connection) on one face of your text, but a nice solid connection on the other. As long as there is a thick connection somewhere to the rest of the letter, it should print fine!
Hold the Ctrl key on your keyboard and select all of the bodies you wish to remove in the design tree as illustrated in Figure 9.2. Right click on one of the selected bodies in the tree and then select "Remove" (Figure 9.3). Note: Do not use the "Delete" Option. Deleting removes the entire geometry that created the body and will likely destroy your model.
Fix any issues. After removing all of the disconnected bodies, use the "Look At" tool to view your model from the front face of the solid text and then from the 45° plane. You want to check that all the profiles of the letters still look correct now that some pieces are gone. If you have problems see the tip below.
Your model should now be finished as shown in Figure 9.4. You should also now have a basic understanding of modeling in Fusion 260. Well done!
If you have large chunks of letters missing: Rotate your model around and look for places where the cut out text is cutting all the way across a solid letter. Remember you also want to carefully check for places where there are small connections on the main body so you can fix those as well.
Edit your text sketches. Double click on them in the design tree to edit their respective sketches. It may be helpful to rotate the model when editing your sketches so that you can get a better visual of of the changes affect the cut.
If you have room on your 3D printer you can make your solid base text bigger.
Extrude the sketch out further.
Move the text away from the problem area.
Make your cutting text smaller.
Find a thinner stencil font.
Add another (maybe at the top of the solid font or like a "strikeout"). This make the illusion less magical in my opinion.
Change the angle of the plane to be more acute with respect to the base plane. The cut out font won't extend as far across the base with angles less than 45°. Doing this means you will also need to make your base extrusion thicker to hide the shallower cut.
Every time you change your sketches you will want to redo this entire step (Step 9). Until you have no more disconnected bodies, or you only have small bodies with no effect such as those in this example.
Your model should be finished at this point. It is time to save it (although it is good practice to continually save along the way).
Remember earlier when I said most Slicers use millimeters as their default units? Slic3r only uses millimeters (unless you want to scale your inch import by 2540%), so now is the time to change your units. Simply click the "Units" item in the design tree as shown in Figure 10.1. Next select millimeters from the drop down in the menu as shown in Figure 10.2. Lastly click "OK" as shown in Figure 10.3. The model will stay the same physical size with converted units.
Save your part as a CAD file. This will come in handy if you have to modify things after printing. As shown in Figure 10.4 click the "File" drop down on the top toolbar and select "Save As." Save your file to the built in cloud or your favorite spot on the computer. As seen in Figure 10.5 I saved to the cloud. Fancy.
You now need to save a ".stl" file. STL's are stereo-lithography files (made up of triangles) and just happen to be what the 3D printing world decided to standardize as the file type for slicing software. Select the "File" drop down again and click the 3D Print option (Figure 10.6). Click the arrow next to "Refinement Options" in the 3D print menu to bring up the STL settings (Figure 10.7). Also click the arrow next to "Output." Make sure that the box next to "Send to 3D Print Utility" is not checked (Figure 10.8). While it is deselected we will be able to save our STL so we can open it in a slicer.
Check the box next to "Preview Mesh." The mesh wire-frame will display so that we can visually verify the STL resolution is high enough for a good print. As you can see in Figure 10.8, I went with the default settings for "Medium" refinement. As noted in Figure 10.9, Pay particular attention to the density of the mesh on curved surfaces. You will want enough triangles on a curve that it will actually appear to be a curve once printed, but you don't need so many that your mesh looks like it's solid black around a curve.
Accept your STL changes and save your STL file by selecting "OK" (Figure 10.9). Save the STL to a location where it can be opened by your slicing software (Figure 10.10).
You are now finished with your model in Fusion 360.
If you find your slicer is running too slowly later, you can return and save an STL again with relaxed deviation settings. Because text can have lots of round edges, which take a lot of triangles to smooth out, your STL file size can be huge! These large files take a long time for slicers to process. The smaller the file size of your STL, the faster the slicer will run. To save a smaller file return to the 3D print refinement settings as detailed in Figures 10.6, 10.7, and 10.8. Adjust the deviation sliders to make your mesh more coarse. If you adjust the settings to be too coarse, however, your model will look polygonized. For parts of a more artistic nature where fit isn't an issue, such as this illusion, you can use a large deviation without noticing changes to your finished part. After all, what is a few thousandths among friends?
Now it's time to convert your STL model into something a 3D printer can interpret. Slicing software will accomplish this by "slicing" your STL file into layers. Each layer will be filled with paths for your printer to follow. These paths will be saved as gcode, which is a text language that your printer can read.
Open your slicing software. I am using Slic3r simply because I spent the most time tweaking my print settings in it.
Load your model by clicking the "Add" button (Figure 11.1). Navigate to your STL file location and click "Open" (Figure 11.2).
Position the model on the plater (build surface) to your liking by clicking the model and dragging it (Figure 11.3). I like to print on the back surface of the text so that the perimeters of the letters are drawn smoothly by the printer (Figure 11.3). To rotate your part, right click on the part, select rotate, and type the desired angle of rotation for the corresponding axis of rotation (X is red, Y is green, Z is blue). If you modeled the base text on the XY plane, as done in this example with Fusion 360, your part will already be facing the correct direction.TIP: If you print with the letters standing how they are intended to sit on your desk the perimeters of the letters will be layered and not look as crisp. Printing on the back also helps avoid the need for extra support material. Since our cut was made at 45° each new layer of the cut has enough material below it to stick and is typically printable. If we were to print the letters standing up, characters like "T" would need support in order to print the overhangs accurately. TIP 2: To avoid having to guess the angle of rotation for your model in a slicer, model it in Fusion 360 in the orientation you want it to print. Most printers build platforms correspond to the XY plane.
Adjust your print settings. In this example PLA filament settings are shown in Figures 11.4 through 11.9. Since this print is ornamental, I used a 40% infill to save plastic and time (Figure 11.5). As seen in the Figure 11.6, I chose to print a 5mm brim to increase the surface area of the print on the heated bed. A wide print like this tends to warp and detach from the print surface so a brim is cheap insurance against a failed print. This print ended up sticking very well and I wished I didn't used a brim because it was frustrating to remove it from between letters.
You must choose whether you want to print support material at this point (Figure 11.7). There will likely be overhangs which have no underlying surface on which to print (detailed later in Figures 11.13 through 11.17). If you have this condition and don't print support there will nothing for the plastic to stick to on these layers. This will ruin your print or, at best, create flying-spaghetti-monster-like strands you will need to grind off. However, unless you have soluble support or really good model material support settings, there will probably be some picking and grinding to remove the supports anyway. As seen in my settings (Figure 11.7), I chose to print support with a threshold of 0° which allows Slic3r to decide when and where supports are needed. Slic3r did a good job with the support (this time anyway) as you will see later. I have printed the illusion acceptably without support (the example of my name had no support), but I did have to grind some "spaghetti" from the bottom of overhangs.
Wait for Slic3r to finish computing (if auto-compute turned off, click "Export to G-code and save in order to compute) and click on the "Preview" tab at the bottom of the window (Figure 11.10). You will now see your print paths modeled in 3D. Figure 11.11 shows what a pillar of support looks like. The skirt and brim are detailed in Figure 11.12. You can use the slider on the right side of the graphics area to move through the layers of print paths (Figure 11.13). Figures 11.13 through 11.17 highlight where and why support material was needed. For this print the case shown in Figure 11.7 would not have printed without support because it is so close to the last layer. Since the small bit of model shown there is detached from the rest of the body, the remaining few layers will have nothing to bridge to.
If you don't like what you see after investigating your paths, go back and change your print settings, or load your CAD model in Fusion 360 and adjust your model.
When you are satisfied with the print paths, export your file to gcode by clicking the "Export to G-code" button shown in Figure 11.18. Pick where you want to save your file and click "Save" (Figure 11.18).
Now you should finally be ready to load the file onto your printer!
It is time to take your illusion from the digital world to the real world.
Load your gcode file onto your printer. I put the file on an SD card and run the printer stand alone. This printer is on an large uninterruptible power supply so running stand alone allows the print continue for a few hours if the power goes out.
Make sure your printer is calibrated. Every once in a while it is good to check that the leveling and Z axis zero height are still proper. It is especially important on a wide part like this so that the first layer has excellent adherence to the bed. In the first time-lapse GIF I am changing from ABS to PLA filament and calibrating the Z zero height.
Heat the build surface. On this printer the center of the build surface reaches temperature before the outer regions, so I let the heat soak in the bed a while to help the first layer of plastic stick. I use an infrared thermometer to check when the outer edges of the build surface are up to the set temperature.
Print. It is a good idea to watch the first layer go down to make sure there aren't clearance issues and everything is sticking.
Wait. The second GIF of this step shows the printer moving about for 3 hours as it prints. TIP: Hobby grade printers aren't always refined machines. If you value your house don't leave your printer running while you are not home and keep a fire extinguisher handy.
Admire your finished print as it magically sits on the printer (Figures 12.1 and 12.2). There was nothing on the build plate before the print. Now there is an illusion. Was printing itself the illusion? Is this an illusion within an illusion?
Pop your print off the build surface. I highly recommend plastic razorblades if you print on a Polyetherimide (PEI) build surface as shown in Figure 12.3.
Full disclosure - this was the 3rd print attempt. Figure 12.4 proves I am not trapped in "limbo." If a print comes out perfectly first try with this printer, I must be in a dream. You can see from the picture the previous two prints failed a little past 50%.
This is the worst part (unless you have soluble support).
Get out your favorite picking, plucking, sanding, and grinding tools. Gloves and safety glasses are a good idea as well.
Pick, pluck, and grind away from yourself. I have often thought "I might stab myself while trying to pick off this piece of support." I then proceed to stab myself with the pick. Don't do that.
Grind with low RPMs. I bought a flexible shaft rotary grinder just for cleaning up prints because it can run very slowly with high torque. This will keep the plastic from melting while you grind resulting in nice clean plastic chips. These aren't food chips. Don't eat them.
Dream about soluble support. Figures 13.1 and 13.2 show increasing levels of part smoothness where I stopped to wonder how I can get a machine of my own with dual heads and soluble support.
Make your final touch ups. I like to remove the last bit of lip left over from the 5mm brim with a deburring tool. I decided to sand the printing marks off the top face of the print. I rough sanded with 80 grit and finished with 200 grit as shown in Figure 13.3. TIP: I forgot I was using PLA when sanding. Therefore I couldn't use acetone to melt the matte surface back to shiny. I suggest you don't sand if using PLA, as sanding makes the cut out text surfaces stand out due to the different color. You can see this by comparing Figure 13.2 and Figure 13.4.
Can you believe your eyes? You are done!
Step 14: Amaze Your Collegues and Friends!
Put your hard work on display! You earned it for making your way though this entire Instructable!
This is the most amazing desksign i have ever seen!! Thanks!
Thanks! I hope you are able to make one!
Pretty much all of the menu option are different for my version of 360, so it's a bit hard to follow along. I'm also new to the program. Looks like 2.0.2268, student edition.
This is too awesome - gets my vote for sure!
Great project! This is another one for my list - the list of things I am going to make when I get time. I've got to get to this one!
This is unquestionably the most epic desk sign ever!
Thanks! I hope it's epic enough to win a 3D printer in the contest! | 2019-04-18T21:52:46Z | https://www.instructables.com/id/Design-Model-and-3D-Print-an-Optical-Illusion-Name/ |
“USAN” redirects here. For other uses, see USAN (disambiguation).
The Union of South American Nations (USAN; Spanish: Unión de Naciones Suramericanas, UNASUR; Portuguese: União de Nações Sul-Americanas, UNASUL; Dutch: Unie van Zuid-Amerikaanse Naties, UZAN; and sometimes referred to as the South American Union) is an intergovernmental regional organization that once comprised twelve South American countries; as of 2019, most have withdrawn.
The UNASUR Constitutive Treaty was signed on 23 May 2008, at the Third Summit of Heads of State, held in Brasília, Brazil. According to the Constitutive Treaty, the Union’s headquarters will be located in Quito, Ecuador. On 1 December 2010, Uruguay became the ninth state to ratify the UNASUR treaty, thus giving the union full legality. As the Constitutive Treaty entered into force on 11 March 2011, UNASUR became a legal entity during a meeting of Foreign Ministers in Mitad del Mundo, Ecuador, where they had laid the foundation stone for the Secretariat Headquarters.
In April 2018, six countries—Argentina, Brazil, Chile, Colombia, Paraguay and Peru—suspended their membership, and in August of the same year, Colombia announced its withdrawal from the organization. In March 2019, Brazil’s president Jair Bolsonaro announced his country’s intention to withdraw from the organization. On March 13, 2019, Ecuador announced that it will withdraw from the organization. The president of the country, Lenin Moreno, also asked the bloc to return the headquarters building of the organization, based in Quito.
In January 2019, amid growing concern about Venezuela’s Nicolas Maduro, a new group, Prosur, has been advanced to “counteract the influence of what countries in the region call a dictatorship in Venezuela”. A Chilean summit to organize Prosur will be held in March 2019, and would exclude Venezuela. Argentina, Brazil, Bolivia, Colombia, Chile, Ecuador, Uruguay, Paraguay, Peru, Guyana and Suriname were invited to join the new regional bloc.
At the Third South American Summit on 8 December 2004, presidents or representatives from 12 South American nations signed the Cusco Declaration, a two-page statement of intent announcing the foundation of the South American Community. Panama and Mexico attended the signing ceremony as observers in Brazil.
The mechanics of the new entity came out of the First South American Community of Nations Heads of State Summit, which was held in Brasília on 29–30 September 2005. An important operating condition of UNASUR is that no new institutions will be created in the first phase, so as not to increase bureaucracy, and the community will use the existing institutions belonging to the previous trade blocs.
Heads of State of the then South American Community of Nations in Brasilia in September 2005.
Between the 15th and 19th centuries, the Spanish and Portuguese colonization brought about the establishment and development of colonial empires in the Americas that integrated politically, economically and culturally vast extensions of the continent each with their respective metropolis.
Since the Spanish American wars of independence a trend towards the political integration of the newly born republics of Hispanic America became strong in the thinking of several independence leaders, influenced in turn by the Spanish Enlightenment and the French and American revolutions. A notable early exponent of this trend was Francisco de Miranda, who envisioned a federated republic encompassing all of Hispanic America, which he called “Colombia”.
The independence war efforts saw the concurrence of integrated armies composed by Spanish Americans of diverse regions on both sides of the conflict (v.g. Patriots and Royalists), and fighting all over the territories of many future nations. For example, the Army of the Andes which was gathered in the United Provinces of the River Plate fought in Chile, Peru and Ecuador, and later integrated with Simón Bolívar’s Army (which itself included troops of future Venezuela, Colombia and Ecuador) to further fight in Peru and the Upper Peru.
By the 1820s, the main proponent of a federation of the newly born republics was Simón Bolívar, although this idea was shared by many notable contemporaries, including José de San Martín and Bernardo de Monteagudo, under either republican or constitutional monarchical governments. In 1826, Bolívar summoned a conference to be held in Panama, which was to be known as the “Amphictyonic” Congress of Panama because of the parallelism with the Hellenic Amphictyonic League. The Congress was attended by Gran Colombia (including present-day Colombia, Venezuela, Panama and Ecuador), the Federal Republic of Central America (including present-day Costa Rica, Nicaragua, El Salvador, Honduras and Guatemala), the United Mexican States, and Peru. The ostensible intention was to form a defensive league that could prevent foreign expansionism and foster the interests of the Spanish American republics. The Congress’ conclusions, however, were not ratified by the participants, except for Gran Colombia. Soon after, both Gran Colombia and the United Provinces of Central America fell apart and the whole of Hispanic America was balkanized by competing national governments.
By the 1990s, however, Brazil had consolidated as the most powerful country in South America (accounting for half of the regional GDP) and began to promote the notion of a united South America (a new regional framing) where Brasilia would be pivotal. The project did not take hold until the United States’ foreign policy priorities turned to other regions in the 2000s.
South American presidents gathered during an extraordinary meeting for the signing of the UNASUR Constitutive Treaty in May 2008 in Brasilia.
The complete integration between the Andean Community and the Mercosur nations was formalized during the meeting of South American heads of state that took place on 23 May 2008 in Brasília.
In the 2004 South American Summit, representatives of twelve South American nations signed the Cuzco Declaration, a two-page letter of intent announcing the establishment of the then-named “South American Community of Nations”. Panama and Mexico were present as observers. The leaders announced the intention of modeling the new community in the mold of the European Union, including a unified passport, a parliament and, eventually, a single currency. The then Secretary General of the Andean Community Allan Wagner speculated that an advanced union such as the EU should be possible within the next fifteen years.
After Argentina, Bolivia, Chile, Ecuador, Guyana, Peru, Suriname and Venezuela, Uruguay became the ninth nation to ratify the constitutive treaty of the organization on 1 December 2010, thus completing the minimum number of ratifications Necessary for the entry into force of the Treaty, on 11 March 2011 With the entry into force of the Treaty, UNASUR became a legal entity during the Summit Ministers of Foreign Affairs, in Mitad del Mundo, Ecuador, where the cornerstone was laid for the headquarters of the General Secretariat of the Union.
On 28 December 2005, Chilean former foreign minister Ignacio Walker proposed that the Union’s former designation, the South American Community of Nations, abbreviated as CSN, be changed to South American Union; nevertheless, many members responded that that proposal had already been rejected to prevent confusion since its acronym of U.S.A. (Spanish: Unión Sudamericana) would be easily confused for the United States of America. In the press, the phrase “United States of South America” was bandied about as an analogy to the United States to reflect the economic and political power that the union would have on the world stage.
The name was finally changed on 16 April 2007 to Union of South American Nations. The new name was jointly agreed by all member states during the first day of meeting at the First South American Energy Summit, held at Isla Margarita, Venezuela.
After Colombian Ernesto Samper completed his term as Secretary General in January 2017, the UNASUR governments have been unable to reach consensus on the organization’s future leadership. Venezuela, with the support of Bolivia and Suriname, has blocked the nomination of Argentine diplomat José Octavio Bordón.
In August 2017, six members of UNASUR—Argentina, Brazil, Chile, Colombia, Paraguay and Peru—joined in forming the Lima Group, a coalition of Western Hemisphere nations that repudiates the Venezuela government of Nicolás Maduro as antidemocratic. In February 2018, Maduro was disinvited from the Summit of the Americas hosted by Peru (held in Lima in April 2018). In response, Bolivia’s leftist president Evo Morales urged Unasur to defend Venezuela, stating “Unasur should call an emergency meeting and enforce the sovereignty of a brotherly people.” Morales acceded to the rotating role of president pro tempore of UNASUR on 17 April 2018.
On 20 April 2018, six countries—Argentina, Brazil, Chile, Colombia, Paraguay and Peru—announced that they would suspend their own membership for a year until the regional group became more organized. Chilean Foreign Minister Roberto Ampuero stated that the organization “isn’t getting anywhere, there is no integration” and that “We can’t be throwing this money to an institution that doesn’t work.” A briefing sent to the Brazilian cabinet stated that the countries share the view that Bolivia’s leadership of the block has been ineffective. Paraguayan Foreign Minister stated that his country’s objection concerned the failure to put a new Secretary General in place, and the need to make the organization less ideological, but did not reflect negatively on Bolivia’s leadership. Bolivian Foreign Minister Fernando Huanacuni called an emergency meeting for May 2018 to attempt to resolve the crisis.
On 28 August 2018, Colombian president Iván Duque announced that foreign minister Carlos Holmes had officially notified Unasur of their intention to leave the bloc within the next 6 months, denouncing it as an institution created by Hugo Chávez to sideline existing international treaties and referring to it as an accomplice to what they referred to as the dictatorship in Venezuela.
On 7 March 2019 Brazilian president Jair Bolsonaro announced that Brazil would withdraw from Unasur and join the newly created Prosur.
On 13 March 2019 Ecuadorian president Lenin Moreno announced that Ecuador would withdraw from Unasur and join the newly created Prosur. Moreno also asked the bloc to return the headquarters building of the organization, based in Quito.
The presidents of each member nation will have an annual meeting, which will be the top political mandate. The first meeting was held in Brasilia on 29 and 30 September 2005. The second meeting was held in Cochabamba, Bolivia, on 8 and 9 December 2006. The third meeting was held in Brasília – this meeting should have taken place in Cartagena (Colombia), but was postponed because of tension between Ecuador, Colombia and Venezuela. It was at this meeting that UNASUR was formalized and in which the Constitutive Treaty of the organization was signed.
The foreign ministers of each country will meet once every six months. They will make concrete proposals for action and executive decision. The Permanent Representative Committee of the President of Mercosur and the Director of the Mercosur Department, the Secretary General of the Andean Community, the Secretary General of ALADI and the Permanent Secretaries of any institution for regional cooperation and integration, Amazon Cooperation Treaty Organization, Among others, will also attend these meetings.
On 9 December 2005, the Strategic Reflection Commission on the South American Integration Process was created. It consists of 12 members, whose function is to elaborate proposals that will help in the process of integration among the South American nations. These proposals were to be made at the 2nd UNASUR Meeting (2006).
The South American Parliament will be located in Cochabamba, Bolivia, while the headquarters of its bank, the Bank of the South are located in Caracas, Venezuela.
The Executive Committee, created at the 2nd UNASUR Meeting, was transformed into the Political Commission or Council of Deputies, in accordance with the Decisions of the Political Dialogue. The text prepared by heads of state to form UNASUR was approved at the 3rd UNASUR Meeting in Brasília on 23 May 2008. This meeting was scheduled to take place in Cartagena de Indias, Colombia, on 24–28 January 2008, but was postponed because of tensions between Ecuador, Colombia and Venezuela.
Ernesto Samper, the most recent Secretary General.
A Secretary General is the legal representative of the Secretariat in Quito, Ecuador. Former Ecuadorian president Rodrigo Borja was nominated to this position but resigned a few days before the formation of the USAN in May 2008. On 4 May, Néstor Kirchner of Argentina was appointed as the first Secretary General, despite resistance from Colombia, Uruguay, and Peru. After the death of Néstor Kirchner in 2010, there was a period of time when the position went unfilled, which eventually ended when María Emma Mejía Vélez was elected in March 2011. After Ernesto Samper completed his term in January 2017, UNASUR members have been unable to come to consensus on a successor.
Evo Morales, was the most recent President of UNASUR.
The temporary presidency will be governed by a year and will be rotating among the member countries between each UNASUR meeting. According to the document “Decisions of the Political Dialogue”, which was signed during the 1st South American Energy Meeting, a permanent general cabinet will be created and headquartered in Quito, Ecuador.
There are twelve Ministerial Councils of the USAN.
Meeting of Ministers of Foreign Affairs of the members of Unasur.
The Economic and Financial Council of Unasur was established on 12 August 2011, in Buenos Aires, during a meeting of Finance Ministers and representatives of the Central Banks of the twelve countries of the region. Argentine Deputy Economy Minister Roberto Feletti said that the Council would study measures to strengthen regional trade in national currencies without the use of dollar. “We have reached an agreement on three axes of work and one of them is to move forward with multilateral payment mechanisms, to sustain trade and protect the volumes of reserves,” Feletti said, noting that trade between countries in the region moves 120 billion dollars Yearly. “The use of national currencies, excluding the dollar, protects reserves and increases trade because there are lower transaction rates.” He also detailed plans of the technical groups focused on the development and strengthening of Development Banks, such as the Andean Development Corporation (CAF) and the Bank of the South. He explained that the technicians will review the Latin American Reserve Fund (FLAR), aiming at in order to give greater capacity to intervene to the governments of the bloc in case of speculative attacks against currency or sovereign debt.
Flags of the member countries of UNASUR in front of the headquarters of the organization, in Ecuador.
The creation of a Council of South American Defense was proposed by Brazil and discussed for the first time at a summit of the South American presidents in April 2008. The project was extensively discussed throughout 2008. The then Brazilian Defense Minister, Nelson Jobim, said in April 2008 that the Council would be formed after the “political” decision of the presidents who participated in the launch of the Union of South American Nations (UNASUR) on 23 May 2008.
On 15 December 2008, at the extraordinary UNASUR summit, the creation of the South American Defense Council was finally approved. The defense ministers of Argentina, Brazil, Uruguay, Paraguay, Bolivia, Colombia, Ecuador, Peru, Chile, Guyana, Suriname and Venezuela. The Defense Council is responsible for developing joint defense policies, promoting the exchange of personnel among the Armed Forces of each country, conducting joint military exercises, participating in United Nations peace operations, promoting the exchange of analyzes on the world defense scenarios and the integration of industrial bases of military equipment.
The South American Council of Health is a UNASUR body established and approved on 16 December 2008, which brings together health ministers of the member states to develop regional programs in the region. Area of public health to be jointly financed by the South American bloc, to coordinate the energy policy of Unasur. It was created by decision of the Heads of State and Government of UNASUR, meeting extraordinarily in the Coast of Sauipe, Bahia, Brazil in December 2008. It was finally constituted on 21 April 2009 in Santiago, Chile.
It is a permanent council composed of Ministers from UNASUR member countries. This body was created in order to constitute a space of integration concerning health, incorporating efforts and improvements from other mechanisms of regional integration, such as MERCOSUR, ORAS CONHU and ACTO, to promote common policies and coordinated activities among member countries. It is also a consultation and consensus body concerning health, which intends to delve deeply into relevant themes and strengthen public policies aimed at improving the living conditions of the inhabitants of the South American continent.
Since health is an essential right to all human beings and all societies, and it is also a vital component for the development of mankind, the Health Council seeks political and social acceptance regarding the issue, proposing health to be seen as an important booster of cooperation and integration of the bloc’s nations, intensifying the coordination of such nations and respecting diversity and interculturalism in the region.
The Health Council aims to strengthen, by establishing a South American political institution with expertise in sanitary issues, the development of solutions to challenges that transcend national borders, developing values and mutual interests among the neighboring countries, thus facilitating the interaction of the Member States health authorities through the exchange of knowledge and technology in the region.
The South American Health Council (SHC) is composed of the Health Ministries of Unasur Member States. In order to achieve the Council’s goals, the Coordinating Committee – responsible for preparing propositions of Agreements and Resolutions – was created.
The Presidency of the Health Council is held by the Minister of Health of the country nominated for the Pro Tempore Presidency (PTP) of Unasur. It is in charge of coordinating the activities of all its bodies and managing the Technical Secretary. The Pro Tempore President has a two-year term that may be extended for another two years, being unconditionally succeeded by a president from a different country.
The South American Institute of Government in Health (ISAGS) of UNASUR is an intergovernmental entity of public character that has as main objective to promote the exchange, the critical reflection, the knowledge management and the generation of innovations in the field of Health policy and governance.
South American leaders during the Unasur 4th Summit, in Georgetown, Guyana.
Heads of State at the in Lima, in Peru.
An special UNASUR/BRICS leaders summit was held in Fortaleza, Brazil, in July 2014.
The 9th Summit, scheduled for April 23, 2016 in Quito, was canceled due to the Ecuador earthquake.
May 2010: Buenos Aires, Argentina. Election of Néstor Kirchner as Secretary General.
September 2010: Buenos Aires, Argentina. Discussion of the 2010 Ecuador crisis.
April 2013: Lima, Peru. Recognition of contested Venezuelan presidential elections results.
UNASUR countries has together 410 million inhabitants and a rate of population growth of about 0.6% per year. There are several demographics such as tropical forests, the Atacama Desert and the icy portions of Patagonia. On the other hand, the continent presents regions of high population density, such as the great urban centers. The population is formed by descendants of Europeans (mainly Spaniards, Portuguese and Italians), Africans and indigenous. There is a high percentage of mestizos that vary greatly in composition according to each place. There is also a minor population of Asians, especially in Brazil. The two main languages are by far Spanish and Portuguese, followed by French, English and Dutch in smaller numbers. Economically, Brazil, Argentina and Colombia are the wealthiest and most developed nations in the continent.
Portuguese, Spanish, English and Dutch are the official languages of UNASUR. Spanish is the official language of Uruguay, Bolivia and Venezuela. Dutch is the official language of Suriname; English is the official language of Guyana.
Indigenous languages of UNASUR include Wayuunaiki in northwestern Venezuela (Zulia) and Guaraní, Quechua and Aymara in Bolivia. At least three South American indigenous languages (Quechua, Aymara, and Guarani) are recognized along with Spanish as national languages.
Other languages found in UNASUR include, Hindustani and Javanese in Suriname; Italian in Uruguay and Venezuela. Arabic speakers, often of Lebanese, Syrian, or Palestinian descent, can be found in Arab communities in Venezuela.
An estimated 87% of South Americans are Christians (69% Roman Catholic, 18% other Christian denominations mainly Traditional Protestants and Evangelicals but also Orthodoxy), accounting for ca. 19% of Christians worldwide.
Due to the immigration of Indonesian workers, Suriname and Guyana have a large Hindu and Muslim community. Also Kardecist Spiritism can be found in several countries along with Afro-American religions.
Paraguaná Refinery Complex, considered the second largest and largest capacity in the world.
The highest nominal GDP in 2018 is Venezuela (62nd worldwide) with 96,328 billion dollars, followed by Uruguay (73rd worldwide) with 60,933 billion dollars, and Bolivia (92nd at the global level) with 41,833 billion dollars.
The highest GDP in 2018 is in Venezuela (52nd worldwide) with 330,984 billion dollars, Bolivia (88th worldwide) with 88,866 billion dollars, and Uruguay (91st Worldwide) with 82,641 billion dollars.
The highest GDP per capita in 2018 is held by Uruguay with US$22,445, followed by Suriname with 13,876 and Venezuela with 12,388. In terms of nominal per capita GDP, the ranking is headed by Uruguay with US$16,641, Venezuela with US$6,890, and Suriname with US$5,869.
Members of UNASUR and main regional highways.
One of the initiatives of Unasur is the creation of a common market, starting with the elimination of tariffs for products considered non-sensitive until 2014 and for sensitive products until 2019.
The Initiative for the Integration of the Regional Infrastructure of South America is currently underway, with investments estimated at US$38 billion from the Inter-American Development Bank, the Andean Development Corporation, the National Bank for Economic and Social Development and the Financial Fund for Development of the Plata Basin.
The initial integration plans through the infrastructure cooperation of UNASUR came with the construction of the Bioceanic Corridor and the Interoceanic Highway. The Pacific Highway, between Peru and Brazil, began to be built in September 2005, financed 60% by Brazil and 40% by Peru, and was completed in December 2010.
Presidents of the seven founding countries (Argentina, Bolivia, Brazil, Ecuador, Paraguay, Venezuela and Uruguay) officially launched the South American Bank in Buenos Aires in December 2007. The heads of all the founding countries were at the ceremony, with the exception of President Tabaré Vázquez of Uruguay. The capital will be US$7b, with Venezuela responsible for US$3b and Brazil US$2b. The headquarters will be located in Caracas with offices in Buenos Aires and La Paz.
The Bank of the South will finance economic development projects to improve local competitiveness and to promote the scientific and technological development of the member states. Its founding charter affirms that the bank will promote projects in a “stable and equal” manner and priorities will be oriented towards reinforcing South American integration, reducing asymmetries, and promoting an egalitarian distribution of investments.
The Brazilian Minister, Guido Mantega, stated that the bank is not similar to the International Monetary Fund; it will be a credit institution similar to the World Bank.
The Bank of the South (Portuguese: Banco do Sul, Spanish: Banco del Sur, Dutch: Bank van het Zuiden, English: Bank of the South) will establish monetary policy and finance development projects. One of the objectives of monetary union is to establish a Single South American currency. Support for the creation of this currency was provided in January 2007 by Peruvian President Alan García, and other South American authorities expressed themselves in favor, as Bolivian President Evo Morales in April of that year, who proposed that the currency Only one denominated “Pacha” (“earth” in Quechua language), however, except for the right of each country to suggest a name for the common currency.
Soldier of the Brazilian Army patrols the surroundings of the Summit of Heads of State of Unasur in 2008, held in Brasilia.
The South American Defense Council (CDS) was proposed by Venezuela and Brazil to serve as a mechanism for regional security, promoting military co-operation. From the beginning Brazil, Argentina and Chile, the countries that took the leadership of the project, made clear that they did not intend to form a NATO-like alliance, but a cooperative security arrangement, enhancing multilateral military cooperation, promoting confidence and security building measures and fostering defense industry exchange. Colombia initially refused to join the defense council due to the strong military ties it has with the United States through the Plan Colombia. However, after reviewing the proposal they decided to join on 20 July 2008.
Shortly following the signing by Colombia’s President, President of Chile Michelle Bachelet appointed a working group to investigate and draft a plan for the new council. Finally, on 10 March 2009, the 12 nation members held, in Chile, the first meeting of the newly formed council.
In mid-2010, UNASUR played a key role in mediating the 2010 Colombia–Venezuela diplomatic crisis. On 1 September 2010, the agency “UnasurHaití” was created to provide US$100 million in help to Haiti.
South American presidents in front of the Casa Rosada, Buenos Aires, during the bicentenary of the May Revolution.
Partial or total closure of land borders with the affected State, including suspension or limitation of trade, air and sea transportation, communications, energy supply, services and supply.
Visits by citizens of UNASUR to any other UNASUR member state of up to 90 days only require an identification document issued by the traveler’s country. In November 2006, Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Guyana, Paraguay, Peru, Suriname, and Uruguay agreed to abolish visa requirements for tourists between any of those nations.
Mercosur, along with its Associate members of Bolivia, Chile, Colombia and Ecuador established that their territories together form an “area of free residence with the right to work” to all its citizens, with no additional requirements other than nationality. The Free Movement and Residence Agreement was established in the Brasília summit based in a previous document signed on 6 December 2002.
Citizens of any Mercosur countries will have a simplified process in temporary residence visa of up to two years in any other member countries, with the requirements of a valid passport, birth certificate, and no criminal record. Temporary residence can become permanent if a licit means of living can be verified.
At a summit in Guayaquil, Ecuador on 4 December 2014, UNASUR general secretary Ernesto Samper announced, “We have approved the concept of South American citizenship,” including the creation of a single passport.
UNASUR intended to create electoral monitor teams that would replace the monitors from the Organization of American States.
Member states of the Andean Community trade bloc.
Member states of the Mercosur trade bloc.
Member states of neither Andean Community nor Mercosur.
Exclusive Economic Zones of the member states of the USAN. Considering them, the total area reaches the 29 884 548 km².
Isla Aves, a Venezuelan territory situated in the Antilles.
Aruba, Bonaire and Curaçao are parts of the Kingdom of the Netherlands near the Venezuelan coastline.
French Guiana, which is an overseas department of France and is therefore part of the European Union.
The Falkland Islands and South Georgia and the South Sandwich Islands, which are overseas territories of the United Kingdom and overseas countries and territories of the European Union; they are also claimed by Argentina.
Trinidad and Tobago, although not a member, this sovereign state had been a dependency of Great Britain and was invited to join the Union of South American Nations by President of Venezuela, Nicolas Maduro in July 2013.
^ Guardia (24 November 2016). “El secretario general de la Unasur lanza la campaña “Soy del Sur““.
^ “UNASUR Means Union of South American Nations, Hugo Chávez”. Mathaba News Agency. 18 April 2007. Archived from the original on 1 June 2015. Retrieved 25 February 2011.
^ a b c Goodman, Joshua (23 May 2008). “South American Presidents Agree to Form Unasur Bloc (Update3)”. Bloomberg. Retrieved 25 February 2011.
^ “Surface area (sq. km)”. World Development Indicators.
^ The World Factbook. The World Factbook.
^ a b c d World Economic Outlook Database, October 2018 edition.
^ “South America nations found union”. BBC News. 23 May 2008. Retrieved 23 May 2008.
^ a b “Uruguay Senate puts Unasur over the top”. Buenos Aires Herald. 30 November 2010. Retrieved 25 February 2011.
^ a b “Uruguay’s ratification gives Unasur legal status (nine out of twelve)”. MercoPress. 2 December 2010. Retrieved 25 February 2011.
^ “Six South American nations suspend membership of anti-U.S. bloc”. Reuters. 20 April 2018. Retrieved 4 October 2018.
^ “Colombia y cinco países más dejarán de participar en Unasur” [Colombia and five more countries will stop participating in Unasur]. El Tiempo (in Spanish). 21 April 2018. Retrieved 21 April 2018.
^ “Colombia y cinco países más dejarán de participar en Unasur” [Colombia will cease its membership in the Unasur]. CNN en Español (in Spanish). 8 August 2018. Retrieved 8 August 2018.
^ “Governo Bolsonaro enterra Unasul criada por Lula e adere a novo organismo regional” [Bolsonaro’s Government buries Unasul created by Lula and joins the new regional organization]. O Globo (in Portuguese). 7 March 2019. Retrieved 8 March 2019.
^ “Ecuador se retira de Unasur y abre la puerta a nuevas iniciativas de integración” [Ecuador withdraws from Unasur and opens the door to new integration initiatives]. El País (in Spanish). 14 March 2019. Retrieved 14 March 2019.
^ “South America creating regional bloc to counter Venezuela: Colombia”. Reuters. 14 January 2019. Retrieved 18 February 2019.
^ “Chile confirma cumbre de presidentes para crear foro sudamericano sin Venezuela”. El Comercia (in Spanish). 19 February 2019. Retrieved 19 February 2019.
^ “Tratado Constitutivo da Unasul”. Archived from the original on 27 July 2013.
^ “Sede da Unasul levará nome de Néstor Kirchner”. Terra. 9 March 2011.
^ Segun el chanceler uruguayo, Luis Almagro: Unasur, un factor de “estabilidad, democracia y paz” en la región. Abc, 2 de dezembro de 2010.
^ Duhalde, Eduardo (13 July 2004). “Hacia los Estados Unidos de Sudamérica.” La Nación.
^ Grorjovsky, Nestor (14 July 2004). “Duhalde señaló que el Mercosur es un paso para la Unión Sudamericana” Archived 5 February 2012 at the Wayback Machine Reconquista-Popular.
^ Collazo, Ariel (15 July 2004). “Los Estados Unidos de Sudamérica” La República.
^ 29 July 2004, interview with Mexican President Vicente Fox by Andrés Oppenheimer. Mexico:Presidencia de la República.
^ “Estados Unidos de Sudamérica” Herejías y silencios. (22 November 2005).
^ Duhalde, Eduardo (6 December 2004). “Sudamérica y un viejo sueño.” Clarín.
^ a b c “Argentina insta a Ecuador a solucionar crisis en UNASUR”. Vistazo (in Spanish). 2018-03-02. Retrieved 2018-03-21.
^ a b “Convocan a reunión de Unasur en mayo para intentar superar división”. MercoPress. 23 April 2018. Retrieved 2018-04-25.
^ “6 countries suspend membership in UNASUR regional bloc”. The Washington Post. 2018-04-21. ISSN 0190-8286. Archived from the original on 2018-04-21. Retrieved 2018-04-22.
^ Associated Press (23 April 2018). “UNASUR, posible signo de fracaso en integración regional”. chicagotribune.com. Retrieved 2018-04-25.
^ a b “Unasur under pressure: six nations, including Brazil and Argentina, suspend their memberships”. MercoPress. 21 April 2018. Retrieved 2018-04-25.
^ EFE (24 April 2018). “Paraguay ve necesario ‘redireccionar’ a Unasur”. www.eldeber.com.bo. Retrieved 2018-04-25.
^ “‘En seis meses, Colombia estará oficialmente fuera de Unasur’: Duque”. El Tiempo (in Spanish). 2018-08-28. Retrieved 2018-08-28.
^ “Iván Duque: Nos retiramos de la Unasur por no denunciar crisis en Venezuela”. El Nacional (in Spanish). 2018-08-28. Retrieved 2018-08-28.
^ “Governo Bolsonaro enterra Unasul criada por Lula e adere a novo organismo regional”. O Globo (in Portuguese). 2019-03-07. Retrieved 2019-04-09.
^ España, Sara (2019-03-14). “Ecuador se retira de Unasur y abre la puerta a nuevas iniciativas de integración”. El País (in Spanish). ISSN 1134-6582. Retrieved 2019-04-09.
^ Entrada em vigor do Tratado Constitutivo da UNASUL Archived 1 February 2012 at the Wayback Machine. . Access in 14 February 2014.
^ “Reunião Extraordinária do Conselho de Ministras e Ministros das Relações Exteriores da UNASUL”. . 12 March 2014. Retrieved 5 December 2014.
^ “Brasil e Chile reafirmam aposta na integração sul-americana”. UOL. 30 May 2006. Retrieved 5 December 2014.
^ “Ernesto Samper, secretario de Unasur, se despide de Ecuador”. El Comercio (in Spanish). 31 January 2017. Retrieved 2018-03-22.
^ “Presidency Pro Tempore”. Unasul. Retrieved 5 December 2014.
^ “Eumednet”. www.eumed.net. Archived from the original on 31 May 2012. Retrieved 28 March 2018.
^ Ministros da Unasul querem ampliar comércio sem dólar. Estadão, 12 de agosto de 2011.
^ “Conselho de defesa não prevê ação militar em conflitos, diz Jobim”. BBC Brasil. 15 April 2008. Retirado em 15 de abril de 2008.
^ a b “Unasul aprova criação do Conselho Sul-americano de Defesa”. G1. 16 December 2008. Retrieved 5 December 2014.
^ “Cúpula aprova criação do Conselho de Defesa Sul-Americano”. Agência Brasil. 16 December 2008.
^ “Quatro cúpulas de presidentes latino-americanos reúnem-se esta semana na Bahia”. Agência Brasil. 14 December 2008.
^ “Chefes de Estado sul-americanos se encontram hoje, em Brasília, para uma reunião de cúpula extraordinária da União de Nações Sul-americanas – Unasul”. Agência Brasil. 23 May 2008. Archived from the original on 12 October 2008.
^ “Unasul aprova criação do Conselho Sul-Americano de Defesa – 16/12/2008 – UOL Últimas Notícias – Internacional”. noticias.uol.com.br.
^ “ISAGS – South American Institute of Governance in Health”.
^ “Sobre o ISAGS”. ISAGS. Archived from the original on 10 December 2014. Retrieved 25 January 2018.
^ “Presidentes de Unasur llegan a Chile para tratar crisis boliviana”. Emol.com. 15 September 2008. Retrieved 5 December 2014.
^ “Unasur da su más irrestricto apoyo a Gobierno de Evo Morales”. Emol.com. 15 September 2008. Retrieved 5 December 2014.
^ “Unasur suspende su reunión en Quito” [Unasur suspends meeting in Quito]. Deutsche Welle (in Spanish). 20 April 2016. Retrieved 30 January 2019.
^ “Cumbre de Unasur acordó anoche en Lima respaldar al electo Nicolás Maduro” (in Spanish). La República. 19 April 2013. Retrieved 6 May 2013.
^ “The Languages spoken in Guyana”. Studylands. Retrieved 2016-04-12.
^ Karam, John Tofik (2013). “On the Trail and Trial of a Palestinian Diaspora: Mapping South America in the Arab–Israeli Conflict, 1967–1972”. Journal of Latin American Studies. 45 (4): 751–777. doi:10.1017/S0022216X13001156.
^ “Christians”. 18 December 2012.
^ “UNASUL: Uma grande nação!”. Superior Tribunal de Justiça. Archived from the original on 7 February 2015. Retrieved 7 February 2015.
^ a b “Iniciativa para a Integração da Infraestrutura Regional Sul-Americana (IIRSA)”. Ministério da Integração Nacional. Retrieved 5 December 2014.
^ “South American leaders sign agreement creating South Bank”. MercoPress. 27 September 2009. Retrieved 27 September 2009.
^ “Venezuela summit criticises West”. BBC News. 27 September 2009. Retrieved 27 September 2009.
^ Peruvian president calls for single currency in South America. People’s Daily Online (17/01/07). Retirado em 22 de setembro de 2007.
^ Evo propõe criação de moeda única para a Unasul Archived 16 November 2016 at the Wayback Machine. Retirado em 21 de Janeiro de 2008.
^ “Uribe anuncia que Colombia ingresará al Consejo de Seguridad de Suramérica (Unasur)”. El Economista (in Spanish). 20 July 2008. Retrieved 25 February 2011.
^ “Colombia refuses to join regional defense council”. People’s Daily Online. 24 May 2008. Retrieved 25 February 2011.
^ “The Paradox of South American Integration: The Founding of a Defense Council”. Council on Hemispheric Affairs. 12 March 2009. Retrieved 25 February 2011.
^ “La Unasur ya tiene oficina en Haití”. Página/12 (in Spanish). 1 September 2010. Retrieved 25 February 2011.
^ Protocolo Adicional ao Tratado Constitutivo da Unasul sobre Compromisso com a Democracia Archived 30 June 2012 at the Wayback Machine.
^ a b c “Protocolo adicional Tratado Constitutivo UNASUL compromisso democracia”. Unasul. 26 November 2010. Archived from the original on 20 February 2015. Retrieved 6 December 2014.
^ S American 12 cut travel red tape, BBC News (November 25, 2006).
^ “UNASUR Moves toward Continental Freedom of Movement, Venezuela Makes “Equality” Call”. 5 December 2014.
^ Main, Alex. “Obama in Cartagena: No change, dwindling hope”. www.aljazeera.com.
^ “Historia”. Secretary General of UNASUR. Archived from the original on 9 July 2013. Retrieved 12 July 2013.
^ “Falkland Islands government – organisation”. Archived from the original on 16 May 2008. Retrieved 24 May 2008.
^ Foundation, Internet Memory. “[ARCHIVED CONTENT] Internet Memory – PRONI Web Archive”. webarchive.proni.gov.uk. Archived from the original on 7 March 2009.
^ See Sovereignty of the Falkland Islands and Sovereignty of South Georgia and the South Sandwich Islands.
^ Johnlall, Raphael (18 July 2013). “Venezuela President Maduro talked energy, transport while in T&T”. Trinidad and Tobago Guardian. Guardian Media. Retrieved 29 September 2013. Apart from Mercosur, Maduro also invited T&T to be “incorporated” into Union of South American Nations (Unasur) because of its geographical proximity to the South American mainland (11 Kilometres).” Maduro said.
^ “Working papers” (PDF). cadmus.eui.eu. | 2019-04-20T00:21:39Z | http://yowlink.com/?rdp_we_resource=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FUnion_of_South_American_Nations |
Vaccination of domestic ruminants is considered to be an effective strategy for protecting these animals against Rift Valley fever (RVF), but available vaccines have limitations. Therefore, the aim of this study was to determine the safety and immunogenicity of RVF virus (RVFV) mutagenesis passage 12 (MP-12) and arMP-12ΔNSm21/384 vaccine candidates in goats (Capra aegagrus hircus) in Tanzania. Goats were vaccinated intramuscularly with RVFV MP-12 or arMP-12ΔNSm21/384, and then on Day 87 post-vaccination (PV) all animals were revaccinated using the RVFV MP-12 vaccine candidate. Serum samples were collected from the animals before and after vaccination at various intervals to test for RVFV using a Vero cell culture assay and reverse transcription polymerase chain reaction and for RVFV-neutralising antibody using a plaque reduction neutralisation assay. Serum samples collected before vaccination on Days -14 and 0, and on Days 3, 4 and 5 PV were negative for RVFV and neutralising antibody. All animals remained healthy, and viremia was not detected in any of the animals. Rift Valley fever virus antibody was first detected on Day 5 PV at a 1:10 dilution in five of five animals vaccinated with the MP-12 vaccine and in five of eight animals vaccinated with arMP-12ΔNSm21/384. Titres then increased and were sustained at 1:40 to 1:640 through to Day 87 PV. All animals that were revaccinated on Day 87 PV with MP-12 developed antibody titres ranging from 1:160 to as high as 1:10 240 on Days 14 and 21 PV. Although the antibody titres for goats vaccinated with RVF MP-12 were slightly higher than titres elicited by the arMP-12ΔNSm21/384 vaccine, these findings demonstrated that both vaccines are promising candidates for the prevention of RVF among Tansanian goats.
Rift Valley fever (RVF) is an important zoonotic disease in Africa and the Arabian Peninsula affecting both humans and animals, especially domestic ruminants (Balkhy & Memish 2003; Pepin et al. 2010). The disease is caused by the RVF virus (RVFV), a negative single-stranded RNA virus that belongs to the order Bunyavirales, family Phenuiviridae, genus Phlebovirus (Rima et al. 2017). The disease in animals is characterised by fever, ocular and nasal discharge, bloody diarrhoea, abortion storms in gestating ewes and 90% – 100% mortality in newborn lambs. In humans, the disease causes self-limiting febrile illness, but in about 1% – 2% of cases clinical symptoms progress to neurological disorder, vision loss, haemorrhagic fever and even death (Madani et al. 2003). The disease was first identified during an epizootic and epidemic among sheep and humans on a farm in 1931 in the Rift Valley of Kenya (Munyua et al. 2010). Subsequent outbreaks have been reported from numerous countries throughout Africa and the Arabian Peninsula. Outbreaks in East African countries usually occur following heavy rainfall that results in an increase in the abundance of mosquito vectors. In Tanzania, outbreaks occur every 5–15 years with low-level transmission of RVFV between outbreaks (Sumaye et al. 2013; Woods et al. 2002). The first outbreak in Tanzania was documented in 1977 and the most recent one occurred during 2006–2007 (Anyamba et al. 2010; Jost et al. 2010). In contrast to the most recent outbreak that affected humans and livestock in 52.4% of the regions in Tanzania, previous outbreaks only affected livestock primarily in the northern parts of the country (Faburay et al. 2017).
As a result of the devastating impact of RVF on human and animal health in Tanzania and other RVFV-enzootic countries, several vaccines have been developed, and some are currently being used in an attempt to prevent this disease among livestock in Africa (Faburay et al. 2017). Vaccines offer the most promising control and prevention strategy for RVF because they can afford protection by inducing humoral and cell-mediated immune responses, as well as by enabling vaccinated animals to transfer colostrum that contains maternally acquired antibody to their offspring. (Dar et al. 2013; Labeaud, Kazura & King 2010; Morrill et al. 1987; Morrill, Mebus & Peters 1997a; Niklasson, Meadows & Peters 1984; Pepin et al. 2010). Therefore, a safe and efficacious vaccine that produces a rapid humoral response and long-term protective immunity could prevent human and animal disease and save economic resources in an outbreak situation (Morrill et al. 2013b). However, the currently used RVF vaccines have not had a significant impact on the prevention of RVF in livestock, and approved vaccines are not available for human use (Morrill & Peters 2003). Some of the promising RVF vaccine candidates being evaluated include the mutagenesis passage 12 (MP-12) vaccine and a recombinant candidate vaccine derived from MP-12, referred to as arMP-12ΔNSm21/384 (Caplen, Peters & Bishop 1985; Saluzzo & Smith 1990; Won et al. 2007). Rift Valley fever MP-12 is a live attenuated mutagenised vaccine that was developed from a virulent Egyptian RVFV strain, ZH548, by 12 serial passages in human foetal lung fibroblast (MRC-5) cells in the presence of 5-flourouracil. As a result, mutations were induced in the large, medium and small RNA segments resulting in attenuation of the virus through amino acid changes (Vialat et al. 1997). Although the MP-12 vaccine candidate was found to be safe and immunogenic in human volunteers, efforts to develop RVF MP-12 vaccine for human use were suspended because of other priorities (Ikegami & Makino 2009; Pittman et al. 2016a, 2016b). Moreover, extensive testing of the MP-12 vaccine found it to be safe and immunogenic in small laboratory animals, non-human primates, as well as in sheep and cattle (Bird et al. 2009; Morrill et al. 1987, 1991, 1997b, Morrill & Peters 2011). As a potential veterinary vaccine, MP-12 was not considered to be a promising candidate because it does not have biomarkers to distinguish naturally infected animals from vaccinated animals (DIVA). Therefore, reverse genetic technology was used to develop a recombinant vaccine (arMP-12ΔNSm21/384) that has nucleotides 21–384 deleted from the non-structural regions of the M segment to serve as a potential DIVA vaccine (Ikegami et al. 2006; Kalveram et al. 2011; Won et al. 2007).
Safety and immunogenicity studies conducted in the USA demonstrated that the arMP-12ΔNSm21/384 candidate vaccine was safe and immunogenic in sheep and calves using doses ranging from 1 × 103 through 1 × 105 plaque forming units (PFU) and was non-abortigenic and non-teratogenic in pregnant ewes vaccinated during the early gestation period (Morrill et al. 2013a, 2013b). Moreover, sheep vaccinated with this vaccine and then challenged with a virulent strain of RVFV were protected during experimental studies in Canada (Weingartl et al. 2014). Although MP-12 and arMP-12ΔNSm21/384 vaccine candidates have been shown to be safe and efficacious in sheep and calves in the United States (US), and the arMP-12ΔNSm21/384 vaccine in sheep in Canada, studies have not been conducted to assess the safety and immunogenicity of these vaccines in these target species or in goats in an RVFV-enzootic African country such as Tanzania. Therefore, the aim of this study was to assess safety and immunogenicity of MP-12 and arMP-12ΔNSm21/384 vaccine candidates in goats (Capra aegagru hircus) in Tanzania.
Animal experiments were conducted in an insect-proof animal biosafety level 2 (ABSL-2) facility and laboratory testing of blood samples from the animals was performed in a biosafety level 2 (BSL-2) virology laboratory located at Sokoine University of Agriculture (SUA), Morogoro, Tanzania. The Morogoro district is located at latitude 6°49’S and 37°39’E with an elevation peak at 1200 m above sea level. It is bordered by seven regions: Tanga and Manyara to the north; Ruvuma, Iringa and Njombe to the south; the Coastal Region to the east; and Dodoma to the west. It has a total of eight districts, namely, Kilosa, Mvomero, Ulanga, Gairo, Kilombero, Morogoro Rural and Morogoro District.
Healthy C. aegagrus hircus goats 6–9 months old were used in this study. A total of 15 animals were purchased from local vendors in the Mvomero District of the Morogoro Region of Tanzania and housed in the SUA ABSL-2 facility. Prior to entering the facility, all animals were sprayed with Steladone® 300 emulsifiable concentrate (EC) acaricide to remove and prevent introduction of ectoparasites. In addition, all animals were treated orally with 4 mL of 2.5% albendazole for possible parasites. The animals were individually identified using numbered ear tags and acclimatised in the facility for 2 weeks before use in the experiments. All 15 animals were housed in the same room of the facility. Throughout the experiment, all animals were given fresh grass three times a day, supplemented with maize bran, a mineral block and water ad libitum, and were observed daily for elevated body temperature as a possible indication of illness.
The Vero E6 cells used in this study were kindly provided by the University of Texas at El Paso (UTEP), Texas, US. Aliquots of 1.0 mL in freeze-dried form of the arMP-12ΔNSm21/384 vaccine (Lot No. 15/3/2017) were provided by the Multi-chemical Industry (MCI) Santé Animale Biopharmaceutical Company in Mohammedia, Morocco. The identity of arMP-12ΔNSm21/384 virus was confirmed at MCI using a qualitative real-time polymerase chain reaction assay (Nfon et al. 2012) targeting the L and M viral RNA segments (Morrill & Peters 2011; Njenga et al. 2015) followed by sequencing at the GENEWIZ laboratories (GENEWIZ Global Headquarters; US) using next generation sequencing technology (Illumina method: 1 × 50 bp single read HiSeq2500, High Output, per lane [V4 chemistry]). The infectivity titre of the arMP-12ΔNSm21/384 vaccine virus was 105.5 tissue culture infectious dose 50% (TCID50/mL in Vero E6 cells. The MP-12 virus was originally obtained by UTEP from the World Reference Centre for Emerging Viruses and Arboviruses, Department of Microbiology and Immunology, University of Texas Medical Branch, Galveston, Texas, USA. At UTEP, the identity of the MP-12 vaccine virus was confirmed using the plaque reduction neutralisation test (PRNT) and a RVFV MP-12-specific monoclonal antibody (Mab). The Mab neutralised the infectivity titre of the MP-12 virus from 106.0 PFU/mL to 102.0 PFU/mL but did not neutralise the infectivity titre of Sindbis and/or West Nile viruses. A virus stock of RVF MP-12 was prepared at UTEP with an infectivity titre of 1.4 × 107.0 PFU/mL in Vero E6 cells and was stored in 0.5 mL aliquots at −80°C. Of this stock, 10 aliquots were provided to the SUA virology laboratory to prepare working virus stocks to support this study. At SUA, a working stock of the MP-12 virus was prepared in Vero E6 cells with an infectivity titre of 1 × 107.0 PFU/mL.
The goats used in this study were divided into three groups: five animals for vaccination with MP-12, eight for arMP-12ΔNSm21/384 and two animals for negative controls. Each freeze-dried vial of arMP-12ΔNSm21/384 was reconstituted in 2 mL of Eagle’s minimum essential medium (EMEM) containing 4% foetal bovine serum (FBS) (Thermo Fisher Scientific, Carlsbad, CA, USA). Each reconstituted vial contained 1 × 105.0 PFU/mL of the arMP-12ΔNSm21/384 virus. The MP-12 vaccine virus was diluted in EMEM to yield a concentration of 1 × 105.0 PFU/mL from the initial concentration of 1.4 × 107.0 PFU/mL. One millilitre of each virus was loaded into separate 5 mL syringes in a class IIA2 biosafety cabinet (NuAire, Plymouth, MN, USA) and transported in a cool box on ice to the ABSL-2 animal facility. An 18-gauge needle was attached to each of the 5 mL syringes and the animals were vaccinated intramuscularly (IM) in the neck area with 1 mL per animal. The two control animals were vaccinated likewise with 1 mL of EMEM containing 4% FBS.
Blood samples (4 mL) were collected from the jugular vein of each manually restrained goat using a 6 mL vacutainer tube. Serum (2 mL – 3 mL) was obtained from each of the animal blood samples after leaving the samples overnight at 4 °C followed by centrifugation at 1200 g for 10 minutes. Aliquots of 0.5 mL – 1.0 mL of each serum sample were transferred to sterile prelabelled vials and stored at −80 °C in an ultra-low temperature freezer until tested for RVFV and/or RVFV-neutralising antibody. Serum samples were collected 14 days before vaccination, as well as on Day 0 immediately before vaccination, and were tested for RVFV using a Vero E6 cell culture assay and for RVFV antibody using the PRNT. Samples obtained on Days 3, 4 and 5 were also tested for RVFV using the same cell culture assay; thereafter, samples obtained on Days 7, 14, 21, 28, 35, 70, 84 and 87 post-vaccination (PV) were tested to determine the neutralising antibody response using the PRNT. On Day 87 PV, all goats including the two EMEM control animals were revaccinated with 1 mL of 1 × 104.0 PFU/mL of the MP-12 vaccine. All animals were observed for signs of illness and each week rectal temperatures were recorded. Blood samples were obtained on Days 7, 14 and 21 following revaccination to determine the neutralising antibody response using the PRNT, as described below.
Prior to performing the RVF reverse transcription polymerase chain reaction (RT-PCR) assay, RNA was extracted from serum samples collected from goats on Day 14 before vaccination, on Day 0 of vaccination and on Days 3, 4, and 5 PV following the manufacturer’s instructions using the Siam® Viral RNA Mini Kit (QIAGEN, Hilden, Germany). Sera samples were pooled in groups of two, and MP-12 virus positive and negative control samples were included during RNA extraction. After extraction, RNA was stored at −80 °C.
The QIAGEN One-Step RT-PCR Kit was used to test RNA samples for RVFV RNA. Primers targeting the M segment (551 bp) – RVF forward 5’TGT GAA CAA TAG GCA TTG G’3 and RVF reverse 3’GAC TAC CAG TCA GCT CAT TAC 5’ (Ibrahim et al. 1997) – were used at a concentration of 0.1 µM. Mutagenesis passage 12 viral RNA was used as a positive control, and master mix (buffer) was used as a negative control in the RT-PCR assay. Thermocycler conditions were as follows: Initial cDNA synthesis at 50 °C for 30 min, PCR activation at 95 °C for 30 min, followed by 40 cycles at 95 °C for 30 seconds, 58 °C for 1 min and 72 °C for 2 min, then final extension at 72 °C for 10 min. The PCR amplicons, together with Hi-Lo™ DNA Marker (Bionexus, Inc. Oakland, CA, USA), were loaded and separated on a 1.5% agarose gel (stained with 10 µl of gel red) using electrophoresis at 120 volts/20 cm for 45 min and visualised using a UV-transilluminators.
The sera samples obtained from goats on Day 14 before vaccination and on Day 0 of vaccination and samples obtained on Days 3, 4 and 5 PV were diluted 1:2 in EMEM supplemented with 4% FBS. Confluent monolayers of Vero E6 cells were propagated in 24-well plates, and each culture was inoculated in duplicate with 50 µL of each serum sample. The cultures and inoculums were incubated for 1 h at 37 °C and agitated every 15 min to facilitate virus absorption. After absorption, 0.5 mL of EMEM supplemented with 4% FBS was added to each culture and incubation was continued at 37 °C with 5% CO2. Cultures were observed once daily for 10 days using an inverted microscope for cytopathic effect (CPE). After 10 days, all CPE-negative cultures were frozen, thawed and then passaged blindly in Vero E6 cells using the same procedure; they were again observed once daily for 10 days for CPE. Any cultures that developed CPE were harvested and stored in aliquots of 1.0 mL for further study using RT-PCR to determine if the CPE was caused by RVFV. If there was evidence of RVFV, all aliquots and any remaining cultures were destroyed by heating in an autoclave at 44.4 °C because of biosafety concern requirements that RVFV as a select agent must be kept in a BSL-3-plus laboratory.
All animals used in the vaccine trials were kept isolated and quarantined in a holding facility separate from the ABSL-2 facility, and if confirmed to be infected with RVFV they were not used any further in this study.
Serum samples collected from the goats on Days 5, 7, 14, 21, 28, 35, 70, 84 and 87 PV and on Days 7, 14 and 21 PV following revaccination were tested for RVFV-neutralising antibody. Each serum sample was diluted 1:5 initially, followed by fourfold dilutions through 1:5120 in Hanks’ balanced salt solution supplemented with 1% HEPES (4-(2-hydroxyethyl)-1-piperazineethanesulfonic acid), penicillin and streptomycin and heat-inactivated FBS in a 96-well plate (Thermo Fisher Scientific). Each diluted test sera (75 µL) was mixed with an equal volume of virus suspension containing approximately 60–80 RVFV PFUs. As a result, the final sera dilutions were 1:10, 1:40, 1:160, 1:640, 1:2560 and 1:10 240, containing virus ranging from 30 PFU to 40 PFU. The controls consisted of a mixture of an equal volume of 60–80 RVFV PFU with a 1:10 dilution of RVFV-positive antibody and a RVFV-negative antibody goat serum. The virus–serum dilution mixtures were incubated at 37 °C in the absence of CO2 for 1 hour. Next, Vero E6 cells were seeded in 24-well tissue culture plates and incubated for 4–5 days at 37 °C and 5% CO2 to provide 90% confluent monolayers. The growth media was then discarded from the Vero E6 cell monolayers and 50 µL of each virus–serum dilution mixture was inoculated onto each of two wells of cell monolayers per sample. The virus positive antibody control serum mixtures were inoculated onto each of 20 culture wells and the virus-negative antibody control serum mixture was inoculated onto each of culture wells. Cultures and inocula were incubated for 1 h at 37 °C and 5% CO2 with agitation every 15 min. SeaKem agarose (1%) with an equal volume of 2x Eagle’s basal medium with Earle’s salt (EBME), HEPES, sodium bicarbonate, 8% FBS and 1% penicillin, streptomycin and L-glutamine (Thermo Fisher Scientific) was then prepared, and 0.5 mL was overlaid onto each cell culture. The agarose overlay was allowed to solidify and then the cultures were incubated for 2 days at 37 °C and 5% CO2. Each culture was then overlaid with 0.5 mL 1% agarose mixed with an equal volume of 2x EBME supplemented with 5% neutral red (Thermo Fisher Scientific) and incubated overnight at 37 °C. The plaque forming units were counted and the dilution of serum that reduced the RVF MP-12 virus dose by 80% was considered as the neutralising antibody titre.
Rectal body temperatures were recorded for each animal at the time of blood collection up to Day 35 PV. In addition, their general health status was assessed by veterinary personnel once a day and recorded. Animals that developed any sign of illness during the study were given a clinical examination by a veterinarian and samples were collected for analysis and diagnosis.
Data analysis was performed using R statistical analysis software version 3.4.1. Analysis of the difference in antibody responses between goats vaccinated with the MP-12 or arMP-12ΔNSm21/384 vaccines during the first vaccination and after MP-12 boosting were performed using the Welch two-sample t-test with a significance level of p ≤ 0.05.
The animal experiment was performed according to an experimental protocol reviewed and approved by the UTEP, El Paso, Texas, and the SUA IACUC (Institutional Animal Care and Use Committee) (ref # 559105-08 and SUA/CMVBS/R.1, respectively).
The rectal body temperatures of all animals before vaccination with MP-12 or arMP-12ΔNSm21/384 ranged from 38.2 °C to 38.5 °C. On Day 1 after vaccination, the temperatures of all vaccinated animals had increased to 39.0 °C, and the control animals had a temperature of 40.0 °C. On Day 2 PV and thereafter throughout the study, the temperatures of the animals ranged from 37.0 °C to 38.5 °C, including the control animals, and all animals remained healthy throughout the study (Figure 1).
FIGURE 1: Mean rectal body temperatures of goats (Capra aegagrus hircus) vaccinated with Rift Valley fever MP-12 and arMP-12ΔNSm21/384 vaccines.
Serum samples obtained from all goats 14 days before vaccination and on Day 0 immediately prior to vaccination with the MP-12 or arMP-12ΔNSm21/384 vaccine were negative for RVFV RNA as indicated using RT-PCR and RVFV isolation attempts in Vero E6 cells. Also, RVFV was not detected in any of the sera samples obtained on Days 0, 3, 4 and 5 PV, nor from blind passage in Vero E6 cells. Therefore, there was no detectable viremia in the goats as a result of IM vaccination with MP-12 or MP-12-NSm-del vaccines.
All goats vaccinated with MP-12 or arMP-12ΔNSm21/384 developed neutralising antibodies; however, the two control animals inoculated with only EMEM supplemented with 4% FBS did not produce neutralising antibodies (Table 1). On Day 5 PV, all five animals vaccinated with MP-12 had neutralising antibody titres of 1:10. On Day 14 PV, three animals had neutralising titres of 1:40 and two had titres of 1:160. The antibody titres increased until Day 28 and were either sustained or decreased through to Day 87 PV, when all animals were revaccinated with 1 mL each of 1 × 104 PFU/mL of the MP-12 vaccine virus. The humoral immune response in these revaccinated animals was characterised by a rapid increase in neutralising antibody titres to peak titres of 1:640 on Day 7 PV in all animals; on Day 14 titres ranged from 1:640 to 1:10 240 and on Day 21 PV from 1:2560 to 1:10 240 (Table 1).
TABLE 1: Rift Valley fever neutralising antibody titres in goats (Capra aegagrus hircus) vaccinated with 1 × 105.0 plaque forming unit (PFU)/mL of Rift Valley fever MP-12 and arMP-12ΔNSm21/384 vaccine candidates and revaccinated with 1 × 104.0 PFU/mL of MP-12 on Day 87 post-vaccination.
In arMP-12ΔNSm21/384 vaccinated goats, five of eight animals had neutralising antibody with titres of 1:10 on Day 5 PV, and by Day 7 PV all animals had antibody titres ranging from 1:10 to 1:160. Antibody titres remained relatively constant until Day 28, and by Day 35 a slight increase was observed in titres that were as high as 1:640 in two animals. Antibody titres then ranged from 1:40 to 1:160 until Day 87 PV. After revaccination of all animals with the MP-12 vaccine on Day 87 PV, antibody titres increased, ranging from 1:160 to 1:640 on Days 7 and 14 PV, and from 1:160 to 1:2560 on Day 21 PV. The antibody titres for the two EMEM control animals vaccinated with MP-12 and arMP-12ΔNSm21/384 were 1:10 and 1:40 on Day 7 PV, increasing to 1:160 for both animals by Day 21 PV, thus in line with the titres observed for the animals initially vaccinated with MP-12 or arMP-12ΔNSm21/384 vaccines (Table 1).
There was no significant difference in the antibody responses between goats vaccinated with MP-12 and those vaccinated with the arMP-12ΔNSm21/384 vaccine (p = 0.10) during the first vaccination. However, the antibody titres for the goats that were revaccinated was significantly higher for the animals that received the MP-12 vaccine than for those that received the arMP-12ΔNSm21/384 vaccine (p = 0.03).
The results of this study indicated that the RVF MP-12 and arMP-12ΔNSm21/384 vaccine candidates elicited neutralising antibody in goats following vaccination using the IM route. Except for slightly elevated temperature of 39 °C to 40 °C on Day 1 PV, all animals maintained normal body parameters such as appetite, well-being and normal rectal temperatures ranging between 37 °C and 38 °C. The transient, slightly elevated temperatures on Day 1 PV in all animals, including the negative control animals, suggested that this observation was not related to the vaccines. The most likely reason was stress caused by manual handling of the animals during vaccination. Other virulent RVFV infection-related symptoms such as haemorrhage, diarrhoea, nasal and ocular discharge were not observed during the entire PV period. There was no evidence of virus shedding as the control animals remained negative, while being confined in the same pens with the vaccinated animals. However, further studies are needed to exclude the possibility of shedding and/or spread of the vaccine virus, including experiments designed to evaluate viral shedding in excreta, such as nasal and ocular swabs, or testing for the potential spread to highly susceptible species, such as younger or immunocompromised animals.
The RVF Smithburn and clone 13 vaccines, which are the more commonly used vaccines in Africa, especially the Smithburn vaccine, warrant concern because of a link to foetal malformations, stillbirths and abortions during the first trimester of gestation (Botros et al. 2006). Moreover, experimental studies showed that clone 13 had a potential teratogenic effect among pregnant sheep (Makoschey et al. 2016). Although this study did not assess the safety of the vaccines in pregnant goats, our preliminary results showed that both the MP-12 and arMP-12ΔNSm21/384 vaccines were safe and the antibody titres induced were considered to be high enough to protect African goats against RVFV infection. The potential protective efficacy based on antibody titres is supported by the results of a study that showed antibody titres in sheep of approximately 1:100 following vaccination with arMP-12ΔNSm21/384 vaccine were protective against challenge with a virulent strain of RVFV (Weingartl et al. 2014). Moreover, studies involving the parent MP-12 vaccine revealed that antibody titres ranging from 1:10 to 1:20 in hamsters and 1:20 in rhesus macaques afforded protection against challenge with a virulent strain of RVFV (Morrill & Peters 2011; Niklasson et al. 1984 1984).
All five goats vaccinated with MP-12 and five of eight vaccinated with arMP-12ΔNSm21/384 developed detectable neutralising antibodies by Day 5 PV, demonstrating that the vaccines elicited a rapid humoral immune response comparable to results reported for sheep inoculated with a similar dose of arMP-12ΔNSm21/384 vaccine (Morrill et al. 2013a). Moreover, the results were similar to those observed for pregnant sheep vaccinated with RVF MP-12 vaccine that developed detectable neutralising antibody from Days 5 to 7 PV (Morrill et al. 1991).
Goats vaccinated with the MP-12 vaccine developed neutralising antibodies with peak titres between 1:160 and 1:640 by Day 35 PV, which were either sustained or decreased through Day 87 PV prior to being revaccinated with the same vaccine. The rapid antibody immune response inducement and overall in increasing pattern of antibody titres suggested that the vaccine may possibly protect animals, even if administered after the onset of a RVF outbreak, as reported previously (Bird et al. 2008). In our study, a robust antibody response was observed in all goats starting from Day 7 after revaccination with the MP-12 vaccine. The antibody titres increased from 1:640 to 1:10 240 by Day 21 post-revaccination, thus suggesting that the vaccine may afford protection to animals exposed to virulent RVFV in the field.
A steady increase in neutralising antibody titres was observed in goats following vaccination with arMP-12ΔNSm21/384, with peak titres measured on Day 35 PV ranging from 1:40 to 1:640. These results demonstrated that the deletion of the non-structural region of the medium viral RNA segment (NSm) did not affect immunogenicity and that the vaccine activated B-cells and dendritic cells for initiation of antibody development. Following revaccination with the MP-12 vaccine, all goats elicited a rapid humoral immune response, and antibody titres were significantly higher than when the animals were first vaccinated, thus further demonstrating the potential of the vaccine to elicit strong immune responses in the field, if the vaccinated animals were exposed to virulent RVFV.
The antibody responses of goats following single vaccination with MP-12 or arMP-12ΔNSm21/384 did not differ significantly (p = 0.10), and therefore the arMP-12ΔNSm21/384, with its potential for use as a DIVA marker vaccine, could have an advantage over the MP-12 vaccine. The results were comparable to those reported for studies conducted in sheep and calves in the USA following vaccination with MP-12 and arMP-12ΔNSm21/348 (Morrill et al. 1987, 1991, 1997b, 2013a, 2013b), in which animals developed detectable neutralising antibody by Day 7 PV with a titre of 1:20. In this study, neutralising antibody were detected in most goats vaccinated with either vaccine on Day 5 PV with titres of 1:10 and in all goats on Day 7 with titres ranging from 1:10 to 1:160, slightly higher than titres reported for sheep in the USA study. The observation that sheep vaccinated with arMP-12ΔNSm21/384 developed antibody titres that were comparable to those observed for goats in this study are an indication that these animals should also be protected following challenge with virulent RVFV (Weingartl et al. 2014).
Overall, the antibody titres for goats in this study, following vaccinations with MP-12 or the arMP-12ΔNSm21/384 vaccine candidate, were slightly lower than titres observed for sheep during a study in Canada and sheep and cattle inoculated with these vaccines in the USA (Morrill et al. 1987, 1991, 1997b, 2013a, 2013b; Weingartl et al. 2014). However, the titres were comparable to those reported for goats, sheep and cattle vaccinated with RVF clone 13, despite the difference in laboratory testing procedures (Daouam et al. 2015; Dungu et al. 2010). Comparison of antibody titres among different animal species and involving different laboratories must consider possible differences in genetics, age, nutritional and health status, environment and vaccination, as well as laboratory testing procedures. Susceptibility differences may also contribute to variations among animal species in their ability to elicit immune responses to RVFV infection. For example, goats were reported to be more resistant to developing RVF disease than sheep, attributed in part to a lower and shorter viremia (Nfon et al. 2012). Therefore, the reduced amount of antigen produced in goats following vaccination, as opposed to sheep, may have resulted in a lesser amount of the vaccine virus being available to stimulate B cell secretion of antibody and may therefore have elicited a lower immune response in goats. While differences were observed in antibody titres elicited in goats vaccinated with either of the vaccines, the more critical criteria and promising feature regarding the assessment of the potential value of the MP-12 and arMP-12ΔNSm21/384 vaccines was the fact that the antibody responses were consistent with moderate and predictive protective titres. The importance of this observation is that numerous studies in the USA and Africa have demonstrated that antibodies are crucial for protection of animals against infection with RVFV (Dungu et al. 2010; Niklasson et al. 1984; Morrill & Peters 2003; Njenga et al. 2015; Pepin et al. 2010).
The results of this study revealed that both the MP-12 and arMP-12ΔNSm21/384 candidate vaccines elicited the production of antibody titres to levels that could possibly afford protection to goats without inducing adverse post-vaccinal reactions. Thus, both vaccines are safe and should prove efficacious towards affording protection to this target species (goats) against virulent wild-type RVFV infection.
Other studies in progress to further evaluate the safety and immunogenicity of MP-12 and arMP-12ΔNSm21/384 in goats and sheep, as well as evaluating other routes of vaccination, such as the intradermal and intranasal routes, will provide a better understanding of the overall safety and efficacy of the candidate vaccines for use in target domestic ruminant species of RVFV in Africa.
The authors would like to express their sincere appreciation to the research team under the Feed the Future Innovation Laboratory for Rift Valley Fever control in Agriculture from Sokoine University of Agriculture (SUA) and the University of Texas at El Paso (UTEP) for their high level of cooperation throughout the study. The authors thank Dr Mhando Anthony, Peter Marwa and Shida Mkuya for their technical assistance, including handling and maintaining the animals throughout the study and a special thanks to the Multi-chemical industry (MCI) Santé Animale Biopharmaceutical Company in Mohammedia, Morocco for providing the RVFV arMP-12ΔNSm21/384 vaccine. The authors also thank Ms Linda Salekwa for her technical advice and support throughout the study and the SUA Institutional Animal Care and Use Committee (IACUC) for their oversight during this study.
The authors, D.M.W., G.E.B., P.W., M.M., and S.B. conceived and designed the experiments. The experiments were performed by S.B., E.A., J.M., E.A., L.M., and M.M., and the same authors participated in the acquisition, analysis, and interpretation of the data of the work. The authors, S.B., E.A., P.P., D.M.W., P.W., G.E.B., M.M., and J.M. prepared the manuscript. All authors participated in the revision of the manuscript, and agreed to be accountable for all aspects of the work and approved the final version this manuscript.
This study was funded under a subcontract from the University of Texas at El Paso (UTEP), Texas who was awarded funding by United Stated Agency for International Development (USAID) under Feed the Future Innovation Laboratory for Rift Valley Fever Control in Agriculture, Cooperative Agreement AID-OAA-A-13-00084 FTF-Rift Valley Fever Vaccine.
The contents are the responsibility of Sokoine University of Agriculture and UTEP and do not necessarily reflect the views of USAID or the United States Government.
Daouam, S., Ghzal, F., Ae, A., Naouli, Y., Jazouli, M., Mm, E. et al., 2015, ‘Vaccines & vaccination evaluation of the safety and efficacy of a live attenuated thermostable Rift Valley fever vaccine in sheep, goats and cattle’, Journal of Vaccines & Vaccination 6, 295.
Morrill, J.C., Jennings, G.B., Caplen, H., Turell, M.J., Johnson, A.J. & Peters, C.J., 1987, ‘Pathogenicity and immunogenicity of a mutagen-attenuated Rift Valley fever virus immunogen in pregnant ewes’, American Journal of Veterinary Research 48, 1042–1047.
Morrill, J.C., Mebus, C.A. & Peters C.J., 1997a, ‘Safety of a mutagen-attenuated Rift valley fever virus vaccine in fetal and neonatal bovids’, American Journal of Veterinary Research 58, 1110–1114.
Morrill, J.C., Mebus, C.A. & Peters C.J., 1997, ‘Safety and efficacy of a mutagen-attenuated Rift Valley fever virus vaccine in cattle’, American Journal of Veterinary Research 58, 1104–1109.
Morrill, J.C. & Peters, C.J., 2003, ‘Pathogenicity and neurovirulence of a mutagen-attenuated Rift Valley fever vaccine in rhesus monkeys’, Vaccine 21, 2994–3002.
Niklasson, B.S., Meadors G.F. & Peters C.J., 1984, ‘Active and passive immunization against Rift Valley fever virus infection in Syrian hamsters’, Acta Pathologica, Microbiologica, et Immunologica Scandinavica. Section C 92, 197–200.
Pittman, P.R., Norris, S.L., Brown, E.S., Ranadive, M.V., Schibly, B.A., Bettinger, G.E. et al., 2016a, ‘Rift Valley fever MP-12 vaccine Phase 2 clinical trial: Safety, immunogenicity, and genetic characterization of virus isolates’, Vaccine 34, 523–530.
Sumaye, R.D., Geubbels, E., Mbeyela, E. & Berkvens, D., 2013, ‘Inter-epidemic transmission of Rift Valley fever in livestock in the Kilombero River Valley, Tanzania: A cross-sectional survey’, PLoS Neglected Tropical Diseases 7(8), e2356. | 2019-04-26T11:45:33Z | https://ojvr.org/index.php/ojvr/article/view/1683/1841 |
A feeder for dispensing feed to livestock includes a trough and a hopper mounted above the trough. The hopper includes a sidewall, a bottom, a central feed discharge hole through the bottom, and a plurality of gravity flow feed openings arranged around the central feed discharge hole. A deflector is mounted in the hopper above and vertically spaced from the hopper bottom to cover the central feed discharge hole to restrict gravity flow of feed from the hopper through the central feed discharge hole. A sweep member is mounted for rotation about a vertical axis for sweeping feed under the deflector to the central feed discharge hole for discharge into the trough. A closure system is associated with the gravity flow feed openings to automatically close the gravity flow feed openings once animals start moving the sweep member to sweep feed to the central feed discharge hole.
PCT International Search Report dated Oct. 1, 2015 for PCT/US2015/035689. cited by applicant .
PCT Written Opinion of the International Searching Authority dated Oct. 1, 2015 for PCT/US2015/035689. cited by applicant .
Supplemental European Search Report, Application No. EP 15 80 7460, date of EP Communication dated Nov. 8, 2017. cited by applicant.
Attorney, Agent or Firm: Thompson; Jeffrey L. Thompson & Thompson, P.A.
This application claims priority of U.S. Provisional Application No. 62/012,036 filed on Jun. 13, 2014. The content of this prior application is incorporated herein by reference.
1. A feeder for dispensing feed to livestock, comprising: a trough; a hopper mounted above said trough, said hopper including a sidewall, a bottom, a central feed discharge hole through said bottom, and at least one gravity flow feed opening through said bottom, said gravity flow feed opening being located between said central feed discharge hole and said sidewall; a deflector mounted in said hopper above said hopper bottom and vertically spaced from said hopper bottom, said deflector covering said central feed discharge hole to restrict gravity flow of feed from said hopper through said central feed discharge hole; a sweep member mounted for rotation about a vertical axis, said sweep member being located between said deflector and said hopper bottom for sweeping feed to said central feed discharge hole to discharge therethrough into said trough; and a closure system associated with said gravity flow feed opening, said closure system having a first condition in which said gravity flow feed opening is open to allow gravity feed flow through said opening into said trough, and a second condition in which said gravity flow feed opening is closed; wherein said closure system is a flip door hinged to an underside of the hopper bottom.
2. A feeder for dispensing feed to livestock, comprising: a trough; a hopper mounted above said trough, said hopper including a sidewall, a bottom, a central feed discharge hole through said bottom, and at least one gravity flow feed opening through said bottom, said gravity flow feed opening being located between said central feed discharge hole and said sidewall; a deflector mounted in said hopper above said hopper bottom and vertically spaced from said hopper bottom, said deflector covering said central feed discharge hole to restrict gravity flow of feed from said hopper through said central feed discharge hole; a sweep member mounted for rotation about a vertical axis, said sweep member being located between said deflector and said hopper bottom for sweeping feed to said central feed discharge hole to discharge therethrough into said trough; and a closure system associated with said gravity flow feed opening, said closure system having a first condition in which said gravity flow feed opening is open to allow gravity feed flow through said opening into said trough, and a second condition in which said gravity flow feed opening is closed; wherein said at least one gravity flow feed opening comprises a plurality of openings in said hopper bottom that are spaced in a circular pattern surrounding an outer periphery of said deflector as viewed in plan view; wherein said closure system comprises a plurality of slide doors, each slide door having a first position in which a respective gravity flow feed opening is open and a second position in which the respective gravity flow feed opening is closed by the slide door; wherein said sweep member is operably coupled with a feed wheel disposed below said hopper in said trough so that animal-induced rotation of said feed wheel in said trough causes rotation of said sweep member in said hopper for sweeping feed to said central feed discharge hole for discharge into said trough; further comprising an activator mechanism associated with said feed wheel that is arranged to cause said slide doors to move from said first positions to said second positions upon rotation of said feed wheel; and wherein said activator mechanism comprises an activator pin attached to the feed wheel, said activator pin being arranged to contact said slide doors and force the slide doors radially outwardly from said first positions to said second positions upon rotation of said feed wheel.
3. The feeder according to claim 2, wherein said feed wheel comprises a hub mounted to an axle for rotation about said vertical axis, and a plurality of spokes extending radially outwardly from said hub, and said activator pin extends upwardly from one of said spokes.
4. A feeder for dispensing feed to livestock, comprising: a hopper having a sidewall, a bottom, a central feed discharge hole through said bottom, and a plurality of gravity flow feed openings through said bottom, said gravity flow feed openings being arranged around said central feed discharge hole; a deflector mounted in said hopper above and vertically spaced from said hopper bottom, said deflector covering said central feed discharge hole to restrict gravity flow of feed from said hopper through said central feed discharge hole; a sweep member mounted for rotation about a vertical axis, said sweep member being located between said deflector and said hopper bottom for sweeping feed to said central feed discharge hole to discharge therethrough; and a closure system associated with said gravity flow feed openings, said closure system having a first condition in which said gravity flow feed openings are open to allow gravity feed flow through said openings, and a second condition in which said gravity flow feed openings are closed; wherein said closure system comprises a flip door hinged to an underside of the hopper bottom.
5. A feeder for dispensing feed to livestock, comprising: a hopper having a sidewall, a bottom, a central feed discharge hole through said bottom, and a plurality of gravity flow feed openings through said bottom, said gravity flow feed openings being arranged around said central feed discharge hole; a deflector mounted in said hopper above and vertically spaced from said hopper bottom, said deflector covering said central feed discharge hole to restrict gravity flow of feed from said hopper through said central feed discharge hole; a sweep member mounted for rotation about a vertical axis, said sweep member being located between said deflector and said hopper bottom for sweeping feed to said central feed discharge hole to discharge therethrough; and a closure system associated with said gravity flow feed openings, said closure system having a first condition in which said gravity flow feed openings are open to allow gravity feed flow through said openings, and a second condition in which said gravity flow feed openings are closed; wherein said gravity flow feed openings are spaced in a circular pattern surrounding an outer periphery of said deflector as viewed in plan view; wherein said closure system comprises a plurality of slide doors, each slide door having a first position in which a respective gravity flow feed opening is open and a second position in which the respective gravity flow feed opening is closed by the slide door; wherein said sweep member is operably coupled with a feed wheel disposed below said hopper in said trough so that animal-induced rotation of said feed wheel in said trough causes rotation of said sweep member in said hopper for sweeping feed to said central feed discharge hole for discharge into said trough; further comprising an activator mechanism associated with said feed wheel that is arranged to cause said slide doors to move from said first positions to said second positions upon rotation of said feed wheel; and wherein said activator mechanism comprises an activator pin attached to the feed wheel, said activator pin being arranged to contact said slide doors and force the slide doors radially outwardly from said first positions to said second positions upon rotation of said feed wheel.
6. The feeder according to claim 5, wherein said feed wheel comprises a hub mounted to an axle for rotation about said vertical axis, and a plurality of spokes extending radially outwardly from said hub, and said activator pin extends upwardly from one of said spokes.
The present invention relates generally to livestock feeders. In particular, the present invention relates to a livestock feeder that can be used as a gravity flow feeder for small animals, and as a mechanical rotary feeder for larger animals.
The method of raising pigs has changed significantly over the past 40 years. Prior to the large pork production units of today, pigs were raised on the many small family farms that populated the United States of America. These small pig raising farms were diversified with many types of animals which allowed the farms to raise their own grain and grind some of that grain into feed for the farm animals. The animals included on most farms were chickens, cows, beef animals, and pigs. This diversification ensured that everything on the farm had a use and most waste materials were consumed by one type of animal on the farm. The farm animals typically lived in small outdoor sheds and occasionally in pens with other types of farm animals.
Over the years, these diversified farms began to change into specialized farms. Many began to cut down on the number of different animals raised in lieu of larger numbers of the same type of animals. Some farms selected cattle, some selected chickens, and still others chose swine. Most of the changes depended on the producer's interests, resources, and animal facilities. In the 1970's the trend in the pork industry was to increase the number of breeding female pigs on the farm and place the birthing pigs (farrowing) into buildings where the animal care could be more centrally provided. The baby pigs were then moved outside to grow until they were taken to market. More changes in the pork industry continued the following years. Eventually pigs were moved into buildings designed and ventilated for their specific age.
There are four types of buildings commonly used in the production of pork. The first type of building is the Breeding/Gestation building where the female pigs are bred and allowed to grow during the gestation period. The gestation period of a pig is typically three months, three weeks, and three days.
When the gestation cycle is completed, the female pigs are moved to the second building type. This building is used for birthing, or more commonly known as farrowing, of the females. This second building type is known as the Farrowing building. The female pigs (gilts/sows) are placed into a stall that prevents movements during farrowing and protects the baby pigs from being crushed to death as a result of the mother laying on them. The time between farrowing and weaning the baby pig is typically 21-28 days depending on the producer. The baby pigs will begin eating small amounts of dry solid feed during this lactation period. The feed is usually placed on a flat tray or a small self feeder.
The baby pigs are weaned from the mother at approximately 21-28 days of age. The mother (sow) is returned to the Breeding/Gestation building while the baby pigs are moved to the third type of building known as the Nursery. The nursery pig will typically be approximately 4.5-7.0 kg in weight at weaning and will be placed into larger pens with several other baby pigs from different mothers. These nursery pigs are fed solid feed through the use of small feeders that are filled with a specialized type of feed that matches their digestive development. There are usually three different formulations of feed provided to the nursery pigs as they grow to about 16-22 kg.
When the nursery pigs reach the desired weight, they are moved to the fourth type of building known as the Finishing building. The nursery pigs will remain in finishing pens from their entry weight of 16-22 kg to the market weight which is approximately 127 kg. The length of time for a nursery pig to reach market weight depends on many factors. Some of these factors include the quality of feed, the proper phase in which different feeds are introduced, building ventilation, water supply, disease, equipment, and animal handling techniques. Each of these factors has growth consequences when problems arise and the result is usually seen in the days it takes for a nursery pig to reach market weight.
Animal handling techniques and animal movements from one building to another create stress in nursery pigs that result in slower growth. The animal stress can also cause sickness, lack of appetite, and general disorientation which compounds the delay in animal growth and development. Special care must be taken when handling animals to prevent these effects from occurring.
Pork production in the 1990's saw further changes in the way swine were raised. Farms grew even larger and became known as farrow-to-finish farms. However, since the farms were becoming much larger with increasing animal population on each farm, major concerns about diseases arose. The concern was that since there was a large population of swine in a concentrated area, if a disease outbreak occurred, it could quickly doom the entire swine population. The solution to the disease concern was to begin separating the animal population and place them in different geographical locations that provided a single type of growth management. Therefore, the farms were separated into Breeding/Gestation/Farrowing farms (Sow Farms), Nursery farms, and Finishing farms all located at different geographical sites. This became known as three-site production.
The three-site production arrangement created a different problem. Baby pigs must be transported from the Sow Farm to a Nursery site and when the appropriate animal weight is reached the nursery pigs are moved to the Finishing site. Sometimes these sites are many kilometers apart and the transportation time and conditions (weather, trailer design, temperature, etc.) create much animal stress. The result of the animal stress is poor growth for a certain period of time until the pigs settle down and become acclimated to their new surroundings.
Three-site production continued to be used until the early 2000's when the Nursery and Finishing sites were combined to form what is known as Wean-to-Finish farms. The change to Wean-to-Finish farms reduced the number of production sites from three to two and reduces the animal stress as a result of the animal handling and movement. This Wean-to-Finish process allowed producers to place their Breeding/Gestation/Farrowing site, known as a Sow Farm, in mild climates while placing the Wean-to-Finish farms in geographically located sites that are close to the production of feed grains. These geographical areas in the United States are typically in Iowa, Illinois, and Indiana where corn production is greatest. The reason for locating Wean-to-Finish farms in corn producing areas is to reduce the amount of transportation costs associated with moving feed.
Feed consumption of swine is very significant, especially as the pig approaches market weight. The feed costs are approximately 70% of the cost to produce pork. Any reduction in feed costs directly impacts the profitability of a pork producer. Likewise, the faster the weaned pigs grow to market weight, the better the growth efficiency is of the operation. Therefore, both feed costs and animal growth are the most important factors in a profitable pork operation.
The amount of feed that a growing pig requires is significantly increased as the animal approaches market weight. However, the feed efficiency of a pig decreases as it grows resulting in increased feed consumption with less animal weight gain. The larger the pig grows, the more it eats, but less of the feed consumed is turned into marketable meat weight.
Another aspect of a growing pig is that the pig becomes more and more interested in rooting, or playing, with anything that moves. This is a natural instinct for swine. They forage for food at ground level and will use their massive strength to move obstacles that are in the way. When eating, pigs usually sort the main feed component from the dirt and chaff by blowing and rooting. Therefore, if there is a large pile of feed available, a pig will scatter the feed and trample most of it in an effort to locate the best feed materials.
The design of feeders used in providing feed for growing pigs is very important when considering the factors presented earlier. The traditional pig feeder is designed where bulk feed is stored in a hopper above some outlet openings located in the feed trough. As the feed is removed from around the opening, additional feed flows from the hopper to fill the space where the feed has been removed. Gravity is the mechanism that causes this feed to flow from the hopper to the feed trough. This traditional pig feeder has become known as a gravity flow feeder. Therefore, the gravity flow design allows feed to always be present when the pig enters the feed trough area. The amount of feed flowing from the feed hopper to the feed trough is regulated by adjusting a slide gate that covers the opening in the feed trough. When the pigs are small, the opening will be large, allowing more feed to be presented to the pigs. As the pigs grow, the adjustment gate is closed to restrict the feed flow from becoming too great and allowing the pig to sort and waste the feed. Timing of this feed adjustment is crucial and often difficult to maintain.
FIGS. 8 to 10 show a typical gravity flow feeder 100. This type of feeder 100 has a feed hopper 101 that is connected directly to the feed trough 102 through an opening 103 at the base of the feed hopper 101. The feed flow through the gravity flow feeder 100 is shown in the cross section view of FIG. 10. The feed is stored in the feed hopper 101 and flows out of the bottom into the feed trough 102. The feed flows through feed adjustment doors 104 that restrict feed flow into the feed trough 102. The gravity flow system works very well when animals are small and do not consume much feed, but as the animals grow, the feed adjustment doors 104 must be closed to prevent excess feed from flowing from the feed hopper 101 into the feed trough 102. Any excess feed will be wasted by larger animals as a result of the animal's natural rooting and sorting behavior. Therefore, when the feed adjustment doors 104 are closed and restrict feed flow, the animal's become hungrier, more aggressive, and do not grow as intended. The typical gravity flow feeder works very well for small animals, but has serious performance deficiencies as the animals grow larger and stronger.
Osborne Industries, Inc. recognized the importance of hog feeder design and developed a mechanical rotary feeder known in the industry as the Big Wheel.RTM. Feeder (U.S. Pat. No. 6,199,511) to overcome the two primary factors outlined earlier. The Big Wheel.RTM. Feeder operated on a mechanical flow principal where the pig's natural rooting instinct is utilized to operate the feeder. Since the feeder is round in design and has a rotary feed wheel that transports the feed from the feed hopper to the feed trough, it constantly mixes all the feed in the trough, so that sorting and feed wasting is minimized. The Big Wheel.RTM. Feeder only requires a one-time adjustment to accommodate the type of feed quality and coarseness of feed grind, so that the feed flows properly through the feeder's mechanical delivery system.
Mechanical rotary feeders have been manufactured in several different sizes to fit the size of pig being raised. Nursery feeders and finishing feeders were designed to meet the needs of the respective pig size and weight. This rotary feed delivery became the feeder of choice for pork producers in the 1990's, owing to its substantial reduction of feed waste and improved feed efficiency. The use of gravity flow type feeders decreased as feed costs increased and producers strived to reduce the number of days it takes to raise a baby pig to a market sized pig.
The current swine production process (sow farms and wean-to-finish farms), which has been described earlier, has caused several problems for the design, operation, and upkeep of pig feeders. The three-site production process benefited greatly from the mechanical rotary feeder design invention. However, as the production process has been changed to Sow Farms and Wean-to-Finish farms, problems with pig feeders has been placed back into focus.
The primary problem is designing a pig feeder that is a one-size-fits-all solution. The pig feeder design must feed growing pigs from wean size (4.5-7.0 kg) to finish size (127-130 kg) while meeting durability, ease of use, reduction of feed waste, and optimal feed delivery requirements. The two types of pig feeders each have their strengths and weaknesses in meeting these requirements.
The gravity flow feeder design is optimal in the starting of weaned pigs because the feed is always present in the feed trough and there is no action or movement required by the baby pig. However, as the baby pig grows, the gravity flow feeder design is quickly overwhelmed with the behavior of a growing pig and adjusting the feed flow becomes a significant challenge. The feed flow adjustment is critical to provide enough feed to enhance growth, but not so much that waste occurs. There is a very fine line in making this adjustment and normally the adjustments are not appropriately made, resulting in either under-nourished pigs or excessive feed waste. The amount of feed wasted by growing animals is very costly and creates waste management challenges. Many Wean-to-Finish farms have hired personnel to travel from farm to farm to make these timely adjustments, however, disease concerns and lack of skilled personnel are preventing best practice procedures from being fully executed.
Mechanical rotary feeders are optimal on the larger growing side of the finishing pig owing to the pig's natural behavior, superior feed flow control (auto regulating), and consistent feed mixing to reduce sorting and fouling of feed.
The major disadvantage of the mechanical rotary feeder design is that the feeder design requires the pig to be of sufficient weight and size to move or operate the feed wheel which mechanically moves feed from the feed hopper to the feed trough. If the feed wheel is not moved, no feed will be delivered to the feed trough and the result will be under-nourished pigs. This is why the mechanical rotary feeder design was constructed to match the animal size and weight. It is possible to use a small mechanical Rotary feeder designed for baby pigs weighing approximately 7 kg and feed the larger growing pigs weighing 50-100 kg. However, the feed trough size will eventually be too small to accommodate the head size of the growing pig (100 kg and above), and the feed hopper capacity will be less than required to feed the number of pigs that may be eating.
If a mechanical rotary feeder designed for finishing pigs (minimum pig starting weight 20 kg) is used to start the weaned pig at a weight of 7.0 kg, the weaned pig will have insufficient strength to move the feed wheel and dispense feed into the feed trough. Since the smaller weaned pigs are unable to operate the larger mechanical rotary feeder, they will be under-nourished to the point of death, if no other attention is provided.
There is a need in the industry for an improved livestock feeder that can be used in a wean-to-finish swine operation.
The present invention corrects the above condition and allows the larger mechanical rotary feeder design to be modified into a gravity flow type feeder at the beginning of use and automatically adjusts to a mechanical rotary feeder to meet the needs of the larger finishing pig. The present invention provides direct openings at the bottom of the feed hopper which have slide gates to close off the opening. The closure of the slide gate is the result of the feed wheel movement which is required for the mechanical rotary feeder design to work properly.
The present invention is designed such that when weaned pigs, weighing approximately 7.0 kg, are placed into a pen with the larger mechanical rotary feeder, the openings will allow feed to gravity flow out of the feed hopper and directly into the feed trough. The openings will be sized so that enough feed is allowed to gravity flow into the feed trough to nourish the weaned pigs, but not enough to allow for wasting or fouling. As the weaned pigs grow, the supply of feed from the openings will be overcome and the pigs will begin rooting the feed wheel to gain access to the feed that is around the feed wheel. When the feed wheel moves, a pin located near the feed wheel center contacts the slide gates and causes them to close off the openings. The movement of the feed wheel will then cause feed to flow from the feed hopper to the feed trough resulting in a fully mechanical flow feeder.
When the pigs reach market size and are removed from the feed pen, the feed pens are cleaned, and the feeders are emptied and prepared for another pen of weaned pigs. The slide gates over the openings located at the bottom of the feeder hopper will be pushed back open by the cleaning personnel and the feeder is set for another round of growing pigs.
According to one aspect of the present invention, a feeder for dispensing feed to livestock is provided, comprising: a trough; a hopper mounted above the trough, the hopper including a sidewall, a bottom, a central feed discharge hole through the bottom, and at least one gravity flow feed opening through the bottom, the gravity flow feed opening being located between the central feed discharge hole and the sidewall; a deflector mounted in the hopper above the hopper bottom and vertically spaced from the hopper bottom, the deflector covering the central feed discharge hole to restrict gravity flow of feed from the hopper through the central feed discharge hole; a sweep member mounted for rotation about a vertical axis, the sweep member being located between the deflector and the hopper bottom for sweeping feed to the central feed discharge hole to discharge therethrough into the trough; and a closure system associated with the gravity flow feed opening, the closure system having a first condition in which the gravity flow feed opening is open to allow gravity feed flow through the opening into the trough, and a second condition in which the gravity flow feed opening is closed.
According to another aspect of the present invention, a feeder for dispensing feed to livestock is provided, comprising: a trough; a hopper mounted above the trough; a gravity flow feed system having at least one gravity flow feed opening for allowing feed to flow by gravity from the hopper into the trough; a mechanical rotary feed flow system having a feed discharge hole and an animal-activated sweep member for sweeping feed from the hopper into the feed discharge hole for discharge into the trough; and a closure system associated with the gravity flow feed system, the closure system having a first condition in which the gravity flow feed opening is open to allow gravity feed flow through the opening, and a second condition in which the gravity flow feed opening is closed, and an activator mechanism arranged to move with the sweep member to cause the closure system to change from its first condition into its second condition.
Numerous other objects of the present invention will be apparent to those skilled in this art from the following description wherein there is shown and described an embodiment of the present invention, simply by way of illustration of one of the modes best suited to carry out the invention. As will be realized, the invention is capable of other different embodiments, and its several details are capable of modification in various obvious aspects without departing from the invention. Accordingly, the drawings and description should be regarded as illustrative in nature and not restrictive.
FIG. 1 is a perspective view of a rotary livestock feeder according to the present invention.
FIG. 2 is an exploded perspective view of the rotary livestock feeder shown in FIG. 1.
FIG. 3a is a perspective bottom view of a feed hopper of the rotary livestock feeder.
FIG. 3b is a partially exploded perspective view of the rotary livestock feeder, showing the feed hopper separated from the trough cage.
FIG. 4 is an exploded perspective view of the lower portion of the hopper, a closure system associated with the gravity flow feed openings, and the upper portion of the trough cage.
FIG. 5 is a cross section elevation view of the rotary livestock feeder showing the normal mechanical feed flow of the feeder.
FIG. 6 is a cross section elevation view of the rotary livestock feeder showing the gravity feed flow when the gravity flow feed openings are open.
FIG. 7 is another cross section elevation view of the rotary livestock feeder showing an alternate embodiment in which flip doors are used instead of sliding doors to close the gravity flow feed openings.
FIG. 8 illustrates a conventional gravity flow feeder.
FIG. 9 is an elevation view of the gravity flow feeder shown in FIG. 8.
FIG. 10 is a cross section view taken along line A-A in FIG. 9 to show the feed flow through the feeder.
A rotary livestock feeder 10 for dispensing feed to livestock according to the present invention will now be described in detail with reference to FIGS. 1 to 7 of the drawings.
Conventional parts of the rotary livestock feeder 10 are illustrated in FIG. 1. The feeder 10 includes a trough 11, a hopper 12 mounted above the trough 11, a feed wheel 13 disposed below the hopper 12 in the trough 11, and a cage 14 connecting the hopper 12 to the trough 11. The feed wheel 13 has a plurality of spokes 15 extending radially outwardly from a hub 16, and the hub 16 rotates around a central vertical axis when animals push against the spokes 15. This type of rotary feeder (without the gravity flow feature of the present invention described below) was developed in the 1980s as means to control the feed flow from the feed hopper 12 into the trough 11. The rotary design with the feed wheel 13 in the trough 11 allowed the feeder 10 to use the natural rooting and sorting behavior of swine to operate and clean the feed trough 11.
FIG. 2 shows the components that are assembled together to comprise the rotary feeder 10 of the present invention. The hopper 12 includes a top portion 17 attached to a bottom portion 18. The top portion 17 of the hopper 12 has a generally cylindrical sidewall, and the bottom portion 18 of the hopper has a frustoconical sidewall that tapers downwardly and inwardly. The hopper 12 provides an area 19 where the feed is placed in storage prior to being dispensed by gravity flow or mechanical movement into the trough 11.
The bottom 20 of the hopper 12 has a central feed discharge hole 21 where the feed exits from the feed hopper 12 into the trough 11. Inside of the bottom portion 18 of the hopper 12 are a feed cone 22 and feed cone support 23 that is suspended above the central feed discharge hole 21 located in the hopper bottom 20. The feed cone support 23 is concentric with a central axle 24 to ensure central alignment above the central feed discharge hole 21. The feed cone 22 functions as a deflector vertically spaced above the bottom 20 of the hopper 12 that covers the central feed discharge hole 21 and restricts or prevents feed from flowing to the central feed discharge hole 21 due solely to gravity.
Beneath the feed cone 22 is a feed sweep member 25. The feed sweep member 25 is operably coupled with the center tube 26 of the feed wheel 13 for rotation together with the feed wheel 13. The feed wheel 13 is located concentric to the axle 24 and rests on the plate 27 connected to the axle. A feed wheel washer 28 is inserted between the feed wheel 13 and the axle plate 27. The feed wheel washer 28 provides the clearance necessary to prevent the feed wheel 13 from dragging on the trough 11. The axle 24 is attached to the center square location 29 of the trough 11. The feed hopper bottom 20 is connected to the trough 11 through the use of the trough cage 14. The trough cage 14 provides circumferentially arranged areas where the animals can access the feed in the trough 11.
The mechanical operation of the rotary feeder 10 is achieved by the animal's natural instinct of rooting and sorting of feed stuff. The animal enters the feeding area created by the trough cage 14 and eats the feed located in the trough 11. As the feed is consumed, the animal roots the feed wheel 13 one way or another causing rotation of the feed wheel 13. The animal-induced rotation of the feed wheel 13 in the trough 11 causes the feed sweep member 25 to rotate and sweep feed from inside of the bottom portion 18 of the hopper 12 to fall through the central feed discharge hole 21 located in the feed hopper bottom 20. The feed falls into the center of the trough 11 and is swept to the outer perimeter of the trough 11 by the feed wheel 13. Fresh feed is available for the process to begin over again.
The present invention differs from a conventional rotary feeder by having at least one gravity flow feed opening 30 through the bottom 20 of the hopper 12 in addition to the central feed discharge hole 21. The gravity flow feed openings 30 are used to allow feed to flow directly into the trough 11 by gravity. For example, as shown in FIG. 3a, a plurality of spaced-apart gravity flow feed openings 30 can be arranged in a circular pattern in the bottom 20 of the hopper 12 around the central feed discharge hole 21. The gravity flow feed openings 30 are arranged near the outer perimeter of the hopper bottom 20 between the central feed discharge hole 21 and the sidewall of the hopper 12. The gravity flow feed openings 30 are positioned so that the deflector cone 22 or other structures within the feed hopper 12 do not obstruct or restrict the gravity flow of feed through the openings 30. The feed stored inside of the feed hopper 12 flows freely into the trough 11 through the gravity flow feed openings 30.
A closure system 31 is associated with the gravity flow feed openings 30 to allow the openings 30 to be closed when gravity feed flow is not desired (e.g., when the animals become large enough to operate the feed wheel). As shown in FIG. 2, the closure system 31 includes a gravity flow modification plate 32 attached on the underneath side of the feed hopper bottom 18. Inside of the gravity flow modification plate 32 are a plurality of slide doors 33 that are movable along respective radial lines extending from the central vertical axis of the feeder 10. The slide doors 33 can be moved radially outwardly from a first position in which the gravity flow feed openings 30 are open, to a second position in which the gravity flow feed openings 30 are closed to block gravity flow of feed from the feed hopper 12 into the trough 11. FIG. 3b shows the gravity flow modification plate 32 and slide doors 33 assembled and concentrically located around the axle 24.
FIG. 4 shows the exploded view of the slide doors 33 and the gravity flow modification plate 32. The slide doors 33 are individual pieces that slide in the recessed areas 34 located on the gravity flow modification plate 32. The slide doors 33 are opened by pushing them from the outside of the gravity flow modification plate 32 inward towards the centerline 24 of the rotary feed mechanism. When the slide doors 33 are located in the inward most position, the gravity flow feed openings 30 are unobstructed allowing feed to flow from the feed hopper 12 into the trough. When the slide doors 33 are located in the outer most position, the slide doors 33 will obstruct feed flowing from the feed hopper bottom 20 into the trough 11.
FIG. 5 shows the normal mechanical feed flow of the rotary feeder 10. The feed is mechanically swept beneath the feed cone 22 by the sweep member 25 and falls through the central discharge hole 21 located on the feed hopper bottom 20. The feed is then swept to the outer perimeter of the trough 11 by the feed wheel 13. This process works very well for larger animals that are stronger and more capable of moving the feed wheel 13 causing the mechanical operation to occur. However, present conditions exist in the swine industry where much smaller animals are being placed on rotary feeders and are not yet big or strong enough to move the feed wheel 13.
The present invention solves this problem by creating a gravity flow feeder for the first several weeks of animal growth allowing the animals to gain enough size and strength to operate the rotary feeder properly. This is achieved by installing and attaching the gravity flow modification plate 32 and slide doors 33 under the feed hopper bottom 20 with the gravity flow feed openings 30 formed therein.
FIG. 6 shows the feed flow from the feed hopper bottom 20 into the trough 11 when the gravity flow feed openings 30 are unobstructed by the slide doors 33. The feed is able to flow freely from the feed hopper 12 into the trough 11 where the animals can consume the feed. The gravity flow feed openings 30 are sized such that a desired amount of feed exiting the openings occurs, but not so large to allow the animals to consume the feed flow directly from the openings 30. The feed flow from the gravity flow feed openings 30 is limited so that as the animals consume the feed, the feed is consumed faster than it is supplied. This limiting feed will cause the animal to naturally root and sort around the feed wheel 13. If the animals are big and strong enough to move the feed wheel 13 to access feed located around and beneath the feed wheel 13, then the rotary feed action is initiated.
The present invention also has an activator mechanism 35 associated with the feed wheel 13 that is arranged to cause the slide doors 33 to move from their open positions to their closed positions automatically upon rotation of the feed wheel 13. The activator mechanism 35 has an activator pin 36 attached to and extending upwardly from one of the spokes 15 of the feed wheel 13. The activator pin 36 has a path of movement when the feed wheel 13 rotates that causes the pin 36 to contact with the slide doors 33. As the feed wheel 13 is rotated, the activator pin 36 rotates and contacts the slide doors 33 forcing the doors 33 to be moved in the radially outward direction. Eventually and over time, the feed wheel 13 will make a complete revolution causing the activator pin 36 to contact all of the slide doors 33 one-by-one and forcing them to move to the maximum outward position. When the slide doors 33 are in the maximum outward position, the slide doors 33 obstruct feed flow from the gravity flow feed openings 30 in the hopper bottom 20, thereby automatically converting the gravity feeder into a mechanical rotary feeder.
FIG. 7 shows a similar construction where flip doors 40 are hinged to the underside of the feed hopper bottom 20 and activated by contact with the feed wheel 13 causing the flip doors 40 to close and obstruct feed flow through the gravity flow feed openings 30. There are a variety of other means of achieving obstruction of gravity feed flow in a rotary type feeder, such as a rotating plate, manually adjusted feed flow orifices, and interchangeable plates. In each of these alternative arrangements, a closure system can be provided with a first condition in which the gravity flow feed openings 30 are open to allow gravity feed flow through the openings 30 into the trough 11, and a second condition in which the gravity flow feed openings 30 are closed.
The present invention provides a rotary or mechanical flow feeder 10 that can be converted into a gravity type feeder for application where small animals need to be fed. The feeder 10 can then be converted from gravity flow back to mechanical flow by a closure system 31 that blocks the gravity flow openings 30. The closure system 31 allows the conversion to be automatic based on the natural feeding behavior of the animals. | 2019-04-25T01:55:24Z | http://patents.com/us-10182553.html |
Good. Evening ladies, and gentlemen, and welcome to. The. Inaugural. Class of. The. Ethics of technological. Disruption, I'm. Hilary Cohen a pre-doctoral, fellow here at Stanford's, Center, for the ethics in society, and and, on behalf of our full team we are thrilled to be welcoming you here tonight and to. Be kicking off what we expect. Will be a series of meaningful, and hopefully. Educational. Conversations. Our, topic. Tonight and over. The next several months will. Be the profound, ethical social. And political questions, that. Emerge as, a result of technological, change. Much. Of it funded, by firms just down the street on Sand Hill Road. Generated. By companies, here in the Bay Area and. Seated. By the research, and education, at this very University. We. Believe the stakes are high the. Premise of this course is that, there are a few things more. Important, to consider when it comes to the long-run, well-being, of humanity. The. Israeli, historian, you've all her re describes, it this way nobody. Would doubt that. The new technologies, will enhance the collective power of humankind, but. The question we should be asking ourselves, is, what's, happening at the individual, level we have, enough evidence from history, that you can have a very, big step forward in terms of collective, power coupled. With a step backwards, in terms of individual, happiness an, individual, suffering, so. We need to ask ourselves, about. The new technologies, emerging at present not only how, are they going to impact the collective, power of humankind, but, also how, are they going to impact the daily lives of individuals. In. Terms, of history he provocatively, writes the, events, in the Middle East of Isis. And all of that is just a speed bump on history's, highway it's. Not very important, Silicon. Valley is much, more important it's. The world of the 21st century, and to. Be sure the speed of technological advancement. And of disruption, can, be dizzying, so. Many of you in the audience may, have seen the latest internet meme circulating. On the over the last week or so the, 2009. Versus, 2019. Challenge, or the hashtag, ten-year challenge if you, haven't it's, fairly simple. People. Post on the one hand a. Picture. Of themselves from 10 years ago and then just next to that a more recent photo of themselves and. It's meant to show just. How much progress, or, change one, can experience in a decade of life, so. Here you have a couple of examples for those of you who haven't seen it. So. Now if we were to do a similar, exercise with. Some of the largest tech companies, or, events, related, to. To. Technology's, impact on society, it might, look something like this. In. 2009, you might see Mark, Zuckerberg proudly, proclaiming, the, mission of Facebook to give people sorry. I think we're on automatic. Proceeding. Give. People the automatic, power to, share and make the world more open and, connected a, statement, that would later change but. One that reflects the sincere, aspirations. Of idealistic.
Technologists. You. Might see the, beginnings, of some. Online organizing, that. Would usher in the Arab Spring the following year the. Democratic uprising, across the Middle East that demonstrated. The power of technology to foster, positive social, and political change. You. Might see President, Obama issuing. His first weekly address directly. To citizens across the country using YouTube in which. He described the opportunity, to restore science, to its rightful, place and wield, technology's, wonders, and. You might see that the most powerful, American companies, represented. A mix of different industries, from, Exxon to Citigroup, to Microsoft. So. Let's contrast, this with some, of the pictures you might see today a. Facebook. That has been roiled. By a set, of scandals, including, election. Interference, and privacy. Violations. And failures to moderate content, appropriately, around the world. You. Might see some of the, very same technologies, used, to give young advocate, of democracy, a voice are, now also being used by. Authoritarian. Governments. To wield more control, evidence. By China's, citizens, court you. Might see that the President of the United States is tweeting. About how tech companies are trying to silence or suppress the voices, of conservatives. Of half of our country, on their sites. And. You might see that America's. Five largest, and most powerful. Companies are exclusively. Technology. Companies Apple, and Amazon alphabet. Facebook. And Microsoft which. Are professional, homes for, many of you, now. Of course this. Isn't the. Full story of what's happened in technology. Over the last 10 years there. Have been extraordinary, developments. New products, services, and companies, that solve, real problems while. Fueling. The, economic, growth that we've seen around the world, but. It's impossible to, deny that. Over the last 12 to 18 months we've, also witnessed, growing, pushback, or skepticism about, the way the, technology driving, this progress has. Influenced, the lives of people and communities, there's. Been a shift in the general populations, attitude, and. The amount of political scrutiny aimed at the creators, of technology, and those who have reaped the benefits of, its creation a, transition. In, part, described by the, early hopes of liberation, technology, -, at times fears. Now of technological. Dystopia. So. Perhaps this, was inevitable, you. Know after all as, a society, were now forced, to come to terms with genuinely, new, concerns, questions. About data and privacy about the impact, that automation, will have on the future of work and on politics, about. The roles that both private, companies and governments, should, play in shaping. The lives of ordinary citizens and in either upholding, or possibly, diminishing, democratic, institutions. Don't. We'll touch on many of these our, task here is not to fall down simply on one, side of any single debate it's. Not to add to either the, roster, of booster, ish and mints of technologies benefits, or. The scathing. Critiques, of a specific, company or industry, our. Aim rather, is to moderate, a series, of conversations that, explore. The dilemmas, that emerge, when, technological. Aspirations. Bump, up against, the realities, of politics, and inequality. And a, plurality. Of visions, for, what a good society, looks like, it's. To begin to wrestle in earnest, with. The massive benefits, of technological. Progress right. Alongside the. Significant, costs, that sometimes, accompany, it and, we've. Assembled a group of experts from industry from, government and from civil society to represent. The full range of perspectives that, these topics deserve. So. In preparation, for this exploration, we asked you a couple of questions about the, roles that you play if, any in the tech sector about. The issues you're most interested in, there's. A set of questions about the state of affairs today, the. First how. Well-equipped, do you think US policymakers, are, to, govern a society, that will be transformed, by technology in, the years ahead on. A. Scale of one to ten the, average answer as you see here amongst. You was a three and not, a single person gave. Our, policymakers. Above a six, now. On the one hand this. Seems comical, right, it reflects what many, of us have seen as ill-informed, handling. Of tech issues by politicians, perhaps, most memorably, with, Senator hatch asking, Mark Zuckerberg how despite. Its free surfaces, Facebook, possibly, makes money. Now. On the, other hand if you're right this. Should actually alarm. Us that. The people charged, with governing. New technologies, have, such little understanding, of how, it actually works, in, the. Words of our colleague Shannon valor who is a philosopher, of Technology at Santa Clara University. Well. We shouldn't expect our elected, representatives to, all share a deep knowledge of, technical, or scientific matters.
They Do have a duty to be acquainted, with the basic operations. Of our most powerful. Horses and institutions, that are shaping our nation especially. When they are tasked with regulating, those forces, so. We also asked you about your faith in technology companies to confront new challenges, and possibly. Reflecting the bias. Of our audience or of our geography you. Had a slightly higher expectation. Averaging. At about a 5 out of 10 with, fairly, equal, measures. Of skepticism. And optimism, on either side. But. Most importantly, you, told us about the issues that drew your interest in this course about. Those that give you pause and, those, that give you hope. We. Intend to cover a large portion of these topics over, the next few months and I want to tell you a little bit about the team that we have on side to help us navigate them. So. In addition, to myself we'll. Be joined in every session by. Three. Sample faculty members first, is computer, scientist Mehran sahami who. Is partially, responsible for the enormous, growth and success of the computer science department here he, teaches the single largest class, at the university, intro, to computer, science, and. Spent a decade in industry, before, joining. The faculty then. We have political, philosopher, Rob rish who, has, proudly confessed. That he. Like any good philosopher, often. Delivers more questions, than answers. He's. The director of two centers here on campus, just. Leave the photo so you can see as all, the. Center for Ethics in society, and the Center for philanthropy in civil society and, finally. We have political scientist, Jeremy Weinstein, who, among, his other roles is the, director of the global studies division here and. Having. Served in both terms of the Obama administration. Brings, practical. Government, experience to the team in. Parallel. To this class the, four of us have been working for over a year to develop a related, undergraduate. Course which. We kicked off last week we, have roughly, 300. Stanford, students, future. Technologists. Inventors, policymakers. And activists, enrolled. Who. Over the next 10 weeks will, be diving, into, the code the, public policy and the ethical frameworks, that underpin, technological. Change and our. Course flow in here will mirror the four core units that we will be covering in that course so to remind you they'll be starting, next week, first algorithmic. Decision-making and accountability, then. Privacy, and data collection and civil liberties with an emphasis in here on facial recognition, then.
The Ethics of autonomous, systems with an emphasis on military, use, of AI and then. The power of private platforms. Some. Of the undergraduates are actually here with us tonight and with, their help we are thrilled. To be thinking differently about how you train, and equip the next generation, of technologists. And leaders to think about their roles and responsibilities. To society, so just. One note on format, before I introduce, the guests, who will be joining us ordinarily. We would love, and expects, to have microphones, on hand for you to ask questions after. All that's a central. Part of the sort of engagement, that a university intends. To foster, but, because. We are recording these sessions and, we need written consent forms. For audio, and video recording, will instead be collecting. Questions. From you digitally, in advance which many of you submitted, tonight and we'll let you know how you can do it for the sessions moving forward, but. Without further ado in order. To help, us understand the full landscape of, these, challenges, we're kicking off tonight with two distinguished, guests, reid. Hoffman co-founded. Linkedin and is currently a partner at Greylock partners he's. On the boards of many technology. Companies including. Microsoft and Airbnb, as well, as several nonprofit, organizations, he. Hosts a podcast called, masters of scale and recently, released a new book blitzscaling, based, on his Stanford course of the same name we're. Also joined by Nicole Wong who, previously served as deputy, chief technology officer, of the United States and the Obama administration. Focused, on Internet privacy and innovation, policy, and, prior, to her time in government Nicole, was Google's, vice president, and deputy general counsel and Twitter's, director, for legal eagle. Director for products please. Join me in welcoming everyone, to the stage. I'm. Gonna get us started with a general. Question about the. Framing in the moment we're in that nicole. Described. At start that used to nicole hillary described it to start. The. Issue is to take stock of the early. Optimism. That almost utopianism, that attended, the tech industry, and its founding, chiefly here in silicon valley and the moment we find ourselves and now in which there's great, fears of the, tech industry producing.
A Kind of dystopia. So. For. Our guests i just want to read representative. Examples, of some of the expressions, that had been offered so, the following was said by president, ronald reagan in nineteen eighty nine just a few months before the fall of the berlin wall, quoting from him as president the. Goliath, of totalitarianism. We brought down by the David of the microchip. I believe. He said that more than armies more, than diplomacy, and more than the best intentions, of democratic, nations the, communications. Revolution emanating. From Silicon, Valley will, be the greatest force for the advancement, of human freedom the world has ever seen a, few. Years later then President, George HW Bush, said that. He asked, the world to imagine, if the internet, took hold in China just. Imagine, how freedom. Would spread. Rupert. Murdoch said. Quote advances. In the technology of telecommunications. Have proved an unambiguous. Threat to Thoth alliant, totalitarian. Regimes everywhere. All. Right now fast-forward to 2018, I'm gonna read you the opening paragraph, of an article, that I just came across. Captures. The sour, mood of the day, quote. Mobile. Technologies. Distract, adults, and depressed, kids. Twitter. Is mostly, a bad platform. Full of Nazis, and assholes. Facebook. And YouTube blend, cheerful, up worthiness. Pathological. Self-revelation. And malignant. Deceit, delivered. To hyper personalized. Addictive, filter bubbles optimized. To capture, our attention, for sale the. Open web is a vast soul sapping, wasteland, of sexual depravity, and medical. Malpractice and. The, Internet, of Things is nothing less than an emerging, panopticon, and, behind. All of this good work lies the disruptive, innovation, of a small band of predatory. Plutocratic. Enriching, monopolies, inspired. By a toxic, mix of swashbuckling. Ambition, and moral. Preening. Oh. Man. Yeah, and end of quote, Nicola.
Read What happened in this thirty years between those two quotes. That's. A great set up we're. Gonna try and have you leave happy, tonight, your. Your sudden the challenge, really high. So. I actually, wasn't, sure what you're gonna be like I. Wrote. Down a quote that, you'll probably remember John, Perry Barlow. Declaration. Of Independence, of cyberspace right, I could have started there right well, so so here's the thing that I caught. On to you you do not know our culture or ethics. Or the unwritten codes that already provide our society, more order than, could be obtained by any of your meaning, governments in positions. Right. The, the optimism. Of the belief, that cyberspace. Was going to be this borderless. Place. Where. We would all rule ourselves, because we knew exactly how. This was gonna play out. You. Look at Bakugan Oh wouldn't. Have that have denied and. Even in the, in. The, laws that we eventually put in place that followed, so. For, example the Digital Millennium Copyright Act, or section. 230. Which is highly debated, now which. Regulates. The the, content, liability, for four platforms. In. The conversations. In Congress, around the development of those laws there. Was a a real sense of like we have to protect, the Internet it is. A place for growth it is a place for innovation it will be a place for for, individuals. To express, themselves, freely so, the. Laws were actually generated. With the notion like this is a fragile ecosystem, that, we should protect. And. We, have now come to this place where all. We want to do is shut, things down or. At least that seems to me to be the mimin in DC, right now it just apropos, that that point I was a part of a committee here at Stanford, maybe five or six years ago that was tasked every 25 30 years they put one together to, review the quality of the undergraduate, education, and when. This happened that five or six years ago one, thing that occurred to us is well how has technology changed, the, experience, of students at the University and we. Pulled the faculty, about what they would wish with respect to technology at, Stanford University, and the, main thing the faculty, expressed the desire for was, an internet kill switch in every single classroom I. Look. I think part of the, question. Is it's. Not I, describe. Myself as a technolon, a, techno utopian, yeah which means just because you can build the technology doesn't. Necessarily means it ends up in the in. The right place but. Actually in fact technology is more often the answer than the problem and the way that you look at it is say but there definitely we. Have a, bunch of different kind of birthing problems because exactly as Nicole said you. Know the initial kind of. Early. Days of the internet all, on John Perry Barlow Andy if everyone else say well, we used to have this kind of very centrally, kind of controlled by. Large, companies they're also you know media channel how do we give freedom to individual. Voices how do we allow people to express, themselves I mean like one of the things during that, I was really delighted about in the kind of the the.
Blogging. Arena. During. The Iraq war was was, being able to read blogs, from the Iraqi. Civilians. And so forth I'm the humanizing, and connecting, and figuring out what kind of what's the what's, the right way to do that and so there's a lot of, good. There. Now and in the past and then the question is say well, how do you reshape, it so, that you, have it and the reflex, to say you. Know Killswitch, is. A reflex, I don't think is right right I, think the question is is to. Say, okay and by the way we have this challenge of course which is well as, you making social policy, you have a lot of different conflicting interest groups that have this, interest or that you. Know one of the challenges, that that Facebook has right now is you have you. Know up, forces, generally speaking on the left saying how, do you allow all this fake news and filter bubbles and you force it on the right just like the tweet. From President Trump saying you're silencing, you know conservative. Voices and suddenly getting fire from both sides and resolving. That is is is. Challenging. And so I. Tend. To think that you. Know it's kind of. You. Know you always have to refactor, technologies. As you go and. I. Think some of the question of course what will be addressing some tonight, and ongoing is, you. Know well given. That hard problem, what are the right questions asked and what are puzzle. Pieces of, things. We might be considering, or, might consider, because, you know like again you go to your opening, thing and you say well, confidence. In government setting, the policy. Average. Score -. I. Was. Curious if you'd included, zero and your survey what would have happened and. Then, you know and confidence. In, in, company, five to six which, relatively. Because this all comes on relevant normally much higher but. Still has challenges and, problems I have a model in my head for why we, got here and I'm actually interested in whether you saw this in your businesses, as well which is if. You think back to sort of the the development. Of the Internet, in the early days of twenty years ago right it was largely, here, right, it was largely, us centric, the companies that were building the products were here it. Was largely being used, by US. Europe. Japan and. Australia and, Canada to, some extent but that was pretty much the set so that's a set of countries where. Our. Values. Are largely aligned, our. Judicial. Systems, are largely aligned, we, are mostly, in, the same place in terms of our treatment of freedom of expression, and privacy, and. Then, in my experience, at least around. 2005. 2006. 2007, when. Internet penetration in, some of the developing world Brazil. India. Russia, China, really. Started to take off you. End up having. This audience, and communities, coming, on to the platforms, that had previously, been dominated, by I'm, gonna call them Western democracies, as a shorthand that, have really, different values that, have really. Different systems, of adjudicating. Fairness. And. Individual. Liberty and I, think that that caused, a a, real, conflict, both at a policy, level but also at a technical. Level of like how do I deal with this because my, experience, with engineers, who are building for these platforms I'd ceiling so where are you gonna launch this product and they'd be like fig. CJK which, stood for in. French, Italian, German. Spanish, Chinese. Japanese Korean and I'm like those are languages, not. Countries. So, we, have to talk about the, countries. Not, just the distribution. But. If I can push on that a little bit Nicole as. A sort of frame for thinking about when the challenges, began, let's. Take the kind of you, know Western advanced, democracies, the United States European, countries, may, be the initial engines, beginning here and spreading into Europe there, are pretty damat, dramatically. Different perspectives. About, how to regulate. You. Know technology, companies, even, among that set of countries, that presumably as you described share, a set of common values I don't know if folks have been to, Europe recently but, since the adoption of the GDP are a key, legal framework, in Europe what, you'll find is that when you turn on your phone and you try to use Google Maps or you go to, some website you. Are giving all sorts, of permission, for every, single step you take and are being told all sorts of things about how your data is going to be used that, that, we are in the background of everything in the United States so even among these countries, with, shared values that, facilitated.
This Growth, they're just dramatically, different perspectives. About the ownership of data about. The, ways in which technology, companies. Should be governed, how do you think about the, origins, of those differences, like what drives those really different perspectives, and from, both of your sort, of different, roles both at companies, but also in government how do you think about what the implications are for the United States as we grapple with some, of these challenges from how Europe has begun to move. Is. Like. So. The. Difference is you're right which is the difference is even between the countries at the very early start word we're, different and I think to me the challenge the. Reason it was a little easier to deal with is like if you were gonna get a government. Demand in Europe it was probably gonna be a law. Enforcement official, who had. Credentials, who, was going to present you with legal process, there was a judicial court that was going to deal with that you. Go into India or Brazil that's, actually not how that's gonna go down that it's gonna be cops at the door in your office, waiting, for you to take the servers away right so so it's it was just a different moment, if you were at a company, trying to manage. The legal issues around that. But. The difference. Is in. Country. Law have always been there so the, the sort. Of, privacy. Dimension, in general. Yes Europe because of its history and its use of data. Against. Its citizens, particularly during World War two has, a lot of more sensibilities, around, how, data, gets collected and, used and governed, then, in, the United States where we have largely, thought. Of it as a consumer protection issue as opposed to a human rights issue which is how it's framed in Europe and we, have largely let, it be. Regulated. At, the Federal Trade Commission level which is a like. With a commercial idea or an economic and consumer, idea behind it again, as opposed to a human, rights level, as it would be in Europe, Europe. Also has things right that, we've always dealt with which is in, Germany, and France it's illegal to traffic, in Nazi, memorabilia in here, it's a First Amendment issue, and. And so you've. Had to deal with those, types of differences. I've. Found, the challenges, to be. Once. You you, can sort of do it at the margins, of like okay, like we're not gonna have hate speech on the platforms, or whatever but, once you start getting into countries where it's a radically, different sense, of is, permissible.
To Have, LGBTQ. Content. On your site it's. Clearly, illegal. These countries, what. Is the resolution going to be and when you build a platform that's global, you. Have to make choices either the, content comes down your IP blocking, it your your taking, some step in order to be able to be in market and, one of the challenges, when you look at. The. Differential, European, approach to. Saying ask for, permission more than ask for forgiveness is, it's. Among the reasons why because by the way there's a ton of talented. Technologists, great, technical, universities. You. Know a stack of things and yet very little of these. World-changing. Technologies. Are coming out of Europe for the global scale I think they have all the talents and everything else I mean you have Skype, and you've got you, know super cell and you've got dealing but it's a relatively short list you consider where browsers. Are built which. Ones you know current created the networks think about search engines, think about all these sorts of things and. And. Part of I think the relevant. Question. Is. What's. The way that we get to developing, them because if, you say well. We. We, we should shift more towards Europe that, may say that well we should be more like like. For example like, in the position arrow picture the rest of the world and so the rest the world will develop those technology, platforms, you know maybe Asia other kinds of places and so, you have to kind of balance that out now I actually, as part of saying technolon, eyes I actually think that these things are refactoring. So, I tend to be in the look you have to make sure that they're there they're, there are some critically bad things like medical, stuff and other kinds of things you go no no get it right first but. There's other things you see look at it say okay that was a problem now let's change it and so I tend to when. I go over to Europe and talk about this I tend, to advocate, for more, of a like. Like. Refactoring. Then, and ask for permission you, know a forgiveness, than a permission has, approached if I can ask where do you draw that line how. Do you think about what the harms, are. That you're willing to accept to. Have that flexibility. So, in. This, book that I published, last year and Fall, Quarter blitzscaling. I described, kind. Of three kinds of risks that. Blitzscaling. Company, should should, track and pay attention to and part, of this was one part of the book was you, know here's how technology, companies in the future are going to be shaped. By a set of techniques that we learn here in Silicon Valley also practice in China to, help other areas in the world but another one was how do I help evolve that practice, about how we're doing it one was you, have serious. Kind. Of like you know health, implications for, individuals, right, so an example of something I wrote a an essay, on as a as, a failure case was theros right, so you say okay you're making bad blood tests, or doesn't you shouldn't be blood scaling that you should be tracking, that another.
One Is if you have a kind, of a you. Know kind of a moderate. Impact across, a large number of people then, that's something you should you, should consider too or if you're going to break the system like break a like. A payment system or logistic, system and that's the thing but. Within that basis. You. Know generally speaking you want to kind of actually, try it and see it and we factor it so, for example if, you say well ok these scooters are cluttering up our streets we should have had them ask for permission first it's like well look. People have to be careful about like what does it mean for you know like possible. Accidents, and fatalities and, so forth but, a refactoring, of cluttering, on your streets, with scooter is actually something you can refactor so, that's that's the kind of the framework that I sketched in the book I, was, addressing, business people and the entrepreneurs, doing this but. It's also a framework, law which you can think about as a general society as well I want. To pick up if we can on one of the threads that and Nicole, introduced which is this idea, of. Complying. With various, government requests. When the, range of values or legitimacy, of that government might be different. In different contexts. So right now there's you know a lot of debate, on this sort, of topic you know you see Netflix, taking down this comedy special that had. To do with Saudi, Arabia, and and, Mohammed. Bin Salman and you. Know they chose to take it down you have people. Protesting. Or at least asking questions about whether or not Google can should re-enter. China given their. Record on the. Way they might use the technology, you know how much, room is, therefore an American, company to assert. Its, American, values, when, it, is trying to operate in a global, scale in global contexts, in. Areas that have these different values yeah. So um I think, it's part of it is like stop thinking of yourself as an American you're gonna build a global platform think of yourself as a global platform, and, and, adjust. Accordingly and I say that my, training is that as a First Amendment lawyer right, so like I yeah. I was like I want to be a lawyer so I can pound the table about the First Amendment and. And. Being, at Google I. Had. To readjust. Right, so when we acquired YouTube, what. Had largely been a, an. Internet, of, you. Could cab in a market because there was a language barrier right, but once you get into video and images, it's, it's visual. So it's global, automatically. So an audience, that was intended for Turkey, is now, being seen in Greece and elsewhere and and, the sensibilities, are really, different one. Of the issues, I had early, on with with YouTube was. We. Were global. Someone. Posted. A number of videos. About the king in Thailand, and they, were offensive, they were pictures. Of him with a foot, over his head which is extremely offensive with his face made into a monkey and. Things. That were clearly, intended. To defame the king and that, is illegal in Thailand they have what's called a lez majesty law it makes it illegal to criticize, the king, so. If you're an American, with a First Amendment background, you're like what. Are you talking about the whole purpose, of free expression is to be able to criticize your leader and so. The, question came because the, we were contacted by the Ministry, of Information in Thailand they said we're gonna block you take down these videos or we will block you and. I. Actually. Then traveled to Thailand to try and understand what was going on to meet with their government officials to meet with our own like US Embassy to get some background to, meet with people, on the ground in Thailand understand, this law. The. Most salient thing that I was told was actually by one of the, the diplomats from from the United States who, told me like this. Is a country which over the last 27. Years has had 21, coups. The. King who was in his approaching. His 80s at the time was. The only. Source. Of stability in, their country for a generation. So. It means a lot to. Have insulted, him and that, is felt not just at like the highest dester lines but like all the way through the country, and so, for me as a First Amendment lawyer I have to back away from my sense of like revolt.
Against Your government have the ability, to criticize and start, to think from their perspective what is, appropriate speech, that that, creates. Civil, discourse, right, what, what is what is the thing that is the is. Essential. To that culture and be respectful, of that because I am a global platform and. I think that that at. The time like 2007. That felt like a really big leap for me to make and now knowing, where we are in our current political atmosphere I'm like okay. So. It's, not just isolated to certain countries mr.. BAE's, for you that so. Agree, with everything the Cole said I think I would say one thing and it's not so much as a as as. Promoting, a specific set of American values but I do think that one of the things that. Companies. Should do is say look this is what we stand for this is who we are this is what we're fighting for and so. You. Know in the LinkedIn context. It, was we're, fighting, for kind. Of individuals, ability to maximize. Taking. Control of their own economic destiny, so. We we. Don't as much address freedom of speech issues because we said look that's not necessarily tied to it but, what is tied to it is, if. You can represent what your skills are what your ability to work is so. If you have a country that says oh these people aren't allowed to work or whatever we still put that we we would still put their profiles, up we'd still you, know kind of facilitate that so I think it's good to say these, are the things that we stand for and we're doing to be clear about them and then to navigate, that and as. Part of that for example, you. Know when we I think we kind of surprised, the. Russian, government. And you, know they were like okay well we want all this data because we want to be able to have control no, no we protect our members. So we're not going to do that and you can do what you need to do because we're not going to hand over, individual. Data in bulk without. You. Know without some sense of protection here we'd rather not operate, if you force us not to operate right but that I mean herein lies a fascinating. Point which is that it's not an example of asserting, American values it's about a company. Having its own values and actually when we think about the identities, of these companies you know whether it is you know maybe they happen to be hosted here but they have a self conception, that isn't tethered, to the, geography in which they happen to be rooted sometimes well, I think the push on that point a little bit I mean the notion of a company having its own identity is that you could think of the company having an identity but a company's also made up of a bunch of technologists. Who also have their view about the work they're doing that either they, can communicate to the management of that company or they can actually encode, a set of values, into, what they actually build in that company and so when you think about sort of the different leverage points that way what an individual, technologist, can do what the company, wants to do more broadly in terms of fighting for its values what, happens when journalists. Want to shine a light on a particular, issue, where. The leverage points how do you see you know running, a company or as a regulator, how you navigate, all these things to try to come to some sort of place. That you think is leading to a better outcome when there's all these competing leverage, points well. I know, that Reed has done this because he and I have worked together over the years and so right. Like one of the things as a company, and as the leadership of the company is is you find your North Star right, which is like what are the essential, parts of us. As a company of the things that really mean a lot, to us and that we would be prepared to defend and, and some, of the work I do now is talking to young companies, about like, forcing. Them into what are pretty hard conversations, like what, would you defend. If, it came to it right, is it open Internet is it the privacy of your users it's the, free expression of the ability, of people around the world whatever, that is but but knowing, that helps. You create. Your strategies, going forward and then from, that once you have the North Star. There's. Very tactical, operational, decisions about like which markets, do we enter.
With What products, do we enter them how do we build those products, and then, it's, it's really the tail end then right the things that I was talking to like taking down certain videos then you're really like at the very edge of it because you made the hard choices up here, and. Part. Of we're gonna do is you build the company culture around it so I think it's really, important to say here's. What we would rather fail here's where we would rather shut down here's what other in doing this this is who we are and, about if that's not what, you want, to do this is the wrong company for you to be working at you. Should go work at a different company. And so I think it's really good for these companies say this is what our mission is this is what we believe in I'm good let's take another test of that so one of the things that's been in the news about some of the companies that you either work at or on the board of now Google and your tube Nicole, or Microsoft, in your case Reid question. Arises, whether or not the, technological. Developments. Or products that these companies are advancing, should, be sold to were put to the use for military purposes, especially on behalf of the, US government these. Are after all US, companies and, you. Know I, think. Most people here in the room know about the project may have an issue here at Google so I take your your, statement, just now redoes well, you should know what you're getting into and maybe you shouldn't be working at the company so the employees, who rebelled against, project maven at Google your answer to them is quit, go find a different company work out well, I mean Google, has to say and this is not you, know my place to because I'm not oh yeah. But. Do I say this is who we are this who we're not right now, if, it were me in that position I'd say look I actually think that there's. There's various. Ways in which look we are an American company responsibilities. To. The American state and the citizenry, in society, and some, of that is making society, safer. So, we do actually have an obligation to interface, with the DoD. In some ways and there's things we can do that we're pareto the, world's better off and the US is better off and we're gonna go do that and if you're not comfortable with that maybe, you should work somewhere else that would be my well. How about Facebook or sorry not Facebook yeah Microsoft, and Microsoft has facial recognition technology, it, couldn't sell it to non, democratic governments. Should. It. Well. So this is a place where as a board member I should say well I should defer to the company. I'm. Not its, sake and everything else I think, the companies, do have a responsibility, to think about and Microsoft, does this our chair Brad Smith there very, high principle folks saying, look how, do we think this is going to be used do we think it's it's.
A Good use or not and if, no then you don't do it right so now for example if if if, a if just, like country, X said well, we want to develop the following, kind of bio weapon, and you happen to be in our country and we want you to do that the answer's no that's, a bad, thing it's it's. It's, like a disaster now they say well, we think actually a facial recognition thing, that will work in, airports. For terrorism, and will, be part of how we're operating we're, going to have it well organized legal and judicial system, we're, gonna organize through, that it will actually make society, more safe then, as long as you're you know I kind, of have a big, fan of well. Organized democracies. You, know we can have a discussion about whether what we're currently in one or not. But. But. You know then then that's a different question okay. Can, I follow up on one, of the things Nicole said which, is this notion of a North Star you're, talking to startups I think that, idea resonated. With both of you you should know what, lines you draw for, a lot of us who aren't in technology. Companies but we may be users. Of the products generated, by technology, company, companies, or citizens, affected. By the impact, of technology companies, is there, some obligation for companies, to, communicate what. That North Star is because. Part of the you know the example that Hillary gave with Facebook's. Initial, mission statement, and you can look at the evolution of Facebook's, mission statement, over time we. Could take uber, as another example. We. Are discovering. What the North Star is over. Time which, is quite at odds with what we had. Perhaps been communicated. About, what the North Star is so, how do we think about like, is that an internal, guidance for the company is it, something that you. Know for the purposes of investors, thinking, about investing. And buying shares that that's something that ought to be communicated. Much, more clearly and public. Of course part, of what's hard is that that's an evolving, thing as you think about entering, new companies, or confronting. New frontiers, but help me help me understand, it from that perspective yeah. I mean in, every country companies, is a little bit different right but I do think. The. Exercise, of your executives. And. Actually frankly to make sure that your executives, go here well is to, get them on the same page in terms of that North Star and, there's a really hard conversation in, my experience like to get everybody in, one place and. Then. It becomes usually, in my experience part. Of the, things you communicate, outwardly, you're either communicating. It by virtue of the way your products work or you're communicating because you have a mission statement or a filing with the SEC but. You have to do right so typically. That would that would be the case now you. Do have companies. That say one thing and do, a different thing which is a separate, problem I think then. Determining. What your North Star is going to be. And. So yeah look. I generally, think I don't think this is something, you can easily put in a policy or law but I think it's much better and. Much more principle for companies say this is who we are there's what we're doing this, is what we're shooting for. Sometimes. You of course have secret, plans you don't reveal to your competitors but, part of them like for example very, early days in LinkedIn the. Kind of cultural, ethos that we establish whole company is of what you were doing was printed on the front page of New York Times could, you go to your friends and say yeah it looks a reasonable, thing to be doing and that kind of thing is a way of doing it and building that culture. From. Very early and you. Know I'm a critic, of, like. I think it's okay to kind, of advocate, for different, regulation. By. Building a product into it where you say actually in fact I think that the way our societies you change that could take uber as I click should in fact no, we shouldn't be locked into taxi monopolies, we're better off with logistics, as a service it'll make society better that. I was I'm strongly supportive of the, we're, now going to hack the app so the government officials look differently to them as they're coming out to that that, they shouldn't do and that should they should be hit with a stick with right, so so, it's kind of some and some on these things in place to the point is like they say one thing do another bad.
But Also like. Like, you should, be advocating, for a different, regulatory stance, not trying. To fake it I'm. Gonna push one one time here too because you know as like. Jeremy I'm not an insider in a tech company and I can listen to and hear the wonderful statements, about organizational, culture and having a North Star and leading with your values, sounds. Great and then, the real if four years ago yeah but. Yeah four years ago ten years oh now what what, what occurs to me to think however we're sitting here in the Graduate, School of Business that the North Star of every, company is to make money it's a maximize, the profit they can make and, that's. What, the incentive, structure, is in addition to the value that's, put, forward so, maybe that you know the current example right now to put on the table about this is jewel this, you know vaping product created. In the design school here at Stanford, with what seemed like a great value proposition here. Was a way to get people off of the. Carcinogenic. Properties, of, tobacco while, keeping your nicotine addiction and. Then managing, it and instead, it turns out that over time they market it to a bunch of teenagers under pineapple, and candy cane flavors and now there's a ton of kids, you. Know with an epidemic, now of vaping so, that the way I explain, that is not that the company either never had a North Star or lost its North Star the way I explain it is they wanted to crush their competitors into the ground and make a lot of money and they found a way to do it so, I'm, by no means defending. That all corporations, are, Saints. With halos. And. I do think that one. Of the problems in every. Area of society is, you have the structural incentives, that lead to some kinds, of corruption and definitely, while. Overall. The. Kind of collection of business and profitability incentives, has led to a lot of productivity a lot of product services right jobs you. Know greater prosperity for medicine all the rest so so, generally speaking when people tend to say well I'm not against capitalism, I think well like sure kind of a fool right, now to manage capitalism. Yep right and like oh let's deal with child labor let's do the other things those are important and so. So. It isn't you know a panacea, to say, just. Have a mission statement and you, know there's. A lot of businesses. I don't. Invest, in even though when I look at and say okay that could be a good, profitable, business where you have an interesting equity, thing because I think it has the wrong, impact now I have a privileged. Place of I had a lot of other investments, to make a bunch of money so I can make that decision and it's harder and in other circumstances. But. The. You. Know so I do think, that one of the questions. Oh and then the other thing that's you, know this but but to say for the audience, there's. This kind of question there's a set of judgments about yes, you're maximizing profitability. But you're also building brand. Longevity. Long term so, there's a set of market incentives about, like maintaining trust and, and, doing things that by which, people say okay we. Think you're good custodians, we like you and so forth and and so, a lot of kind of corporate, social responsibility, programs and other kinds of things going on so I think it's when, people usually say hey just trying to get every last penny well there's some organizations, of doing that you, know they part. Of the function of media and other things is to call it out and make sure that markets. Respond, to that in the right way. But, the and you know sometimes government, and policies, as well and. But. But, on the other hand I actually think that there is also it, doesn't mean that when people say things. Like look. What I'm really trying to do is make the world more open and connected that is not they, are genuinely, trying to do that I think that's and it and things, are really hard right like I think we are not served, well by trying, to dumb down the ethical question sure right and so the the the North Star is a place for, a, point. Of reference as, a North Star was actually supposed to be right but but, it in the actual application of, it the, conversation is nuanced the factors, that you're trading off are difficult, the Google, maven question, there, were really, important. Con arguments. On both sides of that I think that's also the case with a decision, to go into China right like it it, is it is an ethical question because, it's hard and so, to, me the obligation, is to have, the conversation. Right, and and, maybe in some of these companies I think part of the the.
Employee. Revolts. In some cases is that, that conversation is not being had well internally, is not he had transparently. Is not being communicated well, and so you end up with with, with a reaction to it. There. Are some times where you know executives, have to keep things kind of under wraps for a certain period of time but you have to at some point be able to explain it so, I think it's that follow up on that because you make a really good point I've just threw out an idea to pause it to see what your reaction is that, you know we have, these slides that in ten years there has been these changes in technology, and there's a North Star of the companies having some positive the idea would posit that the. North Star of these companies did not change the public perception, of their North Star changed, and so, what point does a company actually, say what we believed we thought we were doing is not what we're, actually doing, and maybe, we need to change our North Star and communicate, that does, that happen. So. I think it almost certainly happens I mean one of the ways that I, look. At what was happening with a tech industry, is. You know you kind of start makin the input, scaling I kind of went it's a transition, from being a pirate to a navy right. And so it's can you kind of start with your squash buckling, there's. An element of disruption, and then you eventually get. In a more structured and regulated system and ultimately part. Of what's happening is these companies are moving, with stunning, pace towards, being, part of social infrastructure being, charted, in. This kind of infrastructure and then that, now. Adds, society. As a customer, - right as a stakeholder at the very least and so, look, the thing that I was, trying, to encourage with some of the stuff I put in the book and some of the blog the. Podcast. Matches, a scale and, they and the blog, posts was. To say as, you, get to a massive. Scale you start thinking about okay what is what is what, is my intentionality, around social responsibility. And and. You. Know for example take. Something less charged. Than, you. Know the questions of you. Know filter bubbles and so forth you, do have like this kind of issue around like okay so frequently. A lot of online spaces, are not really safe for women you, know okay what do you do about that that's not okay that has to be fixed right and once, your social infrastructure, and there's everybody's, there you've got the whole range right. So you need to figure out how to make it a better. Clean. And well lit space in and in, all the, spaces that are important to go as one, of the citizens and I think that's that now, beginning, to think of we have. Responsibility. Not just to our individual customers who are showing us by, their choices and behaviors, also but also to society. So. Reads book is called blitzscaling. And I want to put sort. Of Nicole on the spot a bit, you, know she drove down from Berkeley today. And. She. Has been sort, of recorded, in a podcast making. The case for, a slow food movement for. Technology, right, as an alternative, to, the blitzscaling approach, that is that artisanal, gardener from Berkeley right, and. I want you to talk about where. That argument, is coming from how. You think it's different than, the get, out there break, things and iterate, sort. Of mentality, that we have with technology disrupt. And then adapt. What. Does it mean to go slow and when should we go slow versus, go fast yeah thank, you for the question so. That the, conversation. That I was having around, shouldn't. We maybe have a slow food movement for, the internet. Was. Actually with with Kara Swisher and, and the context, of it was. Russian. Disinformation and and. Sort of the poisoning, of a lot of social platforms, with. Content. That's just coming at us too fast and so, let me back up a little bit and sort of regurgitate, that conversation. What. I was trying to talk about we're like what.
Are The values. That were embedding, in these. Social platforms that we build or. Or any platforms, that we build so I, start. With the model of when I was at Google I started at Google in 2004, the only thing we had was search just. Kind of an amazing, thing like remember, when Google was just like a box, on it with a blue page and and. And. The pillars, of search the, design, elements, of search were. Comprehensiveness. Relevance. And speed, so comprehensiveness, we went in all the content we could find on the internet so that we could fill the library, relevance. Meant we would, and the question you were asking, so that we could deliver the, relevant, result to you that would answer your question and speed. Because we knew that we, would keep you, going. To more, places getting you better, react. Responses. If we could just speed up the way we deliver the the results. Around. Two thousand, five six, seven. We. Had acquired YouTube, and the. Social, graph the social networks were sort of on the rise. Behavioral. Advertising the, targeting, of advertising, based on who. You are where, you look on the web what you what you seem to be interested in started, to be to grow and so, the pillars, of how, we build these platforms that the metrics, of our success. Changed. From. Comprehensiveness. Relevant, speed to, engagement. Can, I keep you here can. I make you stay and watch more, things, or click, through more pages. Personalization. Not. Deliver. You the relevant, thing but, deliver you more of the things you like. And. Speed, and we're still on speed and, to. Me that, the, those elements, of, engagement. And personalization, is, the, rocket, fuel of all of those outrageous tweets. And Facebook, posts and YouTube and videos, that, just. Tunnel. Through your day and like make, you lose time, as you're sitting on the internet and, in, some. Sociologists, are arguing radicalised, certain, people into certain poll more even more polarized, positions, so, when. I was talking about should, we slow this down right. What if we decide those are not the pillars I want to live with that. The type of platform, I want to sit on is one, that values content, which is authentic. Not. That I need to know exactly who the author is but like at least I knew it came out of 4chan, originally. Or or Breitbart. As opposed. To the. New York Times just what is its provenance. So, authenticity. Accuracy. By some metric and the, context. Of how. To stand a piece of content if I value that. How. Do we design for that right, can, I take the ads optimization. Team that is doing so much for Facebook. And Twitter and and and youtube and port. Them over to that particular. Task for a little while because, when what would we end up with then so. That was the concept, of like can. We, get. Away from the models that we're doing right now which, are so.
Viral. Built, a morality, and, and. Sort. Of this this high-speed motion, and and. Create. A place where you could have. My. Friend Jeff risen, at. The National Constitution Center a Madisonian, moment as a reason, to public discourse what's. Good but so you were there at that founding, moment right and I don't know if you would characterize. The. Shift from you. Know relevance and, comprehensiveness. And speed, to. You. No engagement. Personalization. And speed as a change, in the North Star of Google. And, evolution. In a slightly new direction, but if you're willing tell us a little bit about what. Kinds of debates went into, that. Direction was there any anticipation. Potentially. Of the consequences. Of moving. In this direction for. The quality, the authenticity the things that you're saying we. Ought to have approached, this more slowly and thought, about it were these things actually weighed in some. Serious, way and the, consequences, anticipated. And some judgment, made by somebody that, this was the right direction. To go and for what reasons. So my recollection. Of it and it's been a number of years at this point and is. That it was too early to tell right. Like we didn't know what. Personal, personalization. Felt like the right thing personalization, felt, like a companion. To relevance, in a bunch of ways right which is like hey, if I know that you typed in Vass. But. I also know that you really enjoy fishing and not guitar playing I'm gonna deliver you search results that, are more personalized. To you right. And therefore more relevant and, and I think engagement. Seemed to feel like hey if they're engaged if we're measuring how. Much time they're spending with, us that, feels like, they're. Giving us some love right that feels like we must be doing the right thing because they're still here and I think in the original conception of, shifting. Those design colors which are not North Stars I think but design pillars I think. That that it felt, like it was aligned, with the mission still, and it, was not until we got to scale, right. That the, detriment, of it arose. I also, think honestly, like, I. Still. Believe in a free and open Internet I'm an, optimist, as well and. I don't. What. I what I feel naive about is that, we were gonna get exploited, for believing. In a free and open Internet right. That that we would be weaponized, by. Allowing. Our platforms, to be broadly. Available and, and, and I and we did prepare for those defenses, at all because, look when you get to society, and infrastructure, same reason a little laws, we, have police, forces we, have a bunch of things and as you get the infrastructure, you have to realize it as a different. Game that you're playing and that's actually part of what I think everybody's. Been learning in the last you, know kind of five. Ish years, for. This and I think that's the like. There's, a subtle thing that's really important and kind of one of the reasons it's great you guys are teaching this class, part. Of the reason you know agreed, to be here is. That the that. The the subtlety, is a lot of this stuff actually happens, one as Nicole says you can't predict in advance that's part of the reason I tend to be a fan, for, experiment. Measure refactor, right, as opposed to try to plan it out all out in the beginning did you just don't know where it's going to go and, as you get to this infrastructure but the second thing is it's. The subtleties, around what happens when you're a product manager managing. To a dashboard. Into a number and, part. Of the thing that we need in kind, of, you. Know within the profession. Of product managers program managers, engineers as always say okay, look we are maximizing numbers, because you maximize engagement you maximize revenues so that's the natural function actually in fact I kind, of wish more government systems had dashboards, they heard running you, know efficiency, in target on, but. Also, to realize that those, those can mislead you in some bad ways so you say oh how do I get more clicks well, actually, went maybe what I'm trying to do is get you more outraged and actually, when you think of society. As a customer, we actually don't want more, and more people to be outraged and so we should figure out how to get more clicks without, using, that you, know and kind of tuning, which numbers you're actually looking for and and it isn't really necessarily, a plot. From, the company usually it's unintentional and the, user it's kind of unintentional through product me I'm just going oh my my job is to. Increase, you know monthly engagement, by five percent that's that that's what I've been tasked to do and, you go okay yes that's good to do but do, so with some thought to what the broader, context. Is as you move in infrastructure, in your part of society and that's.
Part, Of it too as you, get there let's, push on this one just a little bit because maybe you can give a concrete example I like the idea that as these companies have grown become, global. They constitute, social, infrastructure, yes and at that scale, then, society, becomes as it were a customer, to there's an obligation there. Alright so the, product, manager, the developer, working into the product manager as a dashboard, that's giving, all kinds of indicators, on you, know marginal. Improvement, on time on platform, or whatever turns out to be what's the dashboard, looked like at the product manager level for the social infrastructure, well. So I think part of the things that you look at is you say okay and by, the way part of what. These. Platforms, need is some more. Illegitimate seeing, guidance from society because remember when when. Some, engine facebook engineers ran some experiments, about we bet we think we could make you happy or depressed, outraged. About you're manipulating. Us right right but part of what you're saying is say well we'd like to have less hatred we'd, like to have less with eg, we'd, like you to go back to those experiments, you're doing and tune them in this way I need some some. Guidance. From the society say yeah, look we'd like you to take thing because you can use you, know modern AI techniques, to do sentiment, analysis and, of what you're doing is you know kind of versions. Of of, aggression. Speech and all kinds we'd like you to tune down how much we'd like you having on your dashboard what. The sharing, and the volume, the percentage, mommy's and we'd like you to tune that down we'd like you to make it a little less shared like maybe to, share that one requires a thousand, likes versus versus, 500 likes right ears and you kind of tune in that way while you're still trying to get engagement up you're now trying to make it may. Be slow or I'm not sure slow would be the word I'd use right. But. You're you're, trying to make it more civil yeah right and in terms of and but. They need the guidance for doing that because precisely. One of the reasons why they tend to retreat to saying, hey. Look we're just doing the simple algorithm is they, don't want to be accused of trying to manipulate right, right, and and so what we're, saying is what we need is a society, is we actually do. Want you to manipulate in certain. Ways that we think is better off for society, now that then returns us back to okay who, is well organized to say that who has the competencies, for doing that. Into. Your operational, question is like I'm understanding, your classes like two thirds CS and then the other third if I don't know who you are I am, an American Studies major an, English minor a poetry, fellow I have like every, liberal arts card stacked against me right now but, maybe, we need more of us at the table right like so when you design your business when you design your product you, need more. | 2019-04-23T23:12:28Z | http://newstechtrend.com/january_16_intro_opening_session_i1221 |
123934 1 2018 YLR 2059 Cr.Appeal 8/2017 (D.B.) Sindh High Court, Circuit at Larkana; attached cases: Cr. Reference No.D-02 of 2017 and Cr. Reference No.D-02 of 2017 2017 Riaz Jagirani (Appellant) VS he State (Respondent) D.B. 06-MAR-18 Yes Nil.
128619 2 Cr.Misc. 55/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Qadir Massan (Applicant) VS SHO PS Nasirabad & others (Respondent) S.B. 09-JUL-18 No Nil.
128832 3 Cr.Bail 97/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Khuda Bux Panhwar (Applicant) VS The State (Respondent) S.B. 16-JUL-18 No Nil.
124004 4 Cr.Appeal 46/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 Niaz Ali Jalbani and Others (Appellant) VS The State (Respondent) D.B. 21-FEB-18 No Nil.
135014 5 Cr.Acq.A. 72/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Mst. Abida Khatoon (Appellant) VS Khalid Hussain and an others (Respondent) S.B. 07-JAN-19 Yes Nil.
130740 6 Cr.Acq.A. 6/2013 (S.B.) Sindh High Court, Circuit at Larkana 2013 Agha Farhan Ali Pathan (Appellant) VS Abdul Rehman Pathan and others (Respondent) S.B. 05-SEP-18 No Nil.
134407 7 Cr.Appeal 51/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Madoo alias Madad Khokhar (Appellant) VS The state (Respondent) S.B. 17-DEC-18 No Nil.
131592 8 Cr.Misc. 48/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Amjad Ali Bhutto & others (Applicant) VS The State (Respondent) S.B. 26-SEP-18 Yes Nil.
131587 9 Cr.Acq.A. 20/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Mukhtiar Ali Landar (Appellant) VS Gullan Landar & Others (Respondent) S.B. 26-SEP-18 No Nil.
131632 10 Cr.Acq.A. 45/2010 (S.B.) Sindh High Court, Circuit at Larkana 2010 Dost Muhammad Noonari (Appellant) VS Khalil Rehman & ors (Respondent) S.B. 28-SEP-18 No Nil.
133154 11 Cr.Bail 37/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Deedar Hussain Tunio (Applicant) VS The State (Respondent) S.B. 09-NOV-18 No Nil.
134594 12 Const. P. 1006/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Asif Ali Mugheri (Petitioner) VS Muharram Ali Jagirani and Others (Respondent) S.B. 20-DEC-18 No Nil.
134595 13 Civil Revision 40/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Ahmed Ali Khoso (Applicant) VS Khan Mohammad and Others (Respondent) S.B. 20-DEC-18 No Nil.
132374 14 Cr.Bail 490/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Waqas Ali alias Wiki Magsi (Applicant) VS The State (Respondent) S.B. 12-OCT-18 No Nil.
133772 15 Cr.Bail 408/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Hussain Ali Metlo (Applicant) VS The State (Respondent) S.B. 29-NOV-18 No Nil.
134672 16 Const. P. 727/2018 (D.B.) Sindh High Court, Circuit at Larkana; attached cases: Crl.Misc.Appln.No.S-289 of 2018 2018 Mir Jan Muhammad Birhamani Baloch & an Other (Petitioner) VS SHO P.S Warrah & Others (Respondent) D.B. 24-DEC-18 No Nil.
132772 17 Cr.Misc. 9/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Bandah Ali Chandio (Applicant) VS DHO Kamber Shahdadkot & ors (Respondent) S.B. 29-OCT-18 No Nil.
132069 18 Cr.Bail 270/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Wazeer Ali (Applicant) VS The State (Respondent) S.B. 06-AUG-18 Yes Nil.
132595 19 Cr.Rev 12/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Karim @ Baboo & others (Applicant) VS Hafeez-U-Rhman & others (Respondent) S.B. 19-OCT-18 No Nil.
132637 20 Cr.Acq.A. 38/2011 (D.B.) Sindh High Court, Circuit at Larkana 2011 Ghulam Sarwar Soomro (Appellant) VS Abdul Hakeem Brohi & Ors (Respondent) D.B. 16-OCT-18 No Nil.
133043 21 Cr.Bail 122/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ali Bux Sabzoi (Applicant) VS The State (Respondent) S.B. 08-NOV-18 No Nil.
133044 22 Cr.Bail 444/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Hakim Ali Chachar (Applicant) VS The State (Respondent) S.B. 05-NOV-18 No Nil.
132638 23 Cr.Bail 488/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Imdad Mazari (Applicant) VS The State (Respondent) S.B. 22-OCT-18 No Nil.
131395 24 Cr.Bail 436/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Karimdad @ Abdul Karim @ Papoo Buririo (Applicant) VS The State (Respondent) S.B. 14-SEP-18 No Nil.
133412 25 Cr.Bail 350/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ghulam Mustafa @ Gogee (Applicant) VS The State (Respondent) S.B. 19-NOV-18 No Nil.
133493 26 Cr.Acq.A. 11/2010 (S.B.) Sindh High Court, Circuit at Larkana 2010 Haji Abdul Fatah Khoso (Appellant) VS Muhammad Hassan Soomro and others (Respondent) S.B. 22-NOV-18 No Nil.
133581 27 Cr.Appeal 25/2018 (S.B.) Sindh High Court, Circuit at Larkana; attached cases: Crl.Revision Appln.No.S-18 of 2018 2018 Altaf Hussain Bhayo & others (Appellant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
133773 28 Const. P. 138/2007 (S.B.) Sindh High Court, Circuit at Larkana 2007 Sabz Ali Chandio (Petitioner) VS Additional District Judge & others (Respondent) S.B. 29-NOV-18 No Nil.
133875 29 Civil Revision 60/2011 (S.B.) Sindh High Court, Circuit at Larkana 2011 Kazi Mohammad Akram and others (Applicant) VS Habibullah Shaikh and others (Respondent) S.B. 06-DEC-18 No Nil.
131109 30 Cr.Bail 259/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Allah Jurio Jagirani (Applicant) VS The State (Respondent) S.B. 10-SEP-18 No Nil.
133518 31 Cr.Acq.A. 84/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Sheeraz Soomro (Appellant) VS Muhammad Hashim Soomro & Others (Respondent) S.B. 23-NOV-18 No Nil.
131593 32 Cr.Appeal 38/2016 (D.B.) Sindh High Court, Circuit at Larkana 2016 Roshan Ali Jhatial (Appellant) VS The State (Respondent) D.B. 17-SEP-18 No Nil.
130218 33 Cr.Bail 157/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Saddam Magsi (Applicant) VS The State (Respondent) S.B. 27-AUG-18 No Nil.
131939 34 Cr.Acq.A. 27/2006 (S.B.) Sindh High Court, Circuit at Larkana 2006 State through A.G Sindh (Appellant) VS Arbab Ali and another (Respondent) S.B. 04-OCT-18 No Nil.
134494 35 Cr.Appeal 65/2013 (D.B.) Sindh High Court, Circuit at Larkana 2013 Anwar Ali Khokhar (Appellant) VS The state (Respondent) D.B. 19-DEC-18 No Nil.
132114 36 Cr.Misc. 73/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ahmed Ali Buriro (Applicant) VS The State and Others (Respondent) S.B. 08-OCT-18 No Nil.
128452 37 Cr.Bail 233/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Zamir Hussain Chandio (Applicant) VS The State (Respondent) S.B. 02-JUL-18 No Nil.
131591 38 Cr.Misc. 193/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Qasim Magsi (Applicant) VS SSP Dadu and others (Respondent) S.B. 24-SEP-18 No Nil.
133778 39 Cr.Rev 40/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Rasheed Junejo and Another (Applicant) VS The State (Respondent) S.B. 29-NOV-18 No Nil.
129076 40 Cr.Bail 280/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Javed Iqbal Chandio (Applicant) VS The State (Respondent) S.B. 23-JUL-18 No Nil.
132012 41 Cr.J.A 44/2014 (D.B.) Sindh High Court, Circuit at Larkana 2014 Bangul Kharos (Appellant) VS The State (Respondent) D.B. 04-OCT-18 Yes Nil.
123993 42 Const. P. 459/2016 (D.B.) Sindh High Court, Circuit at Larkana 2016 Najawat Bahalkani and others (Petitioner) VS PO Sindh and others (Respondent) D.B. 05-MAR-18 No Nil.
128455 43 Cr.Acq.A. 65/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Rahib Mazari (Appellant) VS Faqir Bux Mazari and Others (Respondent) S.B. 02-JUL-18 No Nil.
128835 44 Cr.Appeal 32/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sajjad Ali & others (Appellant) VS The State (Respondent) S.B. 16-JUL-18 Yes Nil.
Crl.P.953/2018 Ali Gul v. The State thr. P.G. Sindh & others Before Supreme Court of Pakistan Disposed Dismissed. Crl.M.A. 1558/2018 allowed.
128759 45 Const. P. 514/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Mohammad Ali Hakro (Petitioner) VS Returing Officer and others (Respondent) D.B. 12-JUL-18 Yes Nil.
134272 46 Const. P. 413/2009 (S.B.) Sindh High Court, Circuit at Larkana 2009 Sahib Ali Khan Khoso (Petitioner) VS Mst Maran & others (Applicant) S.B. 07-DEC-18 No Nil.
130750 47 E.P 510/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Shakoor (Petitioner) VS Election Commission of Pakistan and others (Respondent) D.B. 19-JUL-18 No Nil.
134593 48 Cr.Bail 258/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Syed Shakeel Shah & another (Applicant) VS The State (Respondent) S.B. 20-DEC-18 No Nil.
133252 49 E.P 580/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Agha Taimoor Khan (Petitioner) VS Election Commission Of Pakistan & Others (Respondent) D.B. 06-NOV-18 No Nil.
131394 50 Cr.Bail 431/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Bhooro Derkhani (Applicant) VS The State (Respondent) S.B. 17-SEP-18 No Nil.
133783 51 Cr.Misc. 256/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Lal Dino Labano (Applicant) VS S.P Shikarpur & others (Respondent) S.B. 30-NOV-18 No Nil.
134453 52 Cr.Misc. 18/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 Mst. Zarbanu Brohi (Applicant) VS SHO PS Amrote Sharif and others (Respondent) D.B. 04-DEC-18 No Nil.
132452 53 Cr.Bail 474/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Dilawar Kosh & an other (Applicant) VS The State (Respondent) S.B. 18-OCT-18 No Nil.
132767 54 Civil Revision 53/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Rehman Magsi (Applicant) VS SDO Irrigation And Others (Respondent) S.B. 29-OCT-18 No Nil.
132317 55 Cr.Misc. 230/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Suhail Ahmed Khakhrani (Applicant) VS SHO, P.S Keti Mumtaz & others (Respondent) S.B. 11-OCT-18 No Nil.
132375 56 Cr.Rev 19/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Bagh Ali Balouch (Applicant) VS The State (Respondent) S.B. 12-OCT-18 No Nil.
132636 57 Cr.Rev 8/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Nooral Solang (Applicant) VS The State & another (Respondent) D.B. 16-OCT-18 No Nil.
132057 58 Cr.Bail 479/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Yaseen Bangwar (Applicant) VS The State (Respondent) S.B. 05-OCT-18 No Nil.
132059 59 Cr.Acq.A. 15/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 Muhammad Nawaz Soomro (Appellant) VS Muhammad Saleem Khoso & Another (Respondent) D.B. 24-SEP-18 No Nil.
133413 60 Cr.Bail 510/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Liaquat Ali (Applicant) VS The State (Respondent) S.B. 19-NOV-18 No Nil.
133416 61 Civil Revision 74/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Daim and others (Applicant) VS Ishrat Pervaiz and others (Respondent) S.B. 19-NOV-18 No Nil.
133574 62 Cr.Bail 497/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Shafique Ahmed Tunia & others (Applicant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
132058 63 Cr.Bail 491/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Zulfiqar Ali Sangi (Applicant) VS The State (Respondent) S.B. 05-OCT-18 No Nil.
133492 64 Cr.Bail 452/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Inayatullah @ Ghaloo Buriro (Applicant) VS The State (Respondent) S.B. 22-NOV-18 No Nil.
133494 65 Cr.Misc. 142/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Usman Shaikh (Applicant) VS The State & others (Respondent) S.B. 22-NOV-18 No Nil.
131112 66 Cr.Bail 417/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sardar Khan Jatoi (Applicant) VS The State (Respondent) S.B. 10-SEP-18 No Nil.
132832 67 Cr.Bail 502/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Nawaz Sargani & others (Applicant) VS The State (Respondent) S.B. 31-OCT-18 No Nil.
130219 68 Cr.Bail 311/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Kamran Ali Lashari (Applicant) VS The State (Respondent) S.B. 27-AUG-18 No Nil.
131162 69 Cr.Appeal 76/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Farhan Ali Khuhawar & others (Appellant) VS The State (Respondent) S.B. 17-OCT-18 No Nil.
129075 70 Cr.Bail 273/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ganhwar Khan (Applicant) VS The State (Respondent) S.B. 23-JUL-18 No Nil.
132235 71 Cr.Acq.A. 5/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 The State Through P.G Sindh (Appellant) VS Muhammad Saleem Rind (Respondent) D.B. 15-MAR-18 No Nil.
133047 72 Cr.Acq.A. 10/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Muhammad Saifal Chachar (Appellant) VS Akbar Chachar & Others (Respondent) S.B. 05-NOV-18 No Nil.
132954 73 Cr.Bail 463/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Ibrahim Panhwar (Applicant) VS The State (Respondent) S.B. 02-NOV-18 No Nil.
133249 74 Cr.Misc. 302/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst. Nirma Kalhoro (Applicant) VS The State (Respondent) S.B. 13-NOV-18 No Nil.
133578 75 Cr.Rev 55/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Raheem Bux Brohi & others (Applicant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
124006 76 Cr.Appeal 65/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 Mohsin Makol (Appellant) VS The State (Respondent) D.B. 14-FEB-18 No Nil.
131584 77 Cr.Bail 393/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Siraj Ghangro & another (Applicant) VS The State (Respondent) S.B. 26-SEP-18 No Nil.
128534 78 Cr.Appeal 55/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Nooro @ Noor Hussain Bhatti (Appellant) VS The state (Respondent) S.B. 04-JUL-18 No Nil.
132594 79 Civil Revision 61/2011 (S.B.) Sindh High Court, Circuit at Larkana 2011 Bachayo alias Allah Bachayo and others (Applicant) VS Abdullah Jakhro and others (Respondent) S.B. 19-OCT-18 No Nil.
129152 80 Cr.Appeal 39/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Qadir Bux alias Baboo Tunio (Appellant) VS The State (Respondent) D.B. 31-JUL-18 Yes Nil.
129072 81 Cr.Bail 235/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Imdad Ali Jafferi (Applicant) VS The State (Respondent) S.B. 23-JUL-18 No Nil.
132399 82 Cr.Bail 484/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ali Hassan Shar (Applicant) VS The State (Respondent) S.B. 15-OCT-18 No Nil.
131948 83 Cr.Misc. 227/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Meero Khan Abro (Applicant) VS The State (Respondent) S.B. 04-OCT-18 No Nil.
132377 84 Cr.Rev 36/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Azhar Ali Chandio (Applicant) VS Shahan Chandio and Others (Respondent) S.B. 12-OCT-18 No Nil.
130244 85 Cr.Acq.A. 35/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Din Muhammad Sarki (Appellant) VS Khair Jan Khakhrani & Others (Respondent) S.B. 17-AUG-18 No Nil.
134292 86 Cr.Bail 260/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Zahoor Ahmed Soomro (Applicant) VS The State (Respondent) S.B. 10-DEC-18 No Nil.
128617 87 Cr.Acq.A. 36/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Jan Muhammad Gopang (Appellant) VS Saadullah Gopang & others (Respondent) S.B. 09-JUL-18 No Nil.
128595 88 Cr.Bail 225/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muharam Ali Hulio (Applicant) VS The State (Respondent) S.B. 06-JUL-18 No Nil.
128454 89 Cr.Acq.A. 28/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Bashir Ahmed Jhatial (Appellant) VS Nizamudding @ Nizo & others (Respondent) S.B. 02-JUL-18 No Nil.
134653 90 Const. P. 947/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst Saba Batool & another (Petitioner) VS SHO PS Taluka Larkana & others (Respondent) S.B. 24-DEC-18 No Nil.
136181 91 Cr.Rev 13/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Tariq Ali Jatoi & An other (Applicant) VS The State & An other (Respondent) D.B. 19-FEB-19 No Nil.
136180 92 Const. P. 1077/2015 (D.B.) Sindh High Court, Circuit at Larkana 2015 Mst Tajul and another (Petitioner) VS SSP Kashmore and others (Respondent) D.B. 19-FEB-19 No Nil.
133780 93 Cr.Acq.A. 90/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Nadeem Ali Abbasi (Appellant) VS The State & others (Respondent) S.B. 30-NOV-18 No Nil.
135000 94 Cr.Misc. 297/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul karim Khoso (Applicant) VS SHO PS kanga & others (Respondent) S.B. 04-JAN-19 No Nil.
128613 95 Cr.Bail 227/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Tariq Hussain (Applicant) VS The State (Respondent) S.B. 09-JUL-18 No Nil.
133050 96 Cr.Rev 61/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ahmed Ali Shaikh & others (Applicant) VS The State & others (Respondent) S.B. 05-NOV-18 No Nil.
133577 97 Civil Revision 28/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Secretary Works & Services Deprtment Govt of Sindh (Applicant) VS Amanullah Buriro (Respondent) S.B. 26-NOV-18 No Nil.
131400 98 Cr.Acq.A. 56/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Abdul Hameed Sheeno (Appellant) VS Mohammad Ibrahim @ Baggan and Others (Respondent) S.B. 14-SEP-18 No Nil.
134596 99 Cr.Rev 39/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Saleem Ali Chandio (Applicant) VS The State (Respondent) S.B. 20-DEC-18 No Nil.
132412 100 Cr.Bail 522/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Manzoor Ahmed Kosh (Applicant) VS The State (Respondent) S.B. 15-OCT-18 No Nil.
132654 101 Cr.Acq.A. 63/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Nasrullah Suhriyani (Appellant) VS Jalal @ Baloch Khan & Another (Respondent) S.B. 25-OCT-18 No Nil.
132762 102 Cr.Bail 515/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Hussain Ali Buriro (Applicant) VS The State (Respondent) S.B. 29-OCT-18 No Nil.
134592 103 Civil Revision 41/2011 (S.B.) Sindh High Court, Circuit at Larkana 2011 Noor Ahmed Umrani and others (Applicant) VS Muhammad Murad and others (Respondent) S.B. 21-DEC-18 No Nil.
130748 104 E.P 521/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Attaullah Bhutto (Petitioner) VS Election Commission Of Pakistan & Others (Respondent) D.B. 19-JUL-18 No Nil.
132596 105 Cr.Acq.A. 38/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Nizamuddin Dool (Appellant) VS Abdul Haq Dool & others (Respondent) S.B. 19-OCT-18 No Nil.
133250 106 Const. P. 179/2012 (D.B.) Sindh High Court, Circuit at Larkana 2012 Muneer Ahmed Jatoi and ors (Petitioner) VS Director Anti-Corruption Karachi and others (Respondent) D.B. 14-NOV-18 No Nil.
132056 107 Cr.Bail 440/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Allah Dino Bangwar & others (Applicant) VS The State (Respondent) S.B. 05-OCT-18 No Nil.
129172 108 Cr.Acq.A. 12/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 The State through P.G Sindh (Appellant) VS Rashid Brohi & Another (Respondent) D.B. 01-AUG-18 No Nil.
133421 109 Cr.Appeal 26/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Khawand Bux Jakhrani (Appellant) VS The State (Respondent) S.B. 19-NOV-18 No Nil.
131764 110 Cr.J.A 9/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 Ghulam Rabbani @ Washo (Appellant) VS The State (Respondent) D.B. 01-OCT-18 No Nil.
133876 111 Civil Revision 78/2011 (S.B.) Sindh High Court, Circuit at Larkana 2011 Muhammad Mubarak (Applicant) VS Noor Hassan and others (Respondent) S.B. 06-DEC-18 No Nil.
133779 112 Cr.Rev 42/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Ali Muhammad Junejo and Another (Applicant) VS The State (Respondent) S.B. 29-NOV-18 No Nil.
133782 113 Cr.Misc. 255/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst. Sumera Shaikh (Applicant) VS SHO, P.S Dari Larkana & others (Respondent) S.B. 30-NOV-18 No Nil.
131401 114 Cr.Misc. 193/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Haji Abdul Rauf (Applicant) VS S.H.O, P.S, Kashmore & Others (Respondent) S.B. 17-SEP-18 No Nil.
132759 115 Cr.Bail 197/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Wazir Narejo (Applicant) VS The State (Respondent) S.B. 29-OCT-18 No Nil.
132640 116 Cr.Tran 63/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Hassan Lolai (Appellant) VS Imran Ahmed Kalar & others (Respondent) S.B. 22-OCT-18 No Nil.
133519 117 Cr.Appeal 13/2013 (S.B.) Sindh High Court, Circuit at Larkana 2013 Nadir Ali Lashari and others (Appellant) VS The State (Respondent) S.B. 23-NOV-18 No Nil.
132953 118 Cr.Bail 400/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Gulsher jatoi & an other (Applicant) VS The State (Respondent) S.B. 02-NOV-18 No Nil.
132997 119 Cr.Misc. 31/2009 (S.B.) Sindh High Court, Circuit at Larkana 2009 P.C Zulfiqar Ali Jakhrani (Applicant) VS Shah Muhammad and others (Respondent) S.B. 02-NOV-18 Yes Nil.
132120 120 Cr.Acq.A. 52/2013 (D.B.) Sindh High Court, Circuit at Larkana 2013 Khan Junejo (Appellant) VS Sadaruddin and others (Respondent) D.B. 17-SEP-18 No Nil.
132669 121 Civil Revision 58/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Attique Rehman Soomro (Applicant) VS Khadim Hussain Soomro & others (Respondent) S.B. 26-OCT-18 Yes Nil.
132712 122 Cr.Bail 466/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Arshad alias Lalan Shah (Applicant) VS The State (Respondent) S.B. 26-OCT-18 No Nil.
128532 123 Const. P. 630/2016 (D.B.) Sindh High Court, Circuit at Larkana 2016 Imtiaz Ali Kanrani (Petitioner) VS Nazar Muhammad Kanrani and others (Respondent) D.B. 05-JUL-18 No Nil.
133870 124 Cr.Rev 15/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst. Khurshed Begum (Applicant) VS SHO PS Radhan & others (Respondent) S.B. 03-DEC-18 No Nil.
128833 125 Cr.Bail 133/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ali Hyder Chabro (Applicant) VS The State (Respondent) S.B. 16-JUL-18 No Nil.
129657 126 Cr.Bail 347/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Gulzar Mugheri (Applicant) VS The State (Respondent) S.B. 10-AUG-18 No Nil.
133867 127 Cr.Bail 404/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Majeed Mugheri (Applicant) VS The State (Respondent) S.B. 03-DEC-18 No Nil.
128713 128 E.P 482/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Aweez Khan Mugheri (Petitioner) VS Honourable Sessions Judge JCD & others (Respondent) D.B. 11-JUL-18 No Nil.
130220 129 Cr.Bail 360/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Manzoor Ahmed Bhatti (Applicant) VS The State (Respondent) S.B. 27-AUG-18 No Nil.
130444 130 Election Appeal 1/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Mohammad Waris Mastoi (Appellant) VS Mushtaque Ahmed alias Punhal Khan and Others (Respondent) S.B. 31-AUG-18 No Nil.
134304 131 Cr.Bail 577/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Asif Buriro (Applicant) VS The State (Respondent) S.B. 10-DEC-18 No Nil.
134372 132 Cr.Bail 476/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ghulam Mustafa Kosh (Applicant) VS The State (Respondent) S.B. 13-DEC-18 No Nil.
128852 133 Cr.Appeal 35/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Nasrullah Rind (Appellant) VS The State (Respondent) S.B. 16-JUL-18 No Nil.
124001 134 Cr.Acq.A. 18/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Qamaruddin Kalhoro (Appellant) VS Noor Ahmed Kalhoro & Others (Respondent) S.B. 23-FEB-18 No Nil.
128592 135 Const. P. 496/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Nisar Ahmed Khuhro (Petitioner) VS Election Appellate Tribunal Sukkur and others (Respondent) D.B. 06-JUL-18 No Nil.
128912 136 E.P 494/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Qurban Ali (Petitioner) VS Election Commission Of Pakistan & ors (Respondent) D.B. 18-JUL-18 No Nil.
134640 137 Civil Revision 4/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Anwar Nabi and others (Appellant) VS P.O.Sindh, and others (Respondent) S.B. 24-DEC-18 No Nil.
129134 138 Cr.Bail 281/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Bashir Ahmed (Applicant) VS The State (Respondent) S.B. 30-JUL-18 No Nil.
133777 139 Cr.Acq.A. 59/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 ASI Ameer Ali Shah (Appellant) VS Mumtaz Ali Soomro & An other (Respondent) S.B. 29-NOV-18 No Nil.
134406 140 Cr.Misc. 305/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 ALI HYDER TANWERI (Applicant) VS SHO PS DAIM MALIK & OTHERS (Respondent) S.B. 17-DEC-18 No Nil.
131589 141 Cr.Misc. 137/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Saifal Mugheri (Applicant) VS Abdul Ghani and others (Respondent) S.B. 26-SEP-18 Yes Nil.
131633 142 Cr.Misc. 21/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sharafuddin Bughio (Applicant) VS The State & others (Respondent) S.B. 28-SEP-18 No Nil.
131815 143 Cr.Misc. 223/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Wali Muhammad Zardari (Applicant) VS Zahid Hussain Wadho & others (Respondent) S.B. 03-OCT-18 No Nil.
128954 144 E.P 496/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Nisar Ahmed Khuhro (Petitioner) VS Election Appellate Tribunal Sukkur and others (Respondent) D.B. 19-JUL-18 No Nil.
132834 145 Cr.Appeal 37/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Rajib Chandio (Appellant) VS The State (Respondent) S.B. 31-OCT-18 No Nil.
133155 146 Cr.Bail 184/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mansoor Ali Tunio (Applicant) VS The State (Respondent) S.B. 09-NOV-18 No Nil.
132253 147 Cr.Bail 412/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Piyar Ali Machhi (Applicant) VS The State (Respondent) S.B. 10-OCT-18 No Nil.
132641 148 Cr.Tran 66/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Hazoor Bux Jatoi (Appellant) VS The State (Respondent) S.B. 22-OCT-18 No Nil.
132768 149 Civil Revision 65/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Raza Hussain Kandhro (Applicant) VS Mushtaque Ali Kolachi and others (Respondent) S.B. 29-OCT-18 No Nil.
132652 150 Cr.Acq.A. 36/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Ghulam Hussain Soomro (Appellant) VS Anwar Ali Soomro & Another (Respondent) S.B. 25-OCT-18 No Nil.
132670 151 Cr.Acq.A. 50/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Tariq Ali Rind (Appellant) VS Ghulam Shabir Unnar and others (Respondent) S.B. 25-OCT-18 No Nil.
132956 152 Cr.Acq.A. 53/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Ghani khoso (Appellant) VS Murad @ M. Murad Khosa & others (Respondent) S.B. 02-NOV-18 No Nil.
130744 153 E.P 540/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Abid Hussain Bhatti (Petitioner) VS Federation Of Pakistan & Others (Respondent) D.B. 18-JUL-18 No Nil.
133046 154 Cr.Bail 480/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Javed Ali Khor & an other (Applicant) VS The State (Respondent) S.B. 05-NOV-18 No Nil.
133575 155 Cr.Bail 503/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Siraj Ali Siyal & an other (Applicant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
133418 156 Cr.Acq.A. 7/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Ali Khan Noonari (Appellant) VS Ali Murad Noonari and others (Respondent) S.B. 19-NOV-18 No Nil.
131396 157 Civil Revision 66/2010 (S.B.) Sindh High Court, Circuit at Larkana 2010 Sikandar Ali Bhangwar and another (Applicant) VS Badaruddin Awan and others (Respondent) S.B. 14-SEP-18 Yes Nil.
133420 158 Cr.Misc. 398/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Ghous Bux Chachar (Applicant) VS The Statae and Others (Respondent) S.B. 19-NOV-18 No Nil.
133557 159 Cr.Bail 221/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Nazeer Shar (Applicant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
132773 160 Cr.Misc. 368/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Mst. Farzana Solangi (Applicant) VS S.H.O, P.S Nasirabad and Others (Respondent) S.B. 29-OCT-18 No Nil.
134315 161 Cr.Misc. 87/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Faqeer Muhammad Korejo (Applicant) VS Deedar Ali Kalhoro & Others (Respondent) S.B. 10-DEC-18 No Nil.
130746 162 E.P 500/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Ali Anwar Bhayo (Petitioner) VS Abid Hussain Jatoi and others (Respondent) D.B. 19-JUL-18 No Nil.
131161 163 Cr.Appeal 68/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Inam Ali Khoso (Appellant) VS The State (Respondent) S.B. 12-SEP-18 No Nil.
132401 164 Cr.Rev 30/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mohammad Saddar Khoso (Applicant) VS Photo and Others (Respondent) S.B. 15-OCT-18 No Nil.
133158 165 Const. P. 1126/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Abdullah Sarki (Petitioner) VS Mst; Mumtaz Begum and others (Respondent) S.B. 09-NOV-18 No Nil.
133165 166 Cr.Misc. 402/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Sada Bux Brohi (Applicant) VS The State and Others (Respondent) S.B. 09-NOV-18 No Nil.
133414 167 Cr.Bail 521/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sajjad Tunio & others (Applicant) VS The State (Respondent) S.B. 19-NOV-18 No Nil.
133567 168 Cr.Bail 465/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Tayyab Kandhro (Applicant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
133393 169 Cr.Rev 41/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Tarique Hussain Soomro (Applicant) VS The State (Respondent) S.B. 16-NOV-18 No Nil.
133422 170 Cr.Misc. 117/2012 (S.B.) Sindh High Court, Circuit at Larkana 2012 Muhammad Rafique Kandhro (Applicant) VS Muhammad Ayoub Chinjni (Respondent) S.B. 19-NOV-18 No Nil.
133871 171 Cr.Rev 48/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Nasrullah Khoso (Applicant) VS Sessions Judge Kandhkot & others (Respondent) S.B. 03-DEC-18 No Nil.
132116 172 Const. P. 315/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Mazno @ Gahi Khan Abro (Petitioner) VS Syed Nadir Ali Shah and others (Respondent) D.B. 09-OCT-18 No Nil.
128594 173 Cr.Bail 106/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Munir Jatoi (Applicant) VS The State (Respondent) S.B. 06-JUL-18 No Nil.
133868 174 Civil Revision 42/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Nawabzada Muhammad Akbar (Applicant) VS Principal Shah Latif and others (Respondent) S.B. 03-DEC-18 No Nil.
129079 175 Cr.Misc. 138/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhib Ali Jessar (Applicant) VS I.G of Sindh Police and others (Respondent) S.B. 23-JUL-18 No Nil.
133781 176 Cr.Misc. 254/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst Basran Kharos (Applicant) VS SHO, P.S Ali Goharabad & others (Respondent) S.B. 30-NOV-18 No Nil.
130221 177 Cr.Bail 402/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Imamuddin Bugti (Applicant) VS The State (Respondent) S.B. 27-AUG-18 No Nil.
130443 178 Cr.Acq.A. 64/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Sobhraj Hindu (Appellant) VS Aabid Hussain and Another (Respondent) S.B. 31-AUG-18 No Nil.
134452 179 Cr.Acq.A. 7/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Sahib Khan Babar (Appellant) VS Imtiaz Babar and Others (Respondent) D.B. 18-DEC-18 No Nil.
134999 180 Const. P. 966/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Amin Abbasi (Petitioner) VS SHO P.S Sachal, Lrk and others (Respondent) S.B. 04-JAN-19 No Nil.
134378 181 Cr.Tran 77/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ali Ashraf @ Wilayat Chandio & others (Appellant) VS Shahid Ali Thebo & others (Respondent) S.B. 13-DEC-18 No Nil.
128955 182 Cr.Acq.A. 37/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Naveed Ali Junejo (Appellant) VS Abdul Hameed and others (Respondent) S.B. 20-JUL-18 No Nil.
128456 183 Cr.Misc. 172/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst. Marvi Mangi (Applicant) VS SHO P.S Nasirabad & others (Respondent) S.B. 02-JUL-18 No Nil.
128712 184 Cr.Appeal 12/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Dur Muhammad Jatoi (Appellant) VS The State (Respondent) D.B. 11-JUL-18 No Nil.
131393 185 Cr.Bail 425/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Shahmir Jafri (Applicant) VS The State (Respondent) S.B. 14-SEP-18 No Nil.
131397 186 Cr.Acq.A. 5/2015 (S.B.) Sindh High Court, Circuit at Larkana 2015 Waqar Ahmed Khoso (Appellant) VS Rabnawaz Sarki and another (Respondent) S.B. 17-SEP-18 No Nil.
132055 187 Cr.Bail 439/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ali Sher Golato (Applicant) VS The State (Respondent) S.B. 05-OCT-18 No Nil.
131586 188 Cr.Acq.A. 23/2013 (D.B.) Sindh High Court, Circuit at Larkana 2013 Khalil Ahmed Shaikh (Appellant) VS Ashfaque Ahmed Shaikh & another (Respondent) D.B. 03-SEP-18 No Nil.
131812 189 Cr.Bail 473/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Asghar Siyanch (Applicant) VS The State (Respondent) S.B. 03-OCT-18 No Nil.
132060 190 Cr.Misc. 153/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Ghulam Hassan @ Ghullam Hussain & Another (Applicant) VS Habibullah Pathan & Another (Respondent) S.B. 05-OCT-18 No Nil.
132068 191 Cr.Misc. 51/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mukhtiar Ali Kolachi (Applicant) VS The State & others (Respondent) S.B. 18-SEP-18 Yes Nil.
130751 192 E.P 551/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Shakoor Ogahi (Petitioner) VS Election Commission of Pakisan (Respondent) D.B. 19-JUL-18 No Nil.
132234 193 Cr.J.A 88/2013 (D.B.) Sindh High Court, Circuit at Larkana 2013 Allah Dino Soomro (Appellant) VS The State (Respondent) D.B. 09-OCT-18 No Nil.
131160 194 Cr.Bail 468/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Dr Safiullah Abbasi & Another (Applicant) VS The State (Respondent) S.B. 12-SEP-18 No Nil.
132237 195 Cr.Acq.A. 1/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 The State through Prosecutor General (Appellant) VS Mumtaz Buriro (Respondent) D.B. 14-MAR-18 No Nil.
132653 196 Cr.Acq.A. 37/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Ghulam Hussain Soomro (Appellant) VS Ameer Bux @ Munwar Ali Soomro & Another (Respondent) S.B. 25-OCT-18 No Nil.
130747 197 E.P 520/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Ghulam Asghar Khan Chachar & an Others (Petitioner) VS Returning Officer Jacobabad & Others (Respondent) D.B. 19-JUL-18 No Nil.
133879 198 Cr.Appeal 58/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sain Bux Jatoi & another (Appellant) VS The State (Respondent) S.B. 06-DEC-18 No Nil.
133392 199 Cr.Appeal 16/2013 (S.B.) Sindh High Court, Circuit at Larkana 2013 Niaz Ali Jamali (Appellant) VS The State (Respondent) S.B. 16-NOV-18 No Nil.
133579 200 Cr.Appeal 38/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Misri Khan Jatoi (Appellant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
131403 201 Cr.Rev 23/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Abdul Rehman Mazari (Applicant) VS Addl. Sessions Judge, Kashmore & Another (Respondent) S.B. 14-SEP-18 No Nil.
133517 202 Cr.Rev 58/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 SIP Fida Hussain Langah (Applicant) VS The State (Respondent) S.B. 23-NOV-18 No Nil.
133775 203 Cr.Misc. 231/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Inspector Miran Khan Durani & an others (Applicant) VS SHO, P.S Fatehpur & others (Respondent) S.B. 29-NOV-18 No Nil.
130739 204 Cr.Rev 12/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Noor-ul-Huda Chandio (Applicant) VS Abdul Rasool Chandio & Others (Respondent) S.B. 05-SEP-18 No Nil.
132400 205 Cr.Bail 523/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Manzoor Ahmed Kosh (Applicant) VS The State (Respondent) S.B. 15-OCT-18 No Nil.
132955 206 Cr.Acq.A. 17/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Rauf Soomro (Appellant) VS Ahmed Ali Mugheri & another (Respondent) S.B. 02-NOV-18 No Nil.
134374 207 Cr.Bail 464/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Liaquat Ali Buledi (Applicant) VS The State (Respondent) S.B. 13-DEC-18 No Nil.
132232 208 Cr.Acq.A. 45/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Azam Ali Soomro (Appellant) VS Lal Bux Jamali & others (Respondent) S.B. 08-OCT-18 No Nil.
132592 209 Cr.Bail 243/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Rehmatullah Marfani (Applicant) VS The State (Respondent) S.B. 19-OCT-18 No Nil.
123992 210 Const. P. 152/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Himat Ali Khoso (Petitioner) VS V/S P.O Sindh & others (Respondent) D.B. 26-FEB-18 No Nil.
132477 211 Cr.Appeal 47/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Shah Murad Jafferi (Appellant) VS The State (Respondent) S.B. 18-OCT-18 No Nil.
129135 212 Cr.J.A 112/2010 (S.B.) Sindh High Court, Circuit at Larkana 2010 Hamzo Jafery (Appellant) VS The State (Respondent) S.B. 30-JUL-18 No Nil.
129655 213 Cr.Bail 374/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sajjan Sabzoi (Applicant) VS The State (Respondent) S.B. 13-AUG-18 No Nil.
132735 214 Cr.Tran 35/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Inayat Chachar & others (Appellant) VS The State (Respondent) S.B. 26-OCT-18 No Nil.
133580 215 Cr.Bail 590/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Faheem Raza Bouk and others (Applicant) VS The state (Respondent) S.B. 21-DEC-18 No Nil.
134597 216 Cr.Rev 67/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ali Nawaz & Another (Applicant) VS The State (Respondent) S.B. 20-DEC-18 No Nil.
129077 217 Cr.Bail 291/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Riaz Hussain Khoso (Applicant) VS The State (Respondent) S.B. 23-JUL-18 No Nil.
129080 218 Cr.Tran 31/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Qabil Malik (Appellant) VS Abdul Rasool Malik & another (Respondent) S.B. 23-JUL-18 No Nil.
130738 219 Const. P. 37/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 The Chairman NADRA and another (Petitioner) VS M/S Trading Corporation Pakistan and others (Respondent) S.B. 05-SEP-18 No Nil.
133784 220 Cr.Misc. 283/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Ghafar Mahar (Applicant) VS Abdul Malik Mahar & others (Respondent) S.B. 30-NOV-18 No Nil.
129033 221 Cr.Acq.A. 6/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Dili Jan Bugti (Appellant) VS The State and Others (Respondent) S.B. 20-JUL-18 No Nil.
134998 222 Cr.Bail 769/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ghulam Rasool Channa (Applicant) VS The State (Respondent) S.B. 04-JAN-19 No Nil.
128414 223 Const. P. 487/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Asghar Ali Shaikh (Petitioner) VS Chief Election Commissioner of Pakistan & others (Respondent) D.B. 05-JUL-18 No Nil.
131163 224 Cr.Appeal 78/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Khan Mirani (Appellant) VS The State (Respondent) S.B. 12-SEP-18 No Nil.
131402 225 Cr.Misc. 194/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst; Zareena Magsi (Applicant) VS Ali Khan & others (Respondent) S.B. 14-SEP-18 No Nil.
134408 226 Cr.Rev 53/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Barkat Ali Naich (Applicant) VS The State (Respondent) S.B. 17-DEC-18 No Nil.
131763 227 Cr.Tran 23/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Khan Chandio (Appellant) VS Abdul Jabbar Chandio & others (Respondent) S.B. 01-OCT-18 No Nil.
132054 228 Cr.Bail 253/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Rawat Ali Abro (Applicant) VS The State (Respondent) S.B. 05-OCT-18 No Nil.
128614 229 Cr.Bail 310/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ouzal Khan Pathan (Applicant) VS The State (Respondent) S.B. 09-JUL-18 No Nil.
131398 230 Cr.Acq.A. 21/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ali Gohar Jalbani (Appellant) VS Shah Nawaz @ Bado & others (Respondent) S.B. 17-SEP-18 No Nil.
131582 231 Cr.Bail 388/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Daim Khan Totani (Applicant) VS The State (Respondent) S.B. 25-SEP-18 No Nil.
131813 232 Cr.Acq.A. 74/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Abdul Malik Soondhro (Appellant) VS Abdul Sattar & another (Respondent) S.B. 03-OCT-18 No Nil.
132061 233 Cr.Misc. 242/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abid Ali Kalhoro (Applicant) VS SHO P.S Bakrani & others (Respondent) S.B. 05-OCT-18 No Nil.
132062 234 Cr.Tran 33/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Farooque (Appellant) VS SIP Abdul Salam and others (Respondent) S.B. 05-OCT-18 No Nil.
134598 235 Cr.Rev 70/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mohammad Saleem Janwri (Applicant) VS The State (Respondent) S.B. 20-DEC-18 No Nil.
130741 236 E.P 511/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Ramzan Soomro (Petitioner) VS Election Commision of Pakistan and others (Respondent) D.B. 18-JUL-18 No Nil.
131814 237 Cr.Misc. 129/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Chhato Khan and others (Applicant) VS The State and another (Respondent) S.B. 03-OCT-18 No Nil.
130742 238 E.P 522/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Ibrahim Chachar (Petitioner) VS Returning Officer Kashmore @ Kandhkot & Others (Respondent) D.B. 19-JUL-18 No Nil.
132770 239 Cr.Acq.A. 14/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst. Wazeeran (Appellant) VS Abu Bakar & Others (Respondent) S.B. 29-OCT-18 No Nil.
132252 240 Cr.Bail 267/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sajid Marfani (Applicant) VS The State (Respondent) S.B. 10-OCT-18 No Nil.
132730 241 Cr.Misc. 367/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Shahzado Pahore (Applicant) VS Muhammad Soomar Pahore anf Another (Respondent) S.B. 26-OCT-18 No Nil.
132761 242 Cr.Bail 514/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Banhon Khan Bangulani (Applicant) VS The state (Respondent) S.B. 29-OCT-18 No Nil.
132835 243 Cr.Appeal 56/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Sattar Chandio (Appellant) VS The State (Respondent) S.B. 31-OCT-18 No Nil.
134493 244 Const. P. 757/2012 (D.B.) Sindh High Court, Circuit at Larkana 2012 Sabir Hussain Harhoo (Petitioner) VS P.O Special Judge ATC Larkana and others (Respondent) D.B. 19-DEC-18 No Nil.
136183 245 Const. P. 374/2016 (D.B.) Sindh High Court, Circuit at Larkana 2016 Aijaz Ali Abro and others (Petitioner) VS PO Sindh and others (Respondent) D.B. 15-JAN-19 No Nil.
132952 246 Cr.Bail 288/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Rehmatullah Khoso (Applicant) VS The State (Respondent) S.B. 02-NOV-18 No Nil.
133275 247 Cr.Misc. 98/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst Sehat Khatoon Jatoi (Applicant) VS SHO PS Faizoo & others (Respondent) S.B. 15-NOV-18 No Nil.
133415 248 Cr.Bail 546/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Tofique Ahmed Tunio (Applicant) VS The State (Respondent) S.B. 19-NOV-18 No Nil.
133417 249 Cr.Acq.A. 5/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Mst Shabana Gul Malghani (Appellant) VS Nek Muhammad Malgani and others (Respondent) S.B. 19-NOV-18 No Nil.
133869 250 Civil Revision 9/2009 (S.B.) Sindh High Court, Circuit at Larkana 2009 Naveed Akhtar Bhatti (Applicant) VS Mst. Sameena Bhatti (Respondent) S.B. 03-DEC-18 No Nil.
129073 251 Cr.Bail 262/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Shafi Mohammad and another (Applicant) VS The State (Respondent) S.B. 23-JUL-18 No Nil.
131938 252 Cr.Bail 512/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Irfan Ali Gopang (Applicant) VS The State (Respondent) S.B. 04-OCT-18 No Nil.
134376 253 Cr.Appeal 16/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Taj Muhammad Mugheri (Appellant) VS The State (Respondent) S.B. 13-DEC-18 No Nil.
134403 254 Cr.Acq.A. 3/2015 (S.B.) Sindh High Court, Circuit at Larkana 2015 Muzafar Ali Bhutto (Appellant) VS Noor Muhammad Shah and others (Respondent) S.B. 17-DEC-18 No Nil.
134465 255 Civil Revision 34/2012 (S.B.) Sindh High Court, Circuit at Larkana 2012 Hafizullah Chandio (Applicant) VS Faiz Mohammad Leghari and Others (Respondent) S.B. 19-NOV-18 No Nil.
132771 256 Cr.J.A 6/2013 (S.B.) Sindh High Court, Circuit at Larkana 2013 Ghulam Sarwar Jagirani (Appellant) VS The State (Respondent) S.B. 29-OCT-18 Yes Nil.
133048 257 Cr.Acq.A. 44/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Zulfiqar Ali Mangi (Appellant) VS Fida Hussain Magsi (Respondent) S.B. 05-NOV-18 No Nil.
132957 258 Cr.Misc. 186/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Rustam Khan Mugheri (Applicant) VS SHO P.S Kamber City & others (Respondent) S.B. 02-NOV-18 No Nil.
133159 259 Cr.Acq.A. 7/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mst. Shamshad Begum (Appellant) VS Mir Ahmed And Others (Respondent) S.B. 09-NOV-18 No Nil.
131111 260 Cr.Bail 364/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ghulam Rasool Depar (Applicant) VS The State (Respondent) S.B. 10-SEP-18 No Nil.
131585 261 Cr.Appeal 71/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Usman Lakhair & others (Appellant) VS The State (Respondent) S.B. 26-SEP-18 No Nil.
130442 262 Cr.Acq.A. 13/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sobhraj Hindu (Appellant) VS Nazeer Ahmed Gopang and another (Respondent) S.B. 31-AUG-18 No Nil.
129114 263 2019 YLR 228 Cr.Misc. 131/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Aslam Pervaiz Abro and an others (Applicant) VS Tameer Ali Dinari and others (Respondent) S.B. 27-JUL-18 Yes Nil.
129652 264 Cr.Bail 140/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Manzoor Ali Kosh (Applicant) VS The State (Respondent) S.B. 10-AUG-18 No Nil.
129656 265 Cr.Bail 100/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Ishaque @ Meer Brohi (Applicant) VS The State (Respondent) S.B. 13-AUG-18 No Nil.
131937 266 Cr.Bail 418/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Majeed Chandio (Applicant) VS The State (Respondent) S.B. 04-OCT-18 No Nil.
133881 267 Cr.Misc. 118/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Saleemullah Abbasi (Applicant) VS SHO P.S Civil Line and others (Respondent) S.B. 06-DEC-18 No Nil.
129113 268 Cr.Bail 315/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Bakhshal Chandio (Applicant) VS The State (Respondent) S.B. 27-JUL-18 No Nil.
133785 269 Cr.Misc. 286/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ghulam Ali Jatoi & others (Applicant) VS I.O P.S Akil Larkana & others (Respondent) S.B. 30-NOV-18 No Nil.
132713 270 Cr.Bail 508/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Rajib Ali Machhi (Applicant) VS The State (Respondent) S.B. 26-OCT-18 No Nil.
132714 271 Cr.Acq.A. 78/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Mohammad Rafique Panhyar (Appellant) VS Ghulam Rasool & Another (Respondent) S.B. 26-OCT-18 No Nil.
133049 272 Cr.Appeal 9/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sada Bux Kharos (Appellant) VS The State (Respondent) S.B. 05-NOV-18 No Nil.
129078 273 Cr.Bail 309/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Parwaiz Ahmed Pathan (Applicant) VS The State (Respondent) S.B. 23-JUL-18 No Nil.
128616 274 Cr.Bail 318/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sikander Ali Brohi (Applicant) VS The State (Respondent) S.B. 09-JUL-18 No Nil.
130743 275 E.P 539/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Abid Hussain Bhatti (Petitioner) VS Federtion Of Pakistan & Others (Respondent) D.B. 18-JUL-18 No Nil.
131635 276 Cr.Appeal 57/2012 (S.B.) Sindh High Court, Circuit at Larkana 2012 Ghulam Ali Arbani (Applicant) VS The State (Respondent) S.B. 28-SEP-18 No Nil.
124005 277 Cr.J.A 1/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Jawad Khan Pathan (Appellant) VS The State (Respondent) D.B. 28-FEB-18 No Nil.
128618 278 Cr.Misc. 49/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Abdul Rehman Brohi (Applicant) VS SHO PS Hydri & others (Respondent) S.B. 09-JUL-18 No Nil.
128834 279 Cr.Bail 263/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Zeeshan Mirani (Applicant) VS The State (Respondent) S.B. 16-JUL-18 No Nil.
123933 280 Cr.Acq.A. 37/2009 (S.B.) Sindh High Court, Circuit at Larkana 2009 Sultan Ahmed Soomro (Applicant) VS Ali Mohammad & others (Respondent) S.B. 19-FEB-18 Yes Nil.
130445 281 Election Appeal 2/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Zulfiqar Ali Mastoi (Appellant) VS The Presiding Officer Shahdadkot and Others (Respondent) S.B. 31-AUG-18 No Nil.
131108 282 Cr.Bail 180/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Nabi Bux Lashari (Applicant) VS The State (Respondent) S.B. 10-SEP-18 No Nil.
131588 283 Cr.Acq.A. 22/2007 (S.B.) Sindh High Court, Circuit at Larkana 2007 Haji Bashir Ahmed (Appellant) VS Bashir Ahmed Suhag & ors: (Respondent) S.B. 24-SEP-18 No Nil.
131944 284 Cr.Acq.A. 62/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Nadir Ali Jiskani (Appellant) VS Javed Ali Lashari and Others (Respondent) S.B. 04-OCT-18 No Nil.
133776 285 Cr.Acq.A. 10/2012 (S.B.) Sindh High Court, Circuit at Larkana 2012 Arshad Ameen Amrohi (Appellant) VS Kamaluddin Siddique and others (Respondent) S.B. 09-NOV-18 No Nil.
132318 286 Cr.Tran 34/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sabir Hussain Magsi (Appellant) VS Qurban Ali Khoso and others (Respondent) S.B. 11-OCT-18 No Nil.
133171 287 Cr.Misc. 238/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Shabir Ahmed (Applicant) VS S.H.O, P.S, Jamal Distt. Kashmore & Others (Respondent) S.B. 12-NOV-18 No Nil.
132026 288 Cr.J.A 13/2014 (D.B.) Sindh High Court, Circuit at Larkana 2014 Shahzad Mughal (Appellant) VS The State (Respondent) D.B. 08-MAR-18 Yes Nil.
133251 289 Const. P. 1025/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 Islam-ud-Din Solangi (Petitioner) VS Zarai Tarqiati Bank Limited and others (Respondent) D.B. 01-NOV-18 No Nil.
133684 290 Const. P. 2117/2011 (D.B.) Sindh High Court, Circuit at Larkana 2011 Abdul Sattar Kehar (Petitioner) VS PO Sindh and others (Respondent) D.B. 14-NOV-18 No Nil.
131816 291 Cr.Tran 43/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ayaz Ali Mugeri (Appellant) VS The State (Respondent) S.B. 03-OCT-18 No Nil.
131761 292 Const. P. 239/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Akbar Shah & others (Petitioner) VS P.O Sindh & others (Respondent) S.B. 01-OCT-18 Yes Nil.
132233 293 Cr.Misc. 250/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 ABDUL AHAD & OTHERS (Applicant) VS MST SOOMRE & OTHERS (Respondent) S.B. 08-OCT-18 No Nil.
134377 294 Cr.Rev 22/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Shoukat Ali Kalhoro (Applicant) VS Ashique Ali Kalhoro and others (Respondent) S.B. 13-DEC-18 No Nil.
134375 295 Cr.Acq.A. 3/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Maqbool Ahmed Khuhawar (Appellant) VS Ghulam Mohammad and others (Respondent) S.B. 13-DEC-18 No Nil.
133156 296 Cr.Bail 247/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Sajid Hussain @ Baboo Tunio (Applicant) VS The State (Respondent) S.B. 09-NOV-18 No Nil.
135016 297 Cr.Rev 29/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mohammad Ayoob Pathan (Applicant) VS The State (Respondent) S.B. 07-JAN-19 No Nil.
131399 298 Cr.Acq.A. 24/2015 (S.B.) Sindh High Court, Circuit at Larkana 2015 Asif Pervaiz Mahar (Appellant) VS The state and others (Respondent) S.B. 14-SEP-18 No Nil.
133495 299 Cr.J.A 42/2013 (S.B.) Sindh High Court, Circuit at Larkana 2013 Dodo @ Muhammad Yakoob Junejo (Appellant) VS The State (Respondent) S.B. 22-NOV-18 No Nil.
133576 300 Cr.Bail 603/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Irfan Ahmed Jagirani (Applicant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
134307 301 Cr.Bail 581/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Shadi Khan Kherra & others (Applicant) VS The State (Respondent) S.B. 10-DEC-18 No Nil.
134313 302 Cr.Appeal 46/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Bashir Ahmed & Others (Appellant) VS The State (Respondent) S.B. 10-DEC-18 No Nil.
133419 303 Cr.Appeal 90/2009 (S.B.) Sindh High Court, Circuit at Larkana 2009 Buxial @ Suhno Lakhair & another (Appellant) VS The State (Respondent) S.B. 19-NOV-18 No Nil.
133774 304 Cr.Misc. 66/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Inspector Zulfiqar Ali & others (Applicant) VS SHO PS Rehmatpur Larkana & others (Respondent) S.B. 29-NOV-18 No Nil.
130745 305 E.P 533/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Imtiaz Ali Jaffri Baloch (Petitioner) VS Federation Of Pakistan & Others (Respondent) D.B. 18-JUL-18 No Nil.
133163 306 Cr.Acq.A. 41/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Rustam Ali Khokhar (Appellant) VS Ghulam Muzamil Soomro and others (Respondent) S.B. 09-NOV-18 No Nil.
132593 307 Cr.Bail 355/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ghulam Nabi @ Ghulam Hussain (Applicant) VS The state (Respondent) S.B. 19-OCT-18 No Nil.
132875 308 Civil Revision 61/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Raheela Ashfaq and Another (Applicant) VS Mir Muhabat Ali Khuhro and others (Respondent) S.B. 01-NOV-18 No Nil.
132236 309 Cr.Acq.A. 6/2017 (D.B.) Sindh High Court, Circuit at Larkana 2017 Riaz Ahmed Khokhar (Appellant) VS Haji Manzoor Ahmed Qureshi (Respondent) D.B. 26-FEB-18 No Nil.
133092 310 Civil Revision 57/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Akhtiar Ali Lahori (Applicant) VS Federation of Pakistan & others (Respondent) S.B. 08-NOV-18 No Nil.
129136 311 Cr.Appeal 24/2016 (D.B.) Sindh High Court, Circuit at Larkana 2016 Jacom Malik (Appellant) VS The State (Respondent) D.B. 17-JUL-18 No Nil.
133573 312 Cr.Bail 494/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Irshad Ali Siyal & Another (Applicant) VS The State (Respondent) S.B. 26-NOV-18 No Nil.
130441 313 Cr.Bail 176/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ameen Khakhrani (Applicant) VS The State (Respondent) S.B. 31-AUG-18 No Nil.
131116 314 Cr.Rev 46/2016 (S.B.) Sindh High Court, Circuit at Larkana 2016 Barkat Ali (Applicant) VS Bashir Ahmed Chanido and others (Respondent) S.B. 11-SEP-18 No Nil.
132392 315 Cr.Bail 308/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mumtaz Ali alias Tharoo (Applicant) VS The state (Respondent) S.B. 15-OCT-18 No Nil.
133160 316 Cr.Acq.A. 24/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Sajjan Chandio (Appellant) VS Maroof Chandio and others (Respondent) S.B. 09-NOV-18 No Nil.
128593 317 Cr.Bail 324/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Irshad Ali Hulio (Applicant) VS The State (Respondent) S.B. 06-JUL-18 No Nil.
132734 318 Cr.Misc. 43/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Waseem Hassan Bugti (Applicant) VS Khalid Hussain & others (Respondent) S.B. 26-OCT-18 No Nil.
131636 319 Cr.Rev 17/2015 (S.B.) Sindh High Court, Circuit at Larkana 2015 Muhammad Rahim Brohi (Applicant) VS The State (Respondent) S.B. 26-SEP-18 Yes Nil.
129133 320 Cr.Bail 132/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Asadullah Kolachi (Applicant) VS The State (Respondent) S.B. 30-JUL-18 No Nil.
129112 321 Cr.Bail 304/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Faisal Jalbani (Applicant) VS The State (Respondent) S.B. 27-JUL-18 No Nil.
132255 322 Cr.Misc. 135/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Niaz Hussain Leghari (Applicant) VS The State and Others (Respondent) S.B. 10-OCT-18 No Nil.
130223 323 Cr.J.A 17/2013 (S.B.) Sindh High Court, Circuit at Larkana 2013 Farooque Mahar (Appellant) VS The State (Respondent) S.B. 27-AUG-18 Yes Nil.
131159 324 Cr.Bail 422/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Akbar Khokhar (Applicant) VS The State (Respondent) S.B. 12-SEP-18 No Nil.
129658 325 Cr.Acq.A. 24/2013 (S.B.) Sindh High Court, Circuit at Larkana 2013 Dr Dayali Gul (Appellant) VS Rasool Bux Abbasi and others (Respondent) S.B. 10-AUG-18 No Nil.
129659 326 Cr.Acq.A. 57/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Syed Anwar Ali Shah (Appellant) VS Ghulam Hussain and Others (Respondent) S.B. 13-AUG-18 No Nil.
130737 327 Const. P. 2300/2011 (S.B.) Sindh High Court, Circuit at Larkana 2011 Barkat Ali Solangi (Petitioner) VS PO Sindh and others (Respondent) S.B. 05-SEP-18 No Nil.
128596 328 Cr.Acq.A. 31/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mehboob Ali Manghanhar (Appellant) VS The State (Respondent) S.B. 06-JUL-18 No Nil.
128654 329 Const. P. 534/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Mahjabeen Mughal (Petitioner) VS Election Appellate Tribunal Sukkur & Others (Respondent) D.B. 10-JUL-18 No Nil.
123916 330 Cr.Acq.A. 37/2009 (D.B.) Sindh High Court, Circuit at Larkana 2009 Sultan Ahmed Soomro (Applicant) VS Ali Mohammad & others (Respondent) D.B. 19-FEB-18 Yes Nil.
134654 331 Cr.Appeal 18/2017 (D.B.) Sindh High Court, Circuit at Larkana; attached cases: Criminal Reference No.D-04 of 2017,Criminal Jail Appeal No.D-19 of 2017,Criminal Appeal No.S-36 & 38 of 2017 2017 Mohammad Ramzan Chandio (Appellant) VS The State (Respondent) D.B. 24-DEC-18 No Nil.
136178 332 Const. P. 798/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Ms Leela Kalpana Devi and others (Petitioner) VS PO Sindh and others (Respondent) D.B. 19-FEB-19 No Nil.
123994 333 Const. P. 678/2013 (D.B.) Sindh High Court, Circuit at Larkana 2013 aseen Mustafa Chandio (Petitioner) VS Ex. Engineer SEPCO Larkana and others (Respondent) D.B. 22-FEB-18 Yes Nil.
135012 334 Cr.Bail 603/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Javed Khakhrani and Another (Applicant) VS The State (Respondent) S.B. 07-JAN-19 No Nil.
135013 335 Cr.Bail 680/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Amir Hamzo & Another (Applicant) VS The State (Respondent) S.B. 07-JAN-19 No Nil.
135015 336 Const. P. 343/2014 (D.B.) Sindh High Court, Circuit at Larkana 2014 Naheed Soomro and others (Petitioner) VS DEO Kashmore and others (Respondent) D.B. 07-JAN-19 No Nil.
133173 337 Civil Tran 12/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Rajab Ali Golo (Applicant) VS Muhammad Sallah And Others (Respondent) S.B. 12-NOV-18 No Nil.
134405 338 Cr.Misc. 251/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 SIP Anwar Ali Brohi & others (Applicant) VS Khadim Hussain Golo & Anothers (Respondent) S.B. 17-DEC-18 No Nil.
131634 339 Cr.Misc. 241/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mujahid Ali Jakhrani (Applicant) VS The State & others (Respondent) S.B. 28-SEP-18 No Nil.
129660 340 Cr.Rev 9/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Muhammad Ameen Chandio (Applicant) VS The State (Respondent) S.B. 13-AUG-18 No Nil.
129653 341 Cr.Bail 294/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mujahid Kalhoro (Applicant) VS The State (Respondent) S.B. 10-AUG-18 No Nil.
131762 342 Cr.Rev 16/2015 (S.B.) Sindh High Court, Circuit at Larkana 2015 Muhammad Rahim Brohi (Applicant) VS The State (Respondent) S.B. 01-OCT-18 No Nil.
132769 344 Civil Revision 67/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Ehsanullah Kandhro (Applicant) VS Mashooque Ali and others (Respondent) S.B. 29-OCT-18 No Nil.
132833 345 Cr.Acq.A. 10/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 The State through P.G Sindh (Appellant) VS Ahmedan Sabzoi & an other (Respondent) D.B. 23-OCT-18 No Nil.
129654 346 Cr.Bail 321/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mehmood Malgani & others (Applicant) VS The State (Respondent) S.B. 10-AUG-18 No Nil.
132639 347 Cr.J.A 100/2012 (S.B.) Sindh High Court, Circuit at Larkana 2012 Ghulam Abbas Mabar (Appellant) VS The State (Respondent) S.B. 22-OCT-18 No Nil.
130224 348 Cr.Appeal 57/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Saindad @ Saeedo Jatoi (Appellant) VS The State (Respondent) S.B. 27-AUG-18 No Nil.
132872 349 Civil Revision 11/2015 (S.B.) Sindh High Court, Circuit at Larkana 2015 Ghulam Sarwar Siyal & others (Applicant) VS Nafees Ahmed Leghari & others (Respondent) S.B. 01-NOV-18 No Nil.
132254 350 Cr.Acq.A. 42/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Meharullah Bugti (Appellant) VS Babar Khan Bugti & others (Respondent) S.B. 10-OCT-18 No Nil.
133175 351 Cr.Misc. 407/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Hussain Bux (Applicant) VS The State & others (Respondent) S.B. 12-NOV-18 No Nil.
135001 352 Cr.Rev 37/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Mohammad Sharif Khoso (Applicant) VS The State and Others (Respondent) S.B. 04-JAN-19 No Nil.
135017 353 Cr.Misc. 334/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mohammad Khan Suho & others (Applicant) VS The State (Respondent) S.B. 07-JAN-19 No Nil.
133872 354 Cr.J.A 60/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Saddar Kharal & another (Appellant) VS The State (Respondent) S.B. 03-DEC-18 No Nil.
130749 355 E.P 506/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Lutufullah Dal (Petitioner) VS R.O P.S-9 Shikarpur-3 and others (Respondent) D.B. 19-JUL-18 No Nil.
131110 356 Cr.Bail 333/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Altaf Ali Panhwar (Applicant) VS The State (Respondent) S.B. 10-SEP-18 No Nil.
132760 357 Cr.Bail 492/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Nawab Shar (Applicant) VS The State (Respondent) S.B. 29-OCT-18 No Nil.
134692 358 Cr.Acctt.A 46/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Azam Ali Soomro (Applicant) VS Fayyaz Hussain Khoso & an other (Respondent) S.B. 24-DEC-18 No Nil.
129074 359 Cr.Bail 269/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Gul Hassan @ Guloo Lashari & another (Applicant) VS The State (Respondent) S.B. 23-JUL-18 No Nil.
131590 360 Cr.Misc. 157/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ghulam Fareed and Others (Applicant) VS Inspector Sanaullah Awan and Others (Respondent) S.B. 26-SEP-18 No Nil.
131947 361 Cr.Acq.A. 78/2017 (S.B.) Sindh High Court, Circuit at Larkana 2017 Malik Dino Buriro (Appellant) VS Zulfiqar Ali & another (Respondent) S.B. 04-OCT-18 No Nil.
131583 362 Cr.Bail 390/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Muhammad Iqbal Qureshi (Applicant) VS The State (Respondent) S.B. 25-SEP-18 No Nil.
134300 363 Cr.Bail 569/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Munwar Ali Junejo (Applicant) VS The State (Respondent) S.B. 10-DEC-18 No Nil.
134311 364 Cr.Bail 597/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Mansoor Ali Tunio (Applicant) VS The State (Respondent) S.B. 10-DEC-18 No Nil.
134312 365 Cr.Appeal 15/2012 (S.B.) Sindh High Court, Circuit at Larkana 2012 Muhammad Ramzan Soomro (Appellant) VS The State (Respondent) S.B. 10-DEC-18 No Nil.
128453 366 Cr.Acq.A. 26/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Syed Mehboob Shah (Appellant) VS Haji Illahi Bux and others (Respondent) S.B. 02-JUL-18 No Nil.
128655 367 Cr.Appeal 14/2018 (D.B.) Sindh High Court, Circuit at Larkana 2018 Dur Muhammad Jatoi (Appellant) VS The State (Respondent) D.B. 10-JUL-18 No Nil.
133884 368 Cr.J.A 142/2011 (S.B.) Sindh High Court, Circuit at Larkana 2011 Adho Janwri (Appellant) VS The State (Respondent) S.B. 06-DEC-18 No Nil.
129081 369 Criminal Appeal 24/2016 (D.B.) Sindh High Court, Circuit at Larkana 2016 Jacom Malik (Appellant) VS The State (Respondent) D.B. 17-JUL-18 No Nil.
134932 370 Cr.J.A 19/2013 (S.B.) Sindh High Court, Circuit at Larkana 2013 Abdul Kamber Lashari (Appellant) VS The state (Respondent) S.B. 04-JAN-19 No Nil.
130222 371 Cr.Acq.A. 32/2014 (S.B.) Sindh High Court, Circuit at Larkana 2014 Allahyar Ghanghro (Appellant) VS Asadullah and others (Respondent) S.B. 27-AUG-18 No Nil.
132316 372 Cr.Bail 334/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ali Hyder Bhutto (Applicant) VS The State (Respondent) S.B. 11-OCT-18 No Nil.
133157 373 Cr.Bail 493/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Ahmed Ali Khakhrani (Applicant) VS The State (Respondent) S.B. 09-NOV-18 No Nil.
134373 374 Cr.Bail 579/2018 (S.B.) Sindh High Court, Circuit at Larkana 2018 Saeed Ahmed Lolai & An other (Applicant) VS Saeed Ahmed Lolai & An other (Respondent) S.B. 13-DEC-18 No Nil. | 2019-04-25T01:12:46Z | http://202.61.43.40:8056/caselaw/public/total-judgement/1161/4 |
Other References: Bluetooth-The Universal Radio Interface for Ad Hoc, Wireless Connectivity; Jaap Haartsen, 40 pages. cited by other.
Jenn Hann Technology Co., Ltd.; Polices and People On-line Computer System; Magnetic Spring Projector; Mar. 6, 2001. cited by other.
"A Software System for Locating Mobile Users: Design, Evaluation, and Lessons"; Bahl et al.; No Date; p. 1-13. cited by other.
"Radar: An In-Building RF-based User Location and Tracking System"; Bahl et al.: No Date; 10 pages. cited by other.
Dallas Semiconductor Maxim, "iButton Overview", XP-002340628, Aug. 10, 2003, (3 pgs.). cited by other.
Honeywell, "Chapter 2, Hall Effect Sensors", Micro Switch Sensing and Control, pp. 3-8. cited by other.
Abstract: A container and contents monitoring system includes a device, a reader, a server, a software backbone and a receptacle for housing a plurality of sensors. The device communicates with the plurality of sensors and the reader in order to determine the condition of the container and its contents. The reader transmits the information from the device to the server. The device determines if a container condition has occurred based on at least one sensor located on or in the container.
1. A device for securing a shipping container, the device comprising: a data unit having a housing; a support arm connected to and extending from the data unit, wherein thesupport arm is configured to be secured to a vertical beam of the shipping container between the vertical beam and a hinge portion of a door of the shipping container; and an antenna arm connected to and angularly extending from the support arm, whereinthe antenna arm is configured to be located on an exterior of the shipping container, the support arm is configured to be adjacent to the portion of a door of the shipping container, and the data unit is configured to be located in an interior of theshipping container when the door is closed.
2. The device of claim 1, wherein the support arm has a support surface that includes an aperture configured to receive a magnet.
3. The device of claim 2, wherein the magnet is located within the aperture.
4. The device of claim 1, further comprising: a processor located within the housing of the data unit.
5. of the device of claim 4, further comprising: a pressure sensor located on the support surface of the support arm and coupled with the processor.
6. The device of claim 4, further comprising: an antenna located on the antenna arm and coupled with the processor.
7. The device of claim 4, further comprising: an interface in the housing of the data unit and coupled with the processor, wherein the interface is configured to be coupled with an external sensor unit that is configured to capture informationrelative to the internal conditions of the shipping container.
8. the device of claim 7, wherein the external sensor unit is a least one of a light sensor, a motion sensor, a radiation sensor, a temperature sensor, a proximity sensor, a biometric sensor, an ammonia sensor, a shock sensor, a vibrationsensor, a carbon dioxide sensor, a smoke sensor, a noise sensor, a humidity sensor, an image sensor, and a combustible gas sensor.
9. The device of claim 1, further comprising: a molding material that encapsulates the device.
10. The device of claim 6, wherein the processor is configured to transmit data related to a status of the door via the antenna to a remote server.
11. A device for securing a shipping container, the device comprising: a data unit having a housing; a support arm connected to and extending from the data unit, wherein the support arm is configured to be secured to a vertical beam of theshipping container between the vertical beam and a hinge portion of a door of the shipping container; a magnet coupled with the support arm; a processor located within the housing of the data unit; a pressure sensor coupled with a support surface ofthe support arm and coupled with the processor; an antenna arm connected to and angularly extending from the support arm; and an antenna located on the antenna arm and coupled with the processor.
12. The device of claim 10, wherein the support surface of the support arm includes an aperture configured to receive the magnet.
13. The device of claim 12, further comprising: a molding material that encapsulates the device.
14. The device of claim 10, further comprising: an interface in the housing of the data unit and coupled with the processor, wherein the interface is configured to be coupled with an external sensor unit that is configured to captureinformation relative to internal conditions of the shipping container.
15. The device of claim 14, wherein the external sensor unit is a least one of a light sensor, a motion sensor, a radiation sensor, a temperature sensor, a proximity sensor, a biometric sensor, an ammonia sensor, a shock sensor, a vibrationsensor, a carbon dioxide sensor, a smoke sensor, a noise sensor, a humidity sensor, an image sensor, and a combustible gas sensor.
16. The device of claim 10, wherein the antenna arm is configured to be located on an exterior of the shipping container, the support arm is configured to be adjacent to the portion of the door, and the data unit is configured to be located inan interior of the shipping container when the door is closed.
The present invention relates to a method of and system for monitoring the conditions of the internal environment of a container utilizing multiple sensors and, more particularly, but not by way of limitation, to a method of and system forutilizing multiple sensors for monitoring the conditions of the internal environment of intermodal freight containers throughout a supply chain.
The vast majority of goods shipped throughout the world are shipped via what are referred to as intermodal freight containers. As used herein, the term "containers" includes any container (whether with wheels attached or not) that is nottransparent to radio frequency signals, including, but not limited to, intermodal freight containers. The most common intermodal freight containers are known as International Standards Organization (ISO) dry intermodal containers, meaning they meetcertain specific dimensional, mechanical and other standards issued by the ISO to facilitate global trade by encouraging development and use of compatible standardized containers, handling equipment, ocean-going vessels, railroad equipment andover-the-road equipment throughout the world for all modes of surface transportation of goods. There are currently more than 12 million such containers in active circulation around the world as well as many more specialized containers such asrefrigerated containers that carry perishable commodities. The United States alone receives approximately six million loaded containers per year, or approximately 17,000 per day, representing nearly half of the total value of all goods received eachyear.
Since approximately 90% of all goods shipped internationally are moved in containers, container transport has become the backbone of the world economy.
The sheer volume of containers transported worldwide renders individual physical inspection impracticable, and only approximately 2% to 3% of containers entering the United States are actually physically inspected. Risk of introduction of aterrorist biological, radiological or explosive device via a freight container is high, and the consequences to the international economy of such an event could be catastrophic, given the importance of containers in world commerce.
Even if sufficient resources were devoted in an effort to conduct physical inspections of all containers, such an undertaking would result in serious economic consequences. The time delay alone could, for example, cause the shut down offactories and undesirable and expensive delays in shipments of goods to customers.
Current container designs fail to provide adequate mechanisms for establishing and monitoring the security of the containers or their contents. A typical container includes one or more door hasp mechanisms that allow for the insertion of aplastic or metal indicative "seal" or bolt barrier conventional "seal" to secure the doors of the container.
The door hasp mechanisms that are conventionally used are very easy to defeat, for example, by drilling an attachment bolt of the hasp out of a door to which the hasp is attached. The conventional seals themselves currently in use are also quitesimple to defeat by use of a common cutting tool and replacement with a rather easily duplicated seal.
A more advanced solution proposed in recent time is an electronic seal ("e-seal"). These e-seals are equivalent to traditional door seals and are applied to the containers via the same, albeit weak, door hasp mechanism as an accessory to thecontainer, but include an electronic device such as a radio or radio reflective device that can transmit the e-seal's serial number and a signal if the e-seal is cut or broken after it is installed. However, the e-seal is not able to communicate withthe interior or contents of the container and does not transmit information related to the interior or contents of the container to another device.
The e-seals typically employ either low power radio transceivers or use radio frequency backscatter techniques to convey information from an e-seal tag to a reader installed at, for example, a terminal gate. Radio frequency backscatter involvesuse of a relatively expensive, narrow band high-power radio technology based on combined radar and radio-broadcast technology. Radio backscatter technologies require that a reader send a radio signal with relatively high transmitter power (i.e., 0.5-3W) that is reflected or scattered back to the reader with modulated or encoded data from the e-seal.
In addition, e-seal applications currently use completely open, unencrypted and insecure air interfaces and protocols allowing for relatively easy hacking and counterfeiting of e-seals. Current e-seals also operate only on locally authorizedfrequency bands below 1 GHz, rendering them impractical to implement in global commerce involving intermodal containers since national radio regulations around the world currently do not allow their use in many countries.
Furthermore, the e-seals are not effective at monitoring security of the containers from the standpoint of alternative forms of intrusion or concern about the contents of a container, since a container may be breached or pose a hazard in avariety of ways since the only conventional means of accessing the inside of the container is through the doors of the container. For example, a biological agent could be implanted in the container through the container's standard air vents, or the sidewalls of the container could be cut through to provide access. Although conventional seals and the e-seals afford one form of security monitoring the door of the container, both are susceptible to damage. The conventional seal and e-seals typicallymerely hang on the door hasp of the container, where they are exposed to physical damage during container handling such as ship loading and unloading. Moreover, conventional seals and e-seals cannot monitor the contents of the container.
The utilization of multiple sensors for monitoring the interior of a container could be necessary to cover the myriad of possible problems and/or threatening conditions. For example, the container could be used to ship dangerous, radio-activematerials, such as a bomb. In that scenario, a radiation sensor would be needed in order to detect the presence of such a serious threat. Unfortunately, terrorist menaces are not limited to a single category of threat. Both chemical and biologicalwarfare have been used and pose serious threats to the public at large. For this reason, both types of detectors could be necessary, and in certain situations, radiation, gas and biological sensors could be deemed appropriate. One problem with theutilization of such sensors is, however, the transmission of such sensed data to the outside world when the sensors are placed in the interior of the container. Since standard intermodal containers are manufactured from steel that is opaque to radiosignals, it is virtually impossible to have a reliable system for transmitting data from sensors placed entirely within such a container unless the data transmission is addressed. If data can be effectively transmitted from sensors disposed entirelywithin an intermodal container, conditions such as temperature, light, combustible gas, proteins (biometric sensors) motion, radio activity, biological and other conditions and/or safety parameters can be monitored. Moreover, the integrity of themounting of such sensors are critical and require a more sophisticated monitoring system than the aforementioned door hasp mechanisms that allow for the insertion of a plastic or metal indicative "seal" or bolt barrier conventional "seal" to secure thedoors of the container.
In addition to the above, the monitoring of the integrity of containers via door movement can be relatively complex. Although the containers are constructed to be structurally sound and carry heavy loads, both within the individual containers aswell as by virtue of containers stacked upon one another, each container is also designed to accommodate transverse loading to accommodate dynamic stresses and movement inherent in (especially) ocean transportation and which are typically encounteredduring shipment of the container. Current ISO standards for a typical container may allow movement on a vertical axis due to transversal loads by as much as 40 millimeters relative to one another. Therefore, security approaches based upon maintaining atight interrelationship between the physical interface between two container doors are generally not practicable.
It would therefore be advantageous to provide a method of and system for both monitoring the movement of the doors of a container relative to the container structure in a cost effective, always available, yet reliable fashion as well as providingfor a data path or gateway for multiple sensors placed in a container to detect alternative means of intrusion or presence of dangerous or illicit contents to receivers in the outside world.
These and other drawbacks are overcome by embodiments of the present invention, which provides a method of and system for utilizing multiple sensors for efficiently and reliably monitoring a container and its contents. More particularly, oneaspect of the invention includes a device for housing and communicating with multiple sensors for monitoring the internal conditions of a container. The device includes a receptacle for housing multiple sensors adapted for sensing at least one conditionof the container and means for transmitting information relative to the sensors to a location outside the container. The communication from the sensors may include data related to a sensed motion, sensed radiation, sensed chemical, sensed biologicalagent, sensed heat, sensed gas, etc. or an alert that a predetermined threshold of one or more os such conditions has been met or exceeded.
In another aspect, the present invention relates to a device for monitoring the condition of a container with a plurality of sensors, the container being of the type having at least one door pivotally mounted thereto. The device includes meansfor sensing movement of the container door, means for transmitting information relative to the sensed container door movement, a receptacle for housing multiple uses of the sensors, and means for maintaining the receptacle inside the container, adjacentto door in communication with the means for sensing movement. The means for transmitting is disposed relative to the container for transmission of the sensed door movement to a location outside the container.
In another aspect, the present invention relates to a method of detecting a condition of a container and its contents with a plurality of sensors. The method includes the steps of providing a receptacle for mounting within the container, thereceptacle being adapted for receipt and securement of the sensors, placing the plurality of sensors within the receptacle, interfacing the sensors, monitoring the sensors via a data unit located within the container, determining by the data unit whethera change in condition has occurred based on sensed changes in value sensed by the sensor, communicating by the data unit, of a result of the determining step to an antenna interoperably connected to the data unit and located relative to the container ina position for transmitting data to a location outside the container, and transmitting by the antenna of information relative to the communication step.
In another aspect, the present invention relates to a sensor receptacle for receiving at least one sensor unit. The sensor receptacle includes at least one protrusion extending from the sensor receptacle for abutment to a vertical beam of acontainer, a conduit for receiving the at least one sensor unit, and at least one connector for interfacing with the at least one sensor unit. The at least one protrusion secures the sensor receptacle via at least one securement means and via pressuregenerated when a door of the container is closed against the vertical beam.
In another aspect, the present invention relates to a system for monitoring a plurality of conditions of a container. The system includes at least one sensor for monitoring a condition of the container, a Radio Frequency ID reader for sensinginformation from tags associated with a particular piece of cargo, and a sensor receptacle for housing the at least one sensor.
FIG. 13 is a flow diagram illustrating a sensor check process according to an alternate embodiment of the present invention.
It has been found that a container security device of the type set forth, shown, and described below, may be positioned in and secured to a container for effective monitoring of the integrity and condition thereof and its contents. As will bedefined in more detail below, a device in accordance with principles of the present invention is constructed for positioning within a pre-defined structural portion of the container which generally manifests minimal structural movement due to routineloading and handling and extending through a conventional interface between the container frame and door region therealong. An elastomeric gasket is conventionally placed around the door and extends through the interface region to ensure the containeris watertight and the goods thus protected from weather. The device is adapted for: (a) easy tool-free installation; (b) self powered intermittent signal transmission; and (c) sensing of the pressure of the elastomeric door seal relative thereto fortransmitting deviations thereof indicative of door movements of the container, including an intrusion therein.
FIG. 1A is a diagram illustrating communication among components of a system in accordance with principles of the present invention. The system includes a device 12, at least one variety of reader 16, a server 15, and a software backbone 17. The device 12 ensures that the container has not been breached after the container 10 has been secured. The container 10 is secured and tracked by a reader 16. Each reader 16 may include hardware or software for communicating with the server 15 such asa modem for transmitting data over GSM, CDMA, etc. or a cable for downloading data to a PC that transmits the data over the Internet to the server 15. Various conventional means for transmitting the data from the reader 16 to the server 15 may beimplemented within the reader 16 or as a separate device. The reader 16 may be configured as a handheld reader 16(A), a mobile reader 16(B), or a fixed reader 16(C). The handheld reader 16(A) may be, for example, operated in conjunction with, forexample, a mobile phone, a personal digital assistant, or a laptop computer. The mobile reader 16(B) is basically a fixed reader with a GPS interface, typically utilized in mobile installations (e.g., on trucks, trains, or ships using existing GPS, AISor similar positioning systems) to secure, track, and determine the integrity of the container in a manner similar to that of the handheld reader 16(A). In fixed installations, such as, for example, those of a port or shipping yard, the fixed reader16(C) is typically installed on a crane or gate. The reader 16 serves primarily as a relay station between the device 12 and the server 15.
The server 15 stores a record of security transaction details such as, for example, door events (e.g., security breaches, container security checks, securing the container, and disarming the container), location, as well as any additional desiredperipheral sensor information (e.g., temperature, motion, radioactivity). The server 15, in conjunction with the software backbone 17, may be accessible to authorized parties in order to determine a last known location of the container 10, makeintegrity inquiries for any number of containers, or perform other administrative activities.
The device 12 communicates with the readers 16 via a short-range radio interface such as, for example, a radio interface utilizing direct-sequence spread-spectrum principles. The radio interface may use, for example, BLUETOOTH or any othershort-range, low-power radio system that operates in the license-free Industrial, Scientific, and Medical (ISM) band, which operates around e.g. 2.4 GHz. Depending on the needs of a specific solution, related radio ranges are provided, such as, forexample, a radio range of up to 100 m.
The readers 16 may communicate via a network 13, e.g. using TCP/IP, with the server 15 via any suitable technology such as, for example, Universal Mobile Telecommunications System (UMTS), Global System for Mobile Communications (GSM), CodeDivision Multiple Access (CDMA), Time Division Multiple Access (TDMA), Pacific Digital Cellular System(PDC), Wideband Local Area Network (WLAN), Local Area Network (LAN), Satellite Communications systems, Automatic Identification Systems (AIS), orMobitex. The server 15 may communicate with the software backbone 17 via any suitable wired or wireless technology. The software backbone 17 is adapted to support real-time surveillance services such as, for example, tracking and securing of thecontainer 10 via the server 15, the readers 16, and the device 12. The server 15 and/or the software backbone 17 are adapted to store information such as, for example, identification information, tracking information, door events, and other datatransmitted by the device 12 and by any additional peripheral sensors interoperably connected to the device 12. The software backbone 17 also allows access for authorized parties to the stored information via a user interface that may be accessed via,for example, the Internet.
Referring now to FIG. 1B, there is shown a diagram illustrating a flow 2 of an exemplary supply chain from points (A) to (I). Referring first to point (A), a container 10 is filled with cargo by a shipper or the like. At point (B), the loadedcontainer is shipped to a port of embarkation via highway or rail transportation. At point (C), the container is gated in at the port of loading such as a marine shipping yard.
At point (D), the container is loaded on a ship operated by a carrier. At point (E), the container is shipped by the carrier to a port of discharge. At point (F), the container is discharged from the ship. Following discharge at point (F), thecontainer is loaded onto a truck and gated out of the port of discharge at point (G). At point (H), the container is shipped via land to a desired location in a similar fashion to point (B). At point (I), upon arrival at the desired location, thecontainer is unloaded by a consignee.
As will be apparent to those having ordinary skill in the art, there are many times within the points of the flow 2 at which security of the container could be compromised without visual or other conventional detection. In addition, thecondition of the contents of the container could be completely unknown to any of the parties involved in the flow 2 until point (H) when the contents of the container are unloaded.
FIG. 2A is a block diagram of the device 12. The device 12 includes an antenna 20, an RF/baseband unit 21, a microprocessor (MCU) 22, a memory 24, and a door sensor 29. The device 12 may also include an interface 28 for attachment of additionalsensors to monitor various internal conditions of the container such as, for example, temperature, vibration, radioactivity, gas detection, and motion. The device 12 may also include an optional power source 26 (e.g., battery); however, other powerarrangements that are detachable or remotely located may also be utilized by the device 12. When the power source 26 includes a battery (as shown herein), inclusion of the power source 26 in the device 12 may help to prolong battery life by subjectingthe power source 26 to smaller temperature fluctuations by virtue of the power source 26 being inside the container 10. The presence of the power source 26 within the container 10 is advantageous in that the ability to tamper with or damage the powersource 26 is decreased. The device 12 may also optionally include a connector for interfacing directly with the reader 16. For example, a connector may be located on an outer wall of the container 10 for access by the reader 16. The reader 16 may thenconnect via a cable or other direct interface to download information from the device 12.
The microprocessor 22 (equipped with an internal memory) discerns door events from the door sensor 29, including, for example, container-security requests, container-disarming requests, and container-security checks. The discerned door eventsalso include security breaches that may compromise the contents of the container 10, such as opening of a door after the container 10 has been secured. The door events may be time-stamped and stored in the memory 24 for transmission to the reader 16. The door events may be transmitted immediately, periodically, or in response to an interrogation from the reader 16. The door sensor 29 shown herein is of the pressure sensitive variety, although it may be, for example, an alternative contact sensor, aproximity sensor, or any other suitable type of sensor detecting relative movement between two surfaces. The term pressure sensor as used herein thus includes, but is not limited to, these other sensor varieties.
The antenna 20 is provided for data exchange with the reader 16. In particular, various information, such as, for example, status and control data, may be exchanged. The microprocessor 22 may be programmed with a code that uniquely identifiesthe container 10. The code may be, for example, an International Standards Organization (ISO) container identification code. The microprocessor 22 may also store other logistic data, such as Bill-of-Lading (B/L), a mechanical seal number, a readeridentification with a time-stamp, etc. A special log file may be generated, so that tracking history together with door events may be recovered. The code may also be transmitted from the device 12 to the reader 16 for identification purposes. TheRF/baseband unit 21 upconverts microprocessor signals from baseband to RF for transmission to the reader 16.
The device 12 may, via the antenna 20, receive an integrity inquiry from the reader 16. In response to the integrity query, the microprocessor 22 may then access the memory to extract, for example, door events, temperature readings, securitybreaches, sensor alarms, or other stored information in order to forward the extracted information to the reader 16. The reader 16 may also send a security or disarming request to the device 12. When the container 10 is secured by the reader 16, theMCU 22 of the device 12 may be programmed to emit an audible or visual alarm when the door sensor 29 detects a material change in pressure after the container is secured. The device 12 may also log the breach of security in the memory 24 fortransmission to the reader 16. If the reader 16 sends a disarming request to the device 12, the microprocessor 22 may be programmed to disengage from logging door events or receiving signals from the door sensor 29 or other sensors interoperablyconnected to the device 12.
The microprocessor 22 may also be programmed to implement power-management techniques for the power source 26 to avoid any unnecessary power consumption. In particular, one option is that one or more time window(s) are specified via the antenna20 for activation of the components in the device 12 to exchange data. Outside the specified time windows, the device 12 may be set into a sleep mode to avoid unnecessary power losses. Such a sleep mode may account for a significant part of the deviceoperation time, the device 12 may as a result be operated over several years without a need for battery replacement.
In particular, according to the present invention, the device 12 utilizes a "sleep" mode to achieve economic usage of the power source 26. In the sleep mode, a portion of the circuitry of the device 12 is switched off. For example, allcircuitry may be switched off except for the door sensor 29 and a time measurement unit (e.g., a counter in the microprocessor 22) that measures a sleep time period t.sub.sleep. In a typical embodiment, when the sleep time period has expired or when thedoor sensor 29 senses a door event, the remaining circuitry of the device 12 is powered up.
When the device 12 receives a signal from the reader 16, the device 12 remains active to communicate with the reader 16 as long as required. If the device 12 does not receive a signal from the reader 16, the device 12 will only stay active aslong as necessary to ensure that no signal is present during a time period referred to as a radio-signal time period or sniff "period" ("t.sub.sniff").
Upon t.sub.sniff being reached, the device 12 is powered down again, except for the time measurement unit and the door sensor 29, which operate to wake the device 12 up again after either a door event has occurred or another sleep time period hasexpired.
In a typical embodiment, the reader-signal time period is much shorter (e.g., by several orders of magnitude less) than the sleep time period so that the lifetime of the device is prolonged accordingly (e.g., by several orders of magnitude)relative to an "always on" scenario.
However, a passing time ("t.sub.pass") is usually dictated by the particular situation. The passing time may be very long in certain situations (e.g., many hours when the device 12 on a freight container is communicating with the reader 16 on atruck head or chassis carrying the container 10) or very short in other situations (e.g., fractions of a second when the device 12 on the container 10 is passing by the fixed reader 16(C) at high speed). It is typical for all the applications that eachof the devices 12 will, during its lifetime, sometimes be in situations with a greater passing time and sometimes be in situations with a lesser passing time.
The sleep time period is therefore usually selected such that the sleep time period is compatible with a shortest conceivable passing time, ("t.sub.pass,min.") In other words, the relation-- t.sub.sleep.ltoreq.t.sub.pass,min-t.sub.sniff should befulfilled according to each operative condition of the device. Sleep time periods are assigned to the device in a dynamic matter depending on the particular situation of the device (e.g., within its life cycle).
Whenever the reader 16 communicates with the device 12, the reader 16 reprograms the sleep time period of the device 12 considering the location and function of the reader 16, data read from the device 12, or other information that is availablein the reader 16.
For example, if the container 10 equipped with device 12 is located on a truck by a toplifter, straddle carrier, or other suitable vehicle, the suitable vehicle is equipped with the reader 16, whereas the truck and trailer are not equipped withany readers 16. It is expected that the truck will drive at a relatively-high speed past the fixed reader 16(C) at an exit of a port or a container depot. Therefore, the reader 16(C) on the vehicle needs to program the device 12 with a short sleep timeperiod (e.g., .about.0.5 seconds).
Further ramifications of the ideas outlined above could be that, depending on the situation, the reader 16 may program sequences of sleep periods into the device 12. For example, when the container 10 is loaded onboard a ship, it may besufficient for the device 12 to wake up only once an hour while the ship is on sea. However, once the ship is expected to approach a destination port, a shorter sleep period might be required to ensure that the reader 16 on a crane unloading thecontainer 10 will be able to establish contact with the device 12. The reader 16 on the crane loading the container 10 onboard the ship could program the device 12 as follows: first, wake up once an hour for three days, then wake up every ten seconds.
In another scenario, the reader 16 is moving together with the device 12 and could modify the sleep time period in dependence on the geographical location. For example, it may be assumed that the device 12 on the container 10 and the reader 16of a truck towing the container 10 may constantly communicate with each other while the container 10 is being towed. As long as the container 10 is far enough away from its destination, the reader 16 could program the device 12 to be asleep for extendedintervals (e.g., one hour.) When the reader 16 is equipped with a Global Positioning System (GPS) receiver or other positioning equipment, the reader may determine when the container 10 is approaching its destination. Once the container approaches thedestination, the reader 16 could program the device 12 to wake up more frequently (e.g., every second).
While the above-described power-management method has been explained with respect to the device 12 in the context of trucking of freight containers or other cargo in transportation by sea, road, rail or air, it should be understood for thoseskilled in the art that the above-described power-management method may as well be applied to, for example, trucking of animals, identification of vehicles for road toll collection, and theft protection, as well as stock management and supply chainmanagement.
Referring now to FIG. 2B, there is shown a first perspective view of the device 12. The device 12 includes a housing 25 containing the data unit 100 (not shown), a support arm 102 extending therefrom, and an antenna arm 104 extending outwardlythereof in an angular relationship therewith. As will be described below, the size of the housing 25, the length of the support arm 102, and the configuration of the antenna arm 104 are carefully selected for compatibility with conventional containers. The housing 25, the support arm 102, and the antenna arm 104 are typically molded within a polyurethane material 23 or the like in order to provide protection from the environment.
Still referring to FIG. 2B, a portion of material 23 of the support arm 102 is cut away to illustrate placement of at least one magnet 27 therein and at least one door sensor 29 thereon. The magnet 27 permits an enhanced securement of the device12 within the container as described below, while the door sensor 29 detects variations in pressure along a sealing gasket (not shown) of the container discussed below.
A second perspective view of the device 12 as illustrated in FIG. 2C, further illustrates the placement of the magnet 27 in the support arm 102. The magnet 27 is positioned within corresponding apertures 27A formed in the support arm 102 and arebonded thereto in a manner facilitating the installation of the device 12.
Now referring to FIG. 2D, a top view of the device 12 is illustrated before any of the molding material 23 has been applied. In this way, the position of the power source 26, the data unit 100, and the antenna 20 are shown more clearly. Thedevice 12 includes the data unit 100 and power source 26, the microprocessor 22 (not shown), the memory 24 (not shown), and the optional interface 28 (not shown). The support arm 102 extends from the data unit 100 and includes the apertures 27A to housethe at least one magnet 27 as well as a support surface to which the door sensor 29 is attached. Extending from the support arm 102 is the antenna arm 104 for supporting the antenna 20.
Now referring to FIG. 2E, a side view of the device 12 before any of the molding material 23 has been applied is illustrated. As shown, the support arm 102 extends upwardly and outwardly from the data unit 100. The support arm 102 is relativelythin and substantially horizontal, although other configurations are available. As more clearly indicated in FIG. 2E, the antenna arm 104 extends angularly from the support arm 102.
Referring now to FIG. 2F, there is shown a front view of the device 12 after the molding material 23 has been applied. The device 12 is illustrated with the molded material 23 that forms the housing 25 encapsulating the device 12. The moldingmaterial 23 extends from the antenna arm 104 across the support arm 102 and around the data unit 100. The particular shape and configuration shown herein is but one embodiment of the device 12 and no limitation as to the precise shape of the device 12is suggested herein.
Referring now to FIG. 2G, there shown a back view of the device 12 according to FIG. 1A. The angular configuration of the antenna arm 104 is likewise seen in a more simplified format for purposes of illustration in FIGS. 2H and 2I, whichrepresent bottom and top views of the device 12.
FIG. 2J illustrates a front view of the device 12 as installed on the container 10. The container 10 is shown with a door 202 of the container 10 in an open position to show the orientation of the device 12 in greater detail. The device 12 ismounted to an area adjacent to the door 202 of the container 10. The device 12 may be mounted via a magnetic connection (as previously illustrated), an adhesive connection, or any other suitable connection, on a vertical beam 204 of the container 10. As can be seen in FIG. 2J, the device 12 is mounted so that, when the door 202 is closed, the antenna arm 104 is located on the exterior of the container 10, the door sensor 29, located within the support arm 102, is directly adjacent to a portion of thedoor 202, and the data unit 100 is located on the interior of the container 10. The device 12 may detect, via the door sensor 29, deviations of pressure to determine whether a door event (e.g., relative and/or absolute pressure change) has occurred. The device 12 may transmit data relative to the status of the door 202 via the antenna 20 to the server 15 as previously described. In addition, the interface 28 may be connected to any number of the external sensor units 208 in order to captureinformation relative to internal conditions of the container 10 and the information obtained via the sensor units 208 transmitted to the server 15.
Remaining with FIG. 2J, the device 12 is oriented within the container 10 so that the data unit 100 is disposed within a generally C-shaped recess or channel 206. The support arm 102, including the door sensor 29, extends across the verticalbeam 204 between it and a portion of the door 202. When the door 202 is closed, pressure is maintained at the door sensor 29. When the door 202 is opened, the pressure is relieved, thereby alerting the microprocessor 22 that a door event has occurred. An electronic security key stored in the memory 24 will be erased or changed to indicate a "broken" seal or tampering event. For example, when the door sensor 29, or any other internal or external sensor connected to the container security device 12senses a value that is outside a predetermined threshold, then the electronic security key may be erased and the key is not able to be re-created. In this case, when a reader sends a request to the container security device 12, the container securitydevice 12 will be unable to respond with the correct electronic security key, thereby informing the reader and the appropriate authorities that the container is in an alarm or warning condition.
FIGS. 2K-2M illustrate various views of a sensor receptacle 220 for receiving the external sensor units 208. The sensor receptacle 220 includes at least one, and in this embodiment two, protrusions 222a, 222b for securement to the vertical beam(not shown) of the container. The protrusions 222a, 222b may be secured in a manner similar to the container security device 12 as noted above, such as via magnets or fasteners. The protrusions 222a, 222b may also provide additional securement viapressure applied by the door pressing against the protrusions 222a, 222b which in turn press against the vertical beam of the container when the door is in the closed position. The sensor receptacle 220 includes a conduit 224 for receiving the sensorunits 208. The conduit 224 is oriented such that the conduit 224 resides within the C-channel (not shown) of the container. The sensor units 208 snap in place without further securement means, however, the sensor units 208 may be secured withadditional securement means in alternate embodiments of the invention. The length of the sensor receptacle 220 may also be varied in order to house various numbers and types of sensor units 208. For example, the length of some sensor receptacles 220may allow for placement of two sensor units 208 and other lengths of sensor receptacles 220 may allow for placement of, for example, five or more sensor units 208. Although the preferred embodiment illustrates a specific length, various sizes may beimplemented without departing from embodiments of the present invention as noted above.
The sensor receptacle 220 also includes a plurality of connectors 230 along a rear channel 226 of the conduit 224 and an interface 228 for connecting to and interfacing with interface 28 of the container security device 12. The connectors 230connect the sensor units 208 to a serial bus (not shown), such as a bus based on I.sup.2C and/or the RS485 standard. The connectors 230, serial bus, and the interfaces 28, 228 allow for exchange of information and/or battery power between any additionalsensor units 208 and the container security device 12. For example, an additional sensor unit 208, such as a radioactivity sensor unit, may sense a radioactivity level that is transferred to the container security device 12 via the connector 230 andinterfaces 28, 228. The container security device 12 transmits the radioactivity level or data associated therewith to a reader. Alternatively, or in addition, the radioactivity level may be received by the container security device 12 and the device12 then determines if the radioactivity level is outside of a predetermined safe range. If so, then the container security device 12 may transmit an alarm in addition to, or in place of, the radioactivity level data. In alternate embodiments, a sensorunit 208 may be a wireless device (e.g., utilizing RFID/Bluetooth/Zigbee/Ultra-Wide Band) enabling an internal wireless sensor network using the container security device 12 as an access gateway.
In alternate embodiments of the present invention, the sensor receptacle 220 may include at least one additional port extending outside of the container for personnel to access the sensors, download data, check for warnings, reset thresholds,etc. The additional port may be utilized in addition to, or in place or, the interface 228 that connects to the container security device 12.
FIGS. 2N-2Q illustrate various views of additional sensor units 208 for placement in the sensor receptacle 220. In the illustrated embodiment, each sensor unit 208 is substantially rectangular with a notch 252 located at an upper end of thesensor 208. The notch 252 allows for easy removal and placement of the sensor unit 208 in the sensor receptacle 220. Although the sensor unit 208 is shown having a generally rectangular shape, other shapes of sensors are equally applicable to thepresent invention. For example, some sensor units 208 may be square in shape and may or may not have the notch 252 at the upper end. In addition, the sensor units 208 may be hour-glass shaped to allow for placement and removal of the sensor units 208and, in this case, the notch 252 would be unnecessary.
The sensor units 208 also include a recess 254 along their back side 256. The recess 254 may be offset from center in order to prevent sensor units 208 from being installed incorrectly. In this recess 254 is an interface 258, such as a D-subconnector. The interface 258 couples to the connector 230 of the sensor receptacle 220. The recess also guides the sensor units 208 in place and helps to align the interface 258 with the connector 230 of the sensor receptacle.
Referring now to FIG. 2R, a block diagram of an exemplary sensor unit 208 is illustrated. Each sensor unit 208 includes a sensor 270, a microprocessor 272, a memory 274, a communications protocol unit 276, an interface 258, and an optional powersource 278. As set forth above, the sensor 270 may sense any number of characteristics, such as radioactivity, humidity, shock, vibration, temperature, light, ammonia, combustible gas, etc. The microprocessor 272 and the memory 274 work in conjunctionwith each other to determine acceptable thresholds and determine when the sensor 270 senses a characteristic that is outside of the acceptable threshold. The memory may also store various readings from the sensor 270 or other information. Thecommunications protocol unit 276 allows the sensor unit 208 to communicate on the serial bus of the sensor receptacle 220 via the interface 258.
The sensor units 208 may provide a variety of data related to the contents or the conditions of the containers as noted above. Each type of sensor may be identified by color, international symbology, and/or other identification means for ease ofinstallation for any type of personnel in a variety of environments. In addition, one of the sensor units 208 may be formed as an additional battery pack for providing battery power to one or more of the additional sensor units 208 and/or the containersecurity device 12. Alternatively, each sensor unit 208 may have an internal battery supply as noted by optional power source 278. One of the sensor units 208 may also be a Radio Frequency Identification (RFID) reader or an RFID reader gateway. TheRFID reader may sense RFID tags on cargo that is loaded or unloaded from each container independent of whether the container is sealed or unsealed. RFID tags may be placed on individual items, pallets, etc. In this way, cargo shipments can be monitoredto determine what cargo has been placed in or removed from a container. Furthermore, one or more of the sensor units 208 may be equipped for wireless communication inside the container via Bluetooth, infrared, or other wireless communicationtechnologies. In this way, a sensor unit 208 may be mounted on a wall or ceiling inside a container remote from the container security device 12 and the sensor receptacle 220. The remote sensor unit 208 may then transmit data to a sensor unit 208within the sensor receptacle 220. The information, such as any resulting alarms and/or the sensed data itself, may then be forwarded to the container security device 12 and/or a reader. For example, a sensor unit 208 may detect a characteristic (e.g.,light, gas, radioactivity, etc.) outside of a predetermined threshold. The sensor unit 208 may then send a warning or alarm that is transmitted outside the container by the container security device 12. The container may then be flagged for inspectionor quarantine. Similarly to the container security device 12, in some embodiments, the sensor units 208 may also use a unique secure key that is erased, from the memory 24 of the container security device 12, when the sensed characteristic is outside ofa predetermined threshold (described in further detail with reference to FIG. 10B using a different sensor as input in steps 1054, 1070, and 1084).
FIG. 2S illustrates a plurality of diagrams for installing the sensor receptacle 220 and additional sensor units 208 in the C-channel 206 of the container. The door 202 of the container is open to illustrate the vertical beam 204 and theC-channel 206 located in the interior of the container. The container security device 12 may be positioned, as noted above, with a portion of the container security device 12 in the C-channel 206 and another portion across the vertical beam 204. Thesensor receptacle 220 is also placed with the conduit 224 within the C-channel 206 and the protrusions 222a, 222b across the vertical beam 204. The sensor units 208 may be placed in the conduit 224 and connected to the interface 228 for transmittinginformation to the container security device 12. The container security device 12 may receive the information from the sensor units 208 and transmit the information to a reader.
FIG. 2T is a perspective view of the device 12 of FIG. 2D as installed on the container 10. The device 12 is shown attached to the vertical beam 204 so that the door sensor 29 (not shown) within the support arm 102 is adjacent to the verticalbeam 204, the antenna arm 104 is positioned in an area of the hinge channel of the container 10, and the data unit 100 is positioned inside the C-channel 206 of the container 10. As more clearly shown herein, the antenna arm 104 protrudes from thesupport arm 102 to an area substantially near the hinge portion of the container 10 in order to remain on the exterior of the container 10 when the door 202 is closed.
By placing the data unit 100 on the interior of the container 10, opportunities for tampering and/or damage to the device 12 are reduced. Because the data unit 100 is disposed in the C-channel 206, even though the contents of the container 10may shift during transport, the contents are not likely to strike or damage the device 12.
Although the above embodiment is shown as a single unit including at least one sensor and an antenna 20 for communicating with the reader 16, the present invention may be implemented as several units. For example, a light, temperature,radioactivity, etc. sensor may be positioned anywhere inside the container 10. The sensor takes readings and transmits the readings via BLUETOOTH, or any short range communication system, to an antenna unit that relays the readings or other informationto the reader 16. The sensors may be remote and separate from the antenna unit. In addition, the above embodiment illustrates a device 12 that includes a door sensor 29 for determining whether a security breach has occurred. However, an unlimitedvariety of sensors may be employed to determine a security condition in place of, or in addition to, the door sensor 29. For example, a light sensor may sense fluctuations in light inside the container 10. If the light exceeds or falls below apredetermined threshold, then it is determined a security breach has occurred. A temperature sensor, radioactivity sensor, combustible gas sensor, etc. may be utilized in a similar fashion.
The device 12 may also trigger the physical locking of the container 10. For instance, when a reader 16 secures, via a security request, the contents of the container 10 for shipment, the microprocessor 22 may initiate locking of the container10 by energizing elecromagnetic door locks or other such physical locking mechanism. Once the container is secured via the security request, the container 10 is physically locked to deter theft or tampering.
As shown in FIG. 3A, the reader 16 includes a short range antenna 30, a microprocessor 36, a memory 38, and a power supply 40. The short range antenna 30 achieves the wireless short-range, low-power communication link to the device 12 asdescribed above with reference to FIG. 2A. The reader 16 may include or separately attach to a device that achieves a link to a remote container-surveillance system (e.g., according to GSM, CDMA, PDC, or DAMPS wireless communication standard or using awired LAN or a wireless local area network WLAN, Mobitex, GPRS, UMTS). Those skilled in the art will understand that any such standard is non-binding for the present invention and that additional available wireless communications standards may as wellbe applied to the long range wireless communications of the reader 16. Examples include satellite data communication standards like Inmarsat, Iridium, Project 21, Odyssey, Globalstar, ECCO, Ellipso, Tritium, Teledesic, Spaceway, Orbcom, Obsidian, ACeS,Thuraya, or Aries in cases where terrestrial mobile communication systems are not available.
The reader 16 may include or attach to a satellite positioning unit 34 is for positioning of a vehicle on which the container 10 is loaded. For example, the reader 16 may be the mobile reader 16(B) attached to a truck, ship, or railway car. Theprovision of the positioning unit 34 is optional and may be omitted in case tracking and positioning of the container 10 is not necessary. For instance, the location of the fixed reader 16(C) may be known; therefore, the satellite positioninginformation would not be needed. One approach to positioning could be the use of satellite positioning systems (e.g., GPS, GNSS, or GLONASS). Another approach could be the positioning of the reader 16 utilizing a mobile communication network. Here,some of the positioning techniques are purely mobile communication network based (e.g., EOTD) and others rely on a combination of satellite and mobile communication network based positioning techniques (e.g., Assisted GPS).
The microprocessor 36 and the memory 38 in the reader 16 allow for control of data exchanges between the reader 16 and the device 12 as well as a remote surveillance system as explained above and also for a storage of such exchanged data. Necessary power for the operation of the components of the reader 16 is provided through a power supply 40.
FIG. 3B is a diagram of a handheld reader 16(A) in accordance with the principles of the present invention. The handheld reader 16(A) is shown detached from a mobile phone 16(A1). The handheld reader 16(A) communicates (as previously mentioned)with the device 12 via, for example, a short-range direct sequence spread spectrum radio interface. Once the handheld reader 16(A) and the device 12 are within close range of one another (e.g., <100 m), the device 12 and the handheld reader 16(A) maycommunicate with one another. The handheld reader 16(A) may be used to electronically secure or disarm the container via communication with the device 12. The handheld reader 16(A) may also be used to obtain additional information from the device 12such as, for example, information from additional sensors inside the container 10 or readings from the door sensor 29.
The handheld reader 16(A) shown in FIG. 3B is adapted to be interfaced with a mobile phone shown as 16(A1) or PDA. However, as will be appreciated by those having skill in the art, the handheld reader 16(A) may be a standalone unit or may alsobe adapted to be interfaced with, for example, a personal digital assistant or a handheld or laptop computer. The reader 16 draws power from the mobile phone and utilizes Bluetooth, or any similar interface, to communicate with the mobile phone.
Additional application scenarios for the application of the device 12 and reader 16 will now be described with respect to FIGS. 4-8. Insofar as the attachment and detachment of the reader 16(B) to different transporting or transported units isreferred to, any resolvable attachment is well covered by the present invention (e.g., magnetic fixing, mechanic fixing by screws, rails, hooks, balls, snap-on mountings, further any kind of electrically achievable attachment, e.g., electro magnets, orfurther reversible chemical fixtures such as adhesive tape, scotch tape, glue, pasted tape).
FIG. 4 shows a first application scenario of the device 12 and the reader 16. As shown in FIG. 4 one option related to road transportation is to fix the reader 16 to the gate or a shipping warehouse or anywhere along the supply chain. In such acase, the reader 16 may easily communicate with the device 12 of the container 10 when being towed by the truck when exiting the shipping area. Another option is to provide the reader 16 as a handheld reader 16(A) as described above and then either scanthe device 12 as the truck leaves the area or carry the hand-held reader 16(A) within the cabin of the truck during surveillance of the container 10.
FIG. 5 shows a second application scenario for the device 12 and the reader 16 as related to rail transportation. In particular, FIG. 5 shows a first example where the reader 16 is attachably fixed along the rail line for short-range wirelesscommunication to those containers located in the reach of the reader 16. The reader 16 may then achieve a short range communication with any or all of the devices 12 of the containers 10 that are transported on the rail line.
The same principles apply to a third application scenario for the container surveillance components, as shown in FIG. 6. Here, for each container to be identified, tracked, or monitored during sea transport, there must be provided a reader 16 inreach of the device 12 attached to the container 10. A first option would be to modify the loading scheme according to the attachment schemes for the wireless communication units. Alternatively, the distribution of the readers 16 over the containership could be determined in accordance with a loading scheme being determined according to other constraints and parameters. Again, the flexible attachment/detachment of readers 16 for the surveillance of containers allows to avoid any fixed assets thatwould not generate revenues for the operator. In other words, once no more surveillance of containers is necessary, the reader 16 may easily be detached from the container ship and either be used on a different container ship or any other transportingdevice. The reader 16 may also be connected to the AIS, based on VHF communication, or Inmarsat satellites, both often used by shipping vessels.
While above the application of the inventive surveillance components has been described with respect to long range global, regional or local transportation, in the following the application within a restricted area will be explained with respectto FIG. 7.
In particular, the splitting of the short range and long range wireless communication within a restricted area is applied to all vehicles and devices 12 handling the container 10 within the restricted area such as a container terminal, acontainer port, or a manufacturing site in any way. The restricted area includes in-gates and out-gates of such terminals and any kind of handling vehicles such as top-loaders, side-loaders, reach stackers, transtainers, hustlers, cranes, straddlecarriers, etc.
A specific container is not typically searched for using only a single reader 16; rather, a plurality of readers 16 spread over the terminal and receive status and control information each time a container 10 is handled by, for example, a craneor a stacker. In other words, when a container passes a reader 16, the event is used to update related status and control information.
FIG. 8 illustrates a flow diagram of a securing process in accordance with an embodiment of the present invention. First, at step 800, identification is requested from the device 12 by the reader 16. At step 802, the device 12 transmits theidentification to the reader 16 and, at step 804, the reader 16 selects a container 10 to secure. A request is sent from the reader 16 to the server 15 at step 806. At step 808, the server 15 generates a security key and encrypts the security key withan encryption code. At step 810, the encrypted security key is transmitted to the device 12 via the reader 16 in order to secure the container 10. At step 812, the security key is decrypted and stored in the device 12. A similar procedure may beinitiated to disarm the container 10. The container 10 may be secured automatically when passing in range of a reader 16, or a user may secure or disarm specific chosen containers 10 at a time.
FIG. 9 illustrates a security-check process in accordance with an embodiment of the present invention. At step 900, the reader 16 transmits a challenge to the container 10 in question. At step 902, the device 12 of the container 10 generates aresponse using a security key and an encryption code. At step 904, the response is sent from the device 12 to the reader 16. At step 906, the reader 16 also sends a challenge to the server 15. The challenges to the server 15 and the device 12 may betransmitted substantially simultaneously or at alternate points in time. The server 15 generates and sends a response utilizing the security key and an encryption code to the reader 16 at steps 908 and 910 respectively. At step 912, the reader 16determines if the responses are equal. If the responses are equal, then the container 10 remains safely secured. Alternatively, if the responses are not equal, then a security breach (i.e., door event) of the container 10 has occurred. Similarly tothe securing and disarming processes, a security-check may be performed automatically as the container 10 passes in range of a reader 16 or a user may initiate a security-check at any time during transport.
FIG. 10 is a flow diagram 1000 of a calibration and filter process for the door sensor 29 is illustrated. At step 1002, the door sensor 29 is activated to sense a current pressure value every 0.5 seconds, although other time increments may beimplemented. The current pressure value is read from the door sensor 29 at step 1004. At step 1006, a number of readings (X), with a time distance of 30 microseconds between each, are accumulated in order to calculate a mean pressure value at step1008. At step 1010, it is determined whether the door is open. The door is considered open if the mean value is above an open threshold calculated in previous iterations at step 1022 and 1024 below. If the door is open, then the flow proceeds to step1012, at which step the mean pressure value is added to a slow low pass filter to get the value for the sensor without any pressure attached (upper limit reference). If it is determined that the door is closed at step 1010, then the flow proceeds tostep 1014, at which it is determined whether the device 12 is currently in an armed state (i.e., whether the container 10 has been secured). If the device 12 is not armed, then the door status is updated at step 1016. If the device 12 is armed, then itis determined at step 1018 whether the device 12 was previously armed. If the device 12 was not previously armed, then at step 1020, an armed limit reference is set to the current mean pressure value from step 1008. At step 1022, open, close, andtamper thresholds are calculated using the upper limit reference from step 1012 and the armed limit reference from step 1020. The open, close, and tamper thresholds are used to determine if the door is opened or closed at step 1010 and 1026. At step1026, it is determined whether the current pressure value exceeds the open or tamper limits. In some embodiments, the tamper evaluation may involve determining if the mean value from step 1008 exceeds the open or tamper limits. If the mean value doesexceed the open or tamper limits, then the tamper alarm may set to alert the system and/or user that a security breach has occurred. If the mean value does not exceed the open or tamper limits, then no alarm may be generated.
FIG. 10B is a flow diagram illustrating a tamper evaluation subroutine 1050 that may be utilized as the tamper evaluation of step 1026 of FIG. 10A. In the subroutine 1050, three pairs of level and time limits are used, however, any otherappropriate number of pairs of level and time limits may be utilized. The tamper evaluation subroutine is initiated at step 1052. At step 1054, a determination is made whether the door sw value, or any other sensor value, is greater than a first value. If, at step 1054, it is determined that the door sw value is not greater than the first value, then execution proceeds to step 1056. At step 1056, a counter 1, a counter 2, and a counter 3 are all cleared. At step 1058, a new door sw value is added tothe filter for the armed limit reference value. At step 1060, execution ends.
If, at step 1054, it is determined that the door sw value is greater than a first value, execution proceeds to step 1062. At step 1062, the counter 1 is incremented. At step 1064, a determination is made whether the counter 1 is greater thantime 1. If it is so determined at step 1064, execution proceeds to step 1066. At step 1066, it is determined that the event is a tampering event. At step 1068, execution ends.
If, at step 1064, it is not determined that the counter 1 is greater than the time 1, execution proceeds to step 1070. At step 1070, a determination is made as to whether the door sw value is greater than a second value. If it is so determinedat step 1070, then execution proceeds to step 1072. At step 1072, the counter 2 is incremented. At step 1074, a determination is made as to whether the counter 2 is greater than time 2. If it is so determined, then execution proceeds to step 1076, atwhich step it is determined that the event is a tampering event. At step 1078, execution ends.
If, at step 1070, the door sw value is not found to be greater than a second value, the execution proceeds to step 1080. At step 1080, the counter 2 and the counter 3 are each cleared. At step 1082, execution ends.
If, at step 1074, it is not determined that the counter 2 is greater than time 2, execution proceeds to step 1084. At step 1084, a determination is made as to whether the door sw value is greater than a third value, If it is so determined, thenexecution proceeds to step 1086. At step 1086, the counter 3 is incremented. At step 1088, a determination is made as to whether the counter 3 is greater than time 3. If it is so determined, then execution proceeds to step 1090, at which it isdetermined that the event is a tampering event. At step 1092, execution ends. If, at step 1088, it is determined that the counter 3 is not greater than time 3, then the execution ends at step 1094.
If, at step 1084, it is determined that the door sw value is not greater than the third value, then counter 3 is cleared at step 1096. At step 1098, execution ends.
FIG. 11 illustrates a flow diagram for requesting data from a sensor unit 208. At step 1100, the procedure is started at, for example, a reader. At step 1102, a "get data from sensor" command is sent to the container security device 12 whichforwards the command to the sensor 270. At step 1104, the container security device 12 waits for a "get data from sensor" response. The response may include raw data from the sensor 270 or other pertinent information such as time stamps, thresholdvalues, etc. At step 1106, it is determined whether a stop flag has been received. If a stop flag has not been received then the procedure begins again at step 1102. If a stop flag has been received, then the procedure is ended at step 1108.
FIG. 12 illustrates a flow diagram for sending data to a sensor unit 208. For example, data may be sent to the senor unit 208 in order to configure the sensor unit 208 or make commands to the sensor unit 208. The sensor unit 208 may beconfigured, for example, to have specific allowable thresholds for acceptable sensed data. At step 1200, the procedure is started in a manner similar to that of FIG. 11. At step 1202, a "send data to sensor" command is sent to the container securitydevice 12. At step 1204, the container security device 12 waits for a "send data to sensor" response. The response may be an acknowledgment that the thresholds are set correctly or another type of response may be generated based on the type of datasent to the sensor unit 208. At step 1206 it is determined whether a stop flag has been sent. If the stop flag has not been sent, then the procedure begins again at step 1202. If the stop flag has been received, then the procedure is ended at step1208.
FIG. 13 illustrates a flow diagram for executing a wake up procedure for a sensor 270. At step 1300, the procedure is started at, for example, a reader or user application. At step 1302, a "sensor wake up command" is sent to the sensor 270. Atstep 1304, the "get data from sensor" command is sent to the sensor to receive data from the sensor 270 in a manner similar to that of FIGS. 11 and 12. At step 1306, it is determined wither a response has been received from the sensor 270. If theresponse has not been received, the procedure begins again at step 1302. If a response has been received then, at step 1308, the data is sent from the sensor 270 to the container security device 12. At step 1310, the procedure is ended.
Although embodiment(s) of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the present invention is not limited to the embodiment(s)disclosed, but is capable of numerous rearrangements, modifications, and substitutions without departing from the invention defined by the following claims. | 2019-04-25T12:11:23Z | http://www.patentgenius.com/patent/7479877.html |
Modern banking system plays a vital role for a nation’s economic development. Over the last few years the banking world has been undergoing a lot of changes due to deregulation, technological innovations, globalization etc. These changes also made revolutionary changes of a country’s economy. Present world is changing rapidly to face the challenge of competitive free market economy. It is well recognized that there is an urgent need for better-qualified management and better-trained staff in the dynamic global financial market. Bangladesh is no exceptions of this trend. Banking Sector in Bangladesh is facing challenges from different angles though its prospect is bright now and in the future.
To meet up the growing needs of skilled and eligible managerial and executive manpower of in the country, University Of Uttara, has initiated the BBA (Bachelor Business Administrator) Program which follows the international education quality standards. The objective of the BBA Program is to prepare individuals to develop the specific skills and judgment required for effective business operation. The BBA Program is designed to integrate the whole business knowledge and ideas to with gather practical knowledge about actual business environment and activities. For this purpose, our course supervisor has assigned me to prepare a report on the topic “Strategies for adopting CSR in the business: Sonali Bank Limited”.
The primary objective of the study is to meet the partial requirements for the fulfillment of the BBA Program.
To gain practical exposures in CSR activities conducted by banks.
To observe and analyze the performance of CSR activities of the bank.
To find out the effect of CSR activities in the country both for the stakeholders and the organization.
To have some practical exposures that will be helpful for my future; student as well as a professional in rest of my life.
Annual Report of SONALI BANK LIMITED.
Internet was used as a theoretical source of information.
Some article has been used as a source of critics and their analysis.
Daily newspaper and the bank’s website is used for sourcing related information about the bank.
Analyzing the critical financial business activities of a Bank is not that easy. Moreover due to obvious reasons of lack of my expertise we might not make the report as like as it should be. But we have tried our best to make is as much better as possible to us.
We do not have that much practical knowledge to make the report that much meaningful.
The availability of information was limited. We could not collect all the necessary information we needed.
Making the report on the whole banking industry was hardly possible for us. That is why, with the permission of our instructor, we put a limit on our report and conduct the report on only SBL.
And of course as students of BBA Program, we might not be able to capture the whole situation in our report for our lacking of experience in this regard.
Corporate social responsibility is necessarily an evolving term that does not have a standard definition or a fully recognized set of specific criteria. With the understanding that businesses play a key role on job and wealth creation in society, CSR is generally understood to be the way a company achieves a balance or integration of economic, environmental, and social imperatives while at the same time addressing shareholder and stakeholder expectations. CSR is generally accepted as applying to firms wherever they operate in the domestic and global economy. The way businesses engage/involve the shareholders, employees, customers, suppliers, governments, non-governmental organizations, international organizations, and other stakeholders is usually a key feature of the concept. While business compliance with laws and regulations on social, environmental and economic objectives set the official level of CSR performance, CSR is often understood as involving the private sector commitments and activities that extend beyond this foundation of compliance with laws.
From a progressive business perspective, CSR usually involves focusing on new opportunities as a way to respond to interrelated economic, societal and environmental demands in the marketplace. Many firms believe that this focus provides a clear competitive advantage and stimulates corporate innovation.
CSR is generally seen as the business contribution to sustainable development which has been defined as “development that meets the needs of the present without compromising the ability of future generations to meet their own needs”, and is generally understood as focusing on how to achieve the integration of economic, environmental, and social imperatives. CSR also overlaps and often is synonymous with many features of other related concepts such as corporate sustainability, corporate accountability, corporate responsibility, corporate citizenship, corporate stewardship, etc..
CSR commitments and activities typically address aspects of a firm’s behavior (including its policies and practices) with respect to such key elements as; health and safety, environmental protection, human rights, human resource management practices, corporate governance, community development, and consumer protection, labor protection, supplier relations, business ethics, and stakeholder rights.
The societal marketing concept is an enlightened marketing that holds that a company should make good marketing decisions by considering consumers’ wants, the company’s requirements, and society’s long-term interests. It is closely linked with the principles of Corporate Social Responsibility and of Sustainable Development.
The concept has an emphasis on social responsibility and suggests that for a company to only focus on exchange relationship with customers might not be in order to sustain long term success. Rather, marketing strategy should deliver value to customers in a way that maintains or improves both the consumer’s and the society’s well-being.
Most companies recognize that socially responsible activities improve their image among customers, stockholders, the financial community, and other relevant publics. Ethical and socially responsible practices are simply good business, resulting not only in favorable image, but ultimately in increased sales.
Societal marketing should not be confused with social marketing. The societal marketing concept was a forerunner of sustainable marketing in integrating issues of social responsibility into commercial marketing strategies. In contrast to that, social marketing uses commercial marketing theories, tools and techniques to social issues. Social marketing applies a “customer orientated” approach and uses the concepts and tools used by commercial marketers in pursuit of social goals like Anti-Smoking-Campaigns or fund raising for NGOs.
Business ethics is a form of the art of applied ethics that examines ethical principles and moral or ethical problems that can arise in a business environment. In the increasingly conscience-focused marketplaces of the 21st century, the demand for more ethical business processes and actions (known as ethicism) is increasing. Simultaneously, pressure is applied on industry to improve business ethics through new public initiatives and laws.
Business ethics can be both a normative and a descriptive discipline. As a corporate practice and a career specialization, the field is primarily normative. In academia, descriptive approaches are also taken. The range and quantity of business ethical issues reflects the degree to which business is perceived to be at odds with non-economic social values. Historically, interest in business ethics accelerated dramatically during the 1980s and 1990s, both within major corporations and within academia. For example, today most major corporate websites lay emphasis on commitment to promoting non-economic social values under a variety of headings (e.g. ethics codes, social responsibility charters). In some cases, corporations have redefined their core values in the light of business ethical considerations (e.g. BP’s “beyond petroleum” environmental tilt).
The term CSR itself came in to common use in the early 1970s although it was seldom abbreviated. The term stakeholder, meaning those impacted by an organization’s activities, was used to describe corporate owners beyond shareholders from around 1989.
Companies interested in advancing corporate social responsibility and in improving their social and environmental performance as part of their business have a wide range of tools available for application. Tools can vary widely in terms of objectives, scope, costs, level of formality, partnerships, extent of stakeholder involvement, and many other characteristics. Tools can be applied to one or more of the planning, implementation, checking, and improvement facets of corporate operations.
Businesses have options in how they can use the tools. For example, companies can use the tools that have been developed by others or they can develop their own tools – either independently or in partnership with other stakeholders. SBL develop their own CSR tools and other can follow them at the beginning stage. On the other hand SBL can follow the best practice around the world.
Some commentators have identified a difference between the Continental European and the Anglo-Saxon approaches to CSR. And even within Asia the discussion about CSR is very heterogeneous.
An approach for CSR that is becoming more widely accepted is community-based development projects. An often alternative approach to this is the establishment of education facilities for children’s, as well as HIV/AIDS education program for adults. The majority of these CSR projects are established in Africa. A more common approach of CSR is through the giving of aid to local organizations and impoverished communities in developing countries. Some organizations do not like this approach as it does not help build on the skills of the local people, whereas community-based development generally leads to more sustainable development.
The United Nations Global Compact promotes companies reporting in the format of a Communication on Progress (COP). A COP report describes the company’s implementation of the Compact’s ten universal principles.
technical guidance on eco-efficiency indicators, corporate responsibility reporting and corporate governance disclosure.
Some nations require CSR reporting, though agreement on meaningful measurements of social and environmental performance is difficult. Many companies now produce externally audited annual reports that cover Sustainable Development and CSR issues (“Triple Bottom Line Reports”), but the reports vary widely in format, style, and evaluation methodology (even within the same industry). Critics dismiss these reports as lip service, citing examples such as Enron’s yearly “Corporate Responsibility Annual Report” and tobacco corporations’ social reports.
Name of the Manager: Kazi Nazrul Islam.
Soon after independence of the country Sonali Bank emerged as the largest and leading Nationalized Commercial Bank by proclamation of the Banks’ Nationalization Order 1972 (Presidential Order-26) liquidating the then National Bank of Pakistan, Premier Bank and Bank of Bhwalpur. As a fully state owned institution, the bank had been discharging its nation-building responsibilities by undertaking government entrusted different socio-economic schemes as well as money market activities of its own volition, covering all spheres of the economy.
The bank has been converted to a Public Limited Company with 100% ownership of the government and started functioning as Sonali Bank Limited from November 15 2007 taking over all assets, liabilities and business of Sonali Bank. After corporatization, the management of the bank has been given required autonomy to make the bank competitive & to run its business effectively.
Sonali Bank Limited is governed by a Board of Directors consisting of 11(Eleven) members. The Bank is headed by the Chief Executive Officer & Managing Director, who is a well-known Banker and a reputed professional. The corporate head quarter of the bank is located at Motijheel, Dhaka, Bangladesh, and the main commercial center of the capital.
Socially committed leading banking institution with global presence.
Your trusted partner in innovating banking.
SBL is one of the largest public banks in Bangladesh. Recently it is going to introduce shares. It operates through One Head Office, 30 Main Divisional Offices, 6 General Manager’s Office, 42 Principal Offices, 19 Regional Offices and 198 fully computerized branches, ensuring best possible and fastest services to its valud clients and efficient management.
Sonali Bank Limited is the largest commercial bank of Bangladesh. It has 1187 branches throughout the country. It has also overseas branches. The Head Office of the bank is located at the Motijheel Commercial Area, Dhaka. The Divisions are headed by the DGMs and the departments are by AGMs. There are also many sections under every department in the Head Office. A DGM is the chief of the Principal Office and an AGM usually runs a regional office. Principal Offices are the local points of the bank’s administrative zone in the districts. The regional offices are under control and supervision of principal offices. The offices are situated at Thana level within the districts. The corporate are nearly equivalent to the GM office and usually headed by the DGMS. They provide all the banking services such as general banking, loans & advances etc.
Micro Credit has now been accepted and recognized as an effective tool for poverty alleviation, self employment and rural socio-economic development. In commitment to reduce poverty in urban and semi-urban and rural areas, Sonali Bank Limited has started micro credit function through a fully fledged Micro credit division in its Head Office from 2003. As such the Bank has been striving its best to provide speedy and active support to this sector.
Presently, 32 Micro Credit projects/programmes are being run by the Bank. Amongst the programmes, Bank-NGO Linkage wholesale credit programme, Goat rearing, Fruit, Herbal, Medicinal and Nursery development credit scheme, Loan programme for Disabled persons, Swanirvor, different types of Credit through BRDB-UCCA ( Corp, Irrigation & Poverty Alleviation), ADB financed Rural Livelihood project (RLP) in 152 Upazilla, Daridro Bimochone Shahayta Rin Karmachuchi, Rural small business & Small Farming loan scheme , BARD Comilla – SB & RDA Bogra – SB Functional Research project etc. deserve special mention in channelizing the financial resources for poverty alleviation and rural socio economic development of the country. Credit for Urban Women Micro Enterprise Development (CUMED) project without collateral up to Tk. 5.00 lacs operating in 9 selected branches in Dhaka city, now CUMED has been extended in Dhaka city more 17 branches in addition to existing 9 branches, Chittagong two branches, Moulavi Bazar 3 branches and in total 92 branches including all District branches of all over the country. Micro Entrepreneur development credit programme -`Unmesh’ operating in Moulvibazar district, now this credit programme has been extended all over the country. Daridro Bimochone Shahayta Rin Karmachuchi now has been extended all over the country in the year 2010. In the year 2007 a special credit programme named ` SIDR ‘ has been introduced for SIDR affected areas in which there are a provision of collateral free loan up to Tk. 20,000.00.
More over to make the self dependency especially for the women Micro credit Division has been introduced a now Loan programme in the year 2010 named ~ Jago Naree Grameen Rin” through 250 Rural branches all over the country with a provision of collateral free up to Tk. 25,000.00.
Up to December, 2010 a total amount of Tk.422426 Lacs has been disbursed under various projects/programmes monitored by this Micro Credit Division, whereas it was Tk. 386529 Lacs Up to Dec. 2009. On the other hand total recovery position stands at Tk. 482839 Lacs as on December 2010, whereas it was Tk. 463854 Lacs up to Dec. 2009. The present outstanding position of Micro Credit is Tk. 98263 Lacs.
Sonali Bank Limited offers multiple special services with its network of branches throughout the country in addition to its normal banking operations.
Passport fees, visa fees and Travel tax.
Pension of employees of Government and other Corporate Bodies.
Govt. & Non-Govt. Teachers’ salary.
Widows, divorcees and destitute women allowances.
Rehabilitation allowances for acid survival women.
Maternal allowances for poor women.
US Dollar Premium & Investment Bond.
Public Service Commission’s application form.
Judicial Service Commission’s application form.
Exchange of soiled / torn notes.
Bank a/c information of tax payer client according to demand of NBR.
Enlist of Non Government Insurance Company.
Sonali Bank staff college, Dhaka along with four Training Institutes / Centers at Chittagong, Rajshahi, Khulna and Bogra have been conducting training program covering total Banking activities in order to impart training to all categories of officers and staff of Sonali Bank.
In the year 2003 as many as 8430 officers and staff received training in 383 batches of different courses, workshops and seminars conducted by the aforesaid training institution & Staff College.
With the objectives of enriching knowledge and working efficiency of the officers and members of the staff of Sonali Bank, the Bank has a central library. Library is situated on the 7th floor of its Head Office Building. It has now been turned into a modern library by extending its facilities. It has been enlarged with the latest books on Banking, Foreign Exchange, Computer, Management, Accounting, Agriculture, Industrial Finance, Economics, Economics, Religion, and Literature and on many other disciplines. Moreover, different international journals covering world economy, political and other aspects are also being available here to attract and inspire the readers.
The ethos of SBL for pursuing its activities in social arena has got further momentum with your enthusiasm and support. Sonali Bank Foundation (SBL) is consistently pursuing its objective of being active in those social areas where it is needed most. The Foundation carries out diverse social and philanthropic activities in the field of education, health, conservation of nature, creation of social awareness, rehabilitation of distressed people and such other programs to redress human sufferings. It also promotes different socio-cultural and sports activities. Your Board of Directors in order to discharge its corporate social responsibilities in a greater perspective continued its contribution amounting to 5.00% of Bank’s profit after charging loan loss provision to Sonali Bank Foundation (SBL).
It is important that citizens of a society enjoy the full benefits that society offers. A society, in turn, flourishes when its citizen can contribute their fullest potential. The well-being of individuals is jeopardizing when normal developmental processes are interrupted by personal crisis, poverty, unemployment, poor health and inadequate education. SONALI BANK LIMITED (SBL) is the first Bangladeshi bank in Bangladesh addresses social concerns that threaten the structure of society and redress social conditions that adversely affect the well-being of people and society. SBL practice thus encompass the professional activities of helping individuals, families, groups, organizations, and communities to enhance or restore their capacity for optimal social functioning and of .creating societal conditions favorable to this goal. Sonali Bank Limited Foundation (SBLF) was established on 3rd June, 2001 to perform humanitarian works like rehabilitation of the destitute and neglected portion of the society especially grassroots level poor in right track. Aim and objectives of SBLF are as bellow.
To grant, pay or give, award scholarship, stipends, prizes, rewards, allowance and other financial assistance or help in cash or kind to students with a view to help them in prosecuting their study in universities, schools, colleges, educational institutions, technical institutions, art schools, institutions of teaching commercial and training, research or educational works in Bangladesh or abroad subject to such terms and conditions as shall from time to time be prescribed by the Board of Trustees for advancement and promotion of education.
To foster and encourage education and training in the field of banking among the persons employed in banking sector or who wishes to partake training with a view to be engaged in banking service and to establish and found institutions imparting such education and to establish, maintain, support or .help by monetary gifts or otherwise, centers and institutions for such education and training.
To meet traveling, boarding and lodging expenses for students going abroad for higher commercial and technical education, especially in banking subject(s).
To open, found, establish, promote, set-up, run, maintain, assist, finance, support and I aid or help in setting up and / or maintaining and / or running hospitals, clinics, maternity and child care centre, boarding houses, libraries, reading-rooms, gymnasium and other training and vocational institutes.
To publish and or publishing books, pamphlets, periodicals, and newspapers in Bangladesh or outside for the spread and advancement of education and culture.
institutions, orphanages, widow homes, lunatic, asylums, old homes, poor houses or other establishments for relief and / or help to the poor, old and infirm people and / or destitute or to give, provide and / or render help and assistance in cash or kind to poor and or destitute, widows, etc; or to give, provide and I or render help and assistance to and / or implement any scheme for providing livelihood and enlistment of the poor.
To give, provide and I or render food, medicine and other help find assistance in any shape or form to the poor deserving and needy persons.
To give, provide and I or render monetary and / or other help and assistance for the relief of persons and animals affected by natural and other calamities such as flood, fire, famine, cyclone, earth-quake, storm, accident, pestilence, drought, epidemic, etc.
To open, found, establish, promote, set-up, run, maintain, assist, finance, support and / or aid or help in the setting up and / or maintaining and / or running institutions, centre, auditoriums and the like for the running of welfare and other services to the public and to provide meeting-room for socially useful activities and functions.
To promote, organize, administer, establish, support, maintain, and / or grant to any person, institution or society or organization whatsoever having for its objects or charitable purposes and or incur expenditure in connection therewith.
To promote sports and culture through establishment of Clubs for sports, recreational and cultural activates and introduce awards, shields, medals etc. and also organize debates essay and sports competitions to achieve this object.
To organize meetings, seminars, symposia etc. to create awareness among the people aimed at spreading and upholding the ideals, values and spirit of the Banking and related products and services.
To work in collaboration with other Trusts, Foundations, Associations and bodies having activities, programs, and projects aimed at establishing, spreading and upholding the ideals of Sonali Bank Limited Foundation.
As a part of Corporate Social Responsibility, SONALI BANK LIMITED have been extending medical facilities and other support to 50 HIV positive patients since 2004. In continuation of this program, SBL organized a “Treatment Card” distribution program among the HIV positive patients on June11, 2007 in Hotel Purbani International, Dilkusha, Dhaka. Major General (Rtd.) Dr. ASM Matiur Rahman, Honorable Advisor, Ministry of Health & Social Welfare, Water Resources and Religious Affairs, Govt. of the People’s Republic of Bangladesh was present as the chief guest and distributed the Treatment Cards to 50 HIV/AIDS positive patients while Mr. Md. Yeasin Ali, Managing Director of the bank presided over the function. Professor Nazrul Islam, Head of Virology Department, Bangabandhu Sheikh Mujib Medical University (BSMMU) and Dr. Md. Shahzahan Biswas, Director General (Health Services), Health Directorate were present as special guests. Among others, Mr. K. S. Tabrez, Deputy Managing Director (Administration), Mr. Ghulam Kabir, Deputy Managing Director (Operation) and Senior Executives of the bank were also present at the function.
Target group: HIV/AIDS affected women and children.
Description of the program: HIV/AIDS is setting its firm foothold in Asian countries, Bangladesh is one of them. In Bangladesh HIV/AIDS related activities are limited to build up awareness but there is a little work for affected person. SBLF has taken a program of supporting HIV/AIDS positive women and children by providing medicines, clinical support, food supplement and other essentials. Under this program treatment cards were already distributed to 23 HIV/AIDS positive patients among them 03 are children. Tk.17,25,000.00 (Taka seventeen lac twenty five thousand) only has already sanctioned for implementation of the program to support 23 HIV positive patients (HIV/AIDS affected women and children).
Plan for next five years: If this program becomes success then after evaluation it will be extended for future.
Target group: Boys and girls suffering from cleft-lip and palate whose parents are incapable to bear the operation cost of cleft lip.
with cleft-lip through plastic surgery since 2003. More than 800 numbers of poor cleft-lipped boys & girls have so far been successfully operated across the country. Through arrangement of special camps of under this ‘smile brighter’ program in Dhaka, Chittagonj, Rajshahi, Sylhet, Khulna, Barisal, Bogra, Comilla, Rangpur, Dinajpur etc. As a continuous process, the cleft-lipped boys & girls are being operated across the country for restoration of hope and dignity in their lives.
This is an ongoing program. Around 1500 cleft-lip and/or palate boys and girls will come under this program in the next 05 years and the expenditure in this regard will be Tk.l,27,50,000.00 (one crore twenty seven lac fifty thousand) only.
Description of the program: To create social awareness, SBLF is supporting the acid and dowry victim women of different parts of Bangladesh by one time donation for their rehabilitation and to maintain small scale business like poultry rearing, goat farming, fish farming etc. Under this program 400 (four hundred) helpless dowry victims and 100 (one hundred) acid victims has already received one time donation of Tk.10,000/- per person in this year (2005) which cost totaling Tk.50,00,000.00 (taka fifty lac) only. If the victims can utilize the money properly then SBL will provide them loan in a reduce interest rate (5%) for their betterment and proper rehabilitation. Another advertisement also has published in different newspaper on 3rd and 4th of June, 2005 inviting application from the victims where another 500 victims will get Tk. 10,000.00 (ten thousand) each and this will cost totaling Tk. 50,00,000.00 (taka fifty lac) only.
Plan for continuing the program: SBLF has planed to extend the program depending on the situation, analysis and evaluation report of the first phase.
SONALI BANK LIMITED (SBL) undertakes a project with BASIS (Bangladesh Association of Software and Information Services) to award the best IT uses by Bangladeshi companies.
SBL and BASIS organized IT award-giving ceremony in this regard. The award Ceremony was held on 30th November 2005, which was the day before last day of BASIS SOFfEXP02005 (November 27-December 01, 2005). This was a gala evening (with dinner and cultural program) attended by around 700 dignitaries including government high officials & policy makers, corporate heads, representatives from development agencies, IT policy makers, academicians and the IT industry members.
Mr. Md. Yeasin Ali, Managing Director of the Bank handed over a Payment Order of Tk. 25.00 lac (Taka Twenty Five Lac) to the Honorable Adviser Major General (Rtd.) M. A. Matin at Chittagong Circuit House on June 13, 2007 for victims due to a devastating landslides following torrential rains lashed down in Chittagong city and its adjacent areas.
SONALI BANK LIMITED (SBL) donated 130 bundles of GCI sheets worth Tk. 5.60 lac for rehabilitating the homeless people affected by river-erosion of Ramgoti Upazila under Noakhali District on August 14, 2005.
SONALI BANK LIMITED donated 700 bundles of high grade GCI sheets worth of Tk. 29.00 lac for rehabilitating the standard people of the four Upazilas of Gaibandha and Rangpur districts. Dr. Mozammel Hossain Khan, Co-ordination, SBL is seen handing over GCI sheets to Mr. Tapan Chandra Mazumdar, Deputy Commissioner of Gaibandha district.
Mr. Md. Yeasin Ali, Managing Director, SONALI BANK LIMITED is seen distributing blankets among the cold-affected people of Angarpota and Dohogram – the enclaves of Bangladesh. Notably, 4,000 blankets were distributed to cover each of the 4,000 families of the villages waiting for blankets.
The scale and nature of the benefits of CSR for an organization can vary depending on the nature of the enterprise, and are difficult to quantify. SBL is an organization having a huge number of customers in the local market and very successfully satisfies its stakeholders. However, businesses may not be looking at short-run financial returns when developing their CSR strategy and what exactly SBL follows. SBL has already proved that in Bangladesh. Not only as a local bank, SBL is the number one bank in Bangladesh with respect to CSR activities and has achieved ample growth and success in recent years.
Branding Bank and its services.
Businesses can use CSR and corporate sustainability to produce direct benefits for the bottom line. Operational efficiencies can be achieved in other facets of CSR such as streamlining the way that information is provided to the investment community as well as to other stakeholders that demand increased transparency. Managing potential risks and liabilities more effectively through CSR tools and perspectives can also reduce costs. Using corporate responsibility and sustainability approaches within business decision-making can result not only in reduced costs but can also lead to recognizing new market opportunities such as when new branches are opened that can be expanded to other areas, regions or markets.
The investment community has been exploring the links between corporate social responsibility and financial performance of businesses. There is growing evidence that companies that embrace the essential qualities of CSR generally outperform their counterparts that do not use features of CSR. This information is being translated into action within the investment community. An increasing number of mutual funds are now integrating CSR criteria into their selection processes to screen in sounder companies and/or screen out businesses that do not meet certain environmental or social standards. Thus, a CSR approach by a financial company can improve the stature of the company in the perspective of the investment community, a company’s stock market valuation, and its capacity to access capital from local market.
A key potential benefit from CSR initiatives involves establishing the conditions that can contribute to increasing the commitment and motivation of employees to become more innovative and productive. Companies that employ CSR related perspectives and tools tend to be businesses that provide the pre-conditions for increased loyalty and commitment from employees. These conditions can serve to help to recruit employees, retain employees, motivate employees to develop skills, and encourage employees to pursue learning to find innovative ways to not only reduce costs but to also spot and take advantage of new opportunities for maximizing benefits, reduce absenteeism, and may also translate into marginally less demands for higher wages.
A potential benefit of CSR is that it can improve a company’s reputation and branding and this in turn improves the prospects for the company to be more effective in the way that it manages communications and marketing in efforts to attract new customers and increase market share. CSR as a concept with various tools can help a company to position itself in the marketplace as a company that is more responsible and more sustainable than its competitors.
CSR can be viewed by businesses as a form of investment that helps to differentiate a bank and its products and services.
There are many different areas where a bank can invest to develop CSR attributes (e.g. human resource management, environmental protection, health and safety, community involvement, etc.). Investment decisions on CSR need to take account of various factors and parameters as well as the anticipated cost and benefit stream to be produced by the investment.
We are directing, managing, dealing and enhancing memories.
SBL is in the business of managing memories of customer through adopting extra-ordinary innovative CSR activities. For example SBL donated 9.73 core for establishing a research center in DU campus by the name of “Sonali Bank Social Science research center.” With the activities the 50,000 students of DU will remember it which will create a positive attitude in the minds of them. The students and researcher of DU and the country will see it as social contribution of SBL and they will create a buzz marketing and try to campaign SBL’s reputation on effective CSR activities. Buzz marketing later pull customer to SBL and they will fill good image of CSR activities of SBL which will create later a strong brand equity. Now a days brand equity is a unique asset for a business. Brand equity is an unique asset for a business which will be clarified by an example.
” I had been married four times.
So for a brand equity a customer can sacrifice everything even four times higher price than other brands even a hard long journey to find the brand.
So creating a strong brand by adopting effective CSR activities is indispensable.
We know A brand is a promise, a reassurance of consistent quality. Consumers face so many decisions each day in the market place that brands are an essential convenience to navigating the complexity of life. And in a recession, brands are even more important because we tend to rely even more on trusted, known quantities rather than experiment with new ideas and new products.
So with the above seen we see that SBL does so by adopting CSR activities which are fully accorded with their mission and vision. They are doing business in Bangladesh according to there promise which are stated in their mission and vision statement.
CSR is entwined in the strategic planning process of many of our local and multinational banks. The reasons or drive behind social responsibility towards human and environmental responsibility whether driven by ulterior motives, enlightened self-interest, or interests beyond the enterprise, is subject to much debate and criticism.
Some critics argue that corporations are fundamentally entities responsible for generating a product and/or service to gain profits to satisfy shareholders. Milton Friedman and others argue that there is no place for social responsibility as a business function.These critics point to the rule of corporate law that prohibits a corporation’s directors from any activity that would reduce profits.
Other critics argue that the practice cherry-picks the good activities a company is involved with and ignores the others, thus ‘greenwashing’ their image as a socially or environmentally responsible company. Still other critics argue that it inhibits free markets or seeks to pre-empt the role of governments in controlling the socially or environmentally damaging effects of corporations’ pursuit of self-interest.
Some critics believe that CSR programs are often undertaken in an effort to distract the public from the ethical questions posed by their core operations. Examples of companies that have been accused of this motivation include Standard Chartered Bank (SCB), which produces major CSR reports, and the petroleum giant BP, which is well-known for its high-profile advertising campaigns on environmental aspects of its operations. The global players do much more CSR activities in the developed world, but comparably do less in developing countries like Bangladesh.
Some CSR critics argue that the only reason corporations put in place social projects is for the commercial benefit they see in raising their reputation with the public or with government. They suggest a number of reasons why self-interested corporations, solely seeking to maximize profits, are unable to advance the interests of society as a whole. They point to examples where companies have spent a lot of time promoting CSR policies and commitment to Sustainable Development on the one hand, whilst damaging revelations about business practices emerge on the other.
These critics generally suggest that stronger government and international regulation, rather than voluntary measures, are necessary to ensure that companies behave in a socially responsible manner.
Corporations really care little for the welfare of workers or the environment, and given the opportunity will move production to sweatshops in less well-regulated countries.
Companies do not pay the full costs of their impact. For example, the costs of cleaning pollution often fall on society in general. As a result profits of corporations are enhanced at the expense of social or ecological welfare.
These critics are generally supporters of Milton Friedman, who argued that a corporation’s principal purpose is to maximize returns to its shareholders, while obeying the laws of the countries within which it works. Friedman argued that only people can have responsibilities.Because of this, moderate critics suggest that CSR activity is most effective in achieving social or environmental outcomes when there is a direct link to profit. This approach to CSR requires that the resources applied to CSR activities must have at least as good a return as these resources could generate if applied anywhere else. This analysis drastically narrows the possible scope of CSR activities.
Critics who believe that CSR runs against capitalism would go further and say that improvements in health, longevity or infant mortality have been created by economic growth attributed to free enterprise. Investment in less developed countries contributes to the welfare of those societies, notwithstanding that these countries have fewer protections in place for workers. Failure to invest in these countries decreases the opportunity to increase social welfare.
Despite having debate on CSR as a voluntary social welfare or as a marketing tool, CSR brings a lot of benefits for a corporation and SBL is a bright example for the local banks. Banking is a very much related with relationship management practice with its clients. So when a bank can touch the inner spirit of the people and can provide standard service, it will more likely to be successful. SBL is no doubt emotionally attached with its stakeholders and that is a key success factor for it. However every player in the industry should adopt and follow or go beyond the current CSR activities. | 2019-04-23T13:52:36Z | http://www.assignmentpoint.com/business/economics/assignment-on-sonali-bank-limited.html |
This is a HUGE giveaway…Last year in this giveaway I gave away 8 of my favorite things here at Joyful Jane to one happy winner, but this year I am giving away even MORE-13 new items in total! My friends at the THM Blogger Test Kitchen group on Facebook (in which I am a Blogger) are each also giving away their favorite things (see the goodies they are giving away below), so be sure to ENTER and visit the sites and you could come away with some seriously awesome prizes!
Here is a list of the items in my Favorite Things Giveaway and below you will find detailed pictures and descriptions about each one!
Here are the 8 bloggers that are blogging buddies of mine from the THM Blogger Test Kitchen Facebook Group and we are each having our own great giveaways in this Blog Hop, so I hope you will check out and go enter each fun giveaway (see all the great goodies from each giveaway in the pictures below and read more details about each blogger and their blog)! More giveaways means more chances to WIN!
This pillow cover is a favorite of mine because of the message that is on it. I have a shirt that matches it that I wear all the time to remind me to keep my mind focused on the one who created JOY–the Lord. I made this scripture print when I began this blog and you can download a FREE copy of it HERE! So much heartache can be lessened if we will choose JOY!
2. Personalized Christmas Blessings Plate with YOUR last name of choice written by hand in my calligraphy by yours truly!
This is my very favorite company to order my sprouted flour from because it is a superior product in my opinion! My bread and rolls rise higher and have a lovely fluffy texture when I use this White Whole Wheat flour! I like to make my Easy Sprouted Whole Grain and Honey Bread, my Fluffy Sprouted Rosemary Rolls with Garlic Butter, my Easy Soft Sprouted Wheat Rolls and one of my FAVORITES is my Scrumptiously Soft and Fluffy Sprouted Cinnamon Rolls that would be perfect to make for Christmas festivities! Try it out for yourself this month as the To Your Health Company is offering $1 shipping for the month of December! Pictured below are my Easy Sprouted Whole Grain and Honey Bread, my Fluffy Sprouted Rosemary Rolls with Garlic Butter, my Easy Soft Sprouted Wheat Rolls and my Scrumptiously Soft and Fluffy Sprouted Cinnamon Rolls that would be perfect to make for the holidays!
4. Sprouted Purple Corn Flour from the To Your Health Sprouted Flour Co.
I’m a huge fan of cornbread and purple corn flour is supposed to be really gentle on blood sugar, so it would be a great one to use if you want to try out a healthy cornbread recipe! I plan to have some cornbread recipes to share in the future, so check back on Joyful Jane for those!
5. Sprouted Yellow Corn Flour from the To Your Health Sprouted Flour Co.
This is a similar product, but made with yellow corn instead of purple.
This would be great to have for baking if you need to avoide grains or if you just want to make something with oat flour such as the THM Pancakes or the THM Banana Cake!
7. Monogrammed Gold, White and Turquoise Bag with YOUR monogram on it when you win!
This is such a fun bag! It has shimmery gold stripes and fun details on the side of the bag. The winner will get to have their monogram embroidered on it!
8. Have Yourself a Merry Little Christmas Set of two Tea Towels.
This is a darling set of tea towels that is sure to make any kitchen a bit more merry!
9. Hand Made Blue and White Checked Wooden Earrings by Katrina Westphal.
If you know me well then you know how much I love blue and white! These blue and white earrings are just adorable! They are wooden and very lightweight and they are made by my sister in law. I have very talented sisters in law! Last year I featured earrings made by my sister-in-law LaDonna Gatlin and this year I am featuring earrings made by my sister-in-law Katrina Westphal.
Katrina loves minimal wooden jewelry…and bursts of color. Unable to find simple, yet beautiful designs that combined the two, she began PrairieKin with the mission to make the very earrings for which she had been searching.
Named after the rolling prairie of her childhood farm, PrairieKin crafts beautiful earrings out of natural, eco-friendly materials. Lovingly created by hand, these lightweight earrings will make a lovely addition to any outfit!
This cheerful yellow mug is certain to brighten your day as you sip your coffee or tea!
We could all use some encouragement and these little cards could bless your day!
This cute water bottle should be a great reminder not only to drink more water, but to encourage that through Christ you can do all things!
Here are the goodies that the 8 blogging buddies are giving away!
Nana’s Little Kitchen is serving up solid THM Friendly Southern dishes to help you on your Trim Healthy Mama journey. Teresia is sharing classic recipes that are satisfying, delicious, and nutritious to help you weave this fantastic diet plan into the fabric of a healthy life. Click here to enter Teresia’s giveaway and a chance to win a $75 Amazon gift card!
Enter Joyful Jane’s giveaway in the box below!
Sprouted Flour, I’m excited to try baking with it.
I would love to have the Joy pillow, it’s beautiful and a great reminder!
So much kindness, Joyful Jane! Yes, I also am excited about the flours, since I’m trying to get the hang of replicating old recipes in a THM-friendly way.
Love your Joy theme and would love to win your prizes!!
This is a very wonderful giveaway, I would be honored to win any of your products. I love reading your blog posts.
I’m a sucker for bags so that’s my favorite item I’m excited to win.
I would love to win this giveaway. I need to jump back on the bandwagon and lose this weight.
I’m excited to try the sprouted wheat flour, and I love the monogrammed bag!
I love the tote bag! It all looks neat!
I like all your items, but I love the tea towel. Would look great in my kitchen.
I love the bag, and just everything about this giveaway!
I would love to try the flour! Baking some new items would be wonderful!
I would love the Joy pillow cover. It would be a wonderful reminder every time I look at it. Thank you.
I love it all! I like your style. I’m glad I’m signed up to your email list. I’ll be visiting here more often!
Found your blog through Briana’s link. Looking forward to discovering more on your website and blog. Merry Christmas!
The sprouted flours look amazing. I would love to try some yummy recipes with them. Merry Christmas!
I am excited to try the Sprouted flours!
Sprouted flour, trying for the first time.
The Choose Joy pillow pillow is my favorite because it is so cheerful.
The personalized Christmas plate looks beautiful! This giveaway is just gorgeous. Thank you for offering it!
I would love to give all of those flours a whirl!
I would be so grateful to receive any of the gifts. The striped bag caught my eye!
I’ve never tried sprouted flour before, but I would love to learn to use it!
Everything is so gorgeous that I can’t even decide. I really love the pillow cover and the print!
The you got this water bottle is the item I’m most excited about winning because 2018 is going to be about my health.
Hard to pick only one item to be a favorite choice! Great give a way! I would love to try the sprouted flour, though.
I love the monogrammed bag!
I am excited for the baking items and the inspirational cards. Such a great giveaway of items!
Love the bag! And all the rest of the items! Appreciate all you trim healthy mamas.
I’m so excited to win the mug – I love bright and cheery things and don’t have a lot of colorful mugs as I don’t drink coffee or tea but love some delicious hot chocolate! I’d keep this at my desk at work.
Al of the gifts looks great! I would love to try the sprouted flour.
The coffee mug! I love coffee!
I love yellow and have the same joy cup as you do! A match would be wonderful, but truly what a blessing to someone this whole package will be!
I would love to try the sprouted flours.
JOY!!! Love the theme! Joy is my word of the year…again!!!
What a lovely collection! i want everything!
I really love the cheerful yellow Joy mug for my morning cup of tea!
I have made you bread recipe quite a few times. I would love to win the Sprouted Flour for this recipe!
The tote bag looks beautiful and I would love to put it to use.
Seriously, everything looks awesome! But the flours would be amazing to get.
All of the prizes are great! I would love the sprouted corn flour so I could make cornbread.
I am excited to try the sprouted flours. I don’t experiment with much with various flours so this would give me a real good reason to!
I think all the gifts are amazing! I love sprouted flours and I am in need of a new water bottle.
I have a hard time finding sprouted bread in the store ~ it’s gone a lot of the time! 🙁 I would love to try the sprouted flour!
Would love to try the sprouted flour!
I loved so many and would be thrilled to win anything. I am just starting my thm journey.
I’d like to try the flours.
I would be so excited about the monogrammed bag as I have never had anything like that monogrammed. All of your gifts are wonderful!
What a great giveaway! Thank you for the opportunity to win this! Merry Christmas!!
I want to try your recommended sprouted flour!
The sprouted flours make me the most excited about this giveaway!
How do you choose just one thing?! I love the Monogrammed bag! So excited for all these wonderful giveaways, thank you to all you wonderful bloggers!
The joy mug for my coffee in the mornings!
i like the JOY Mug because i drink coffee every day and love its positivity.
The earrings are beautiful. But then again so is the plate, mug, and bag.
I love your whole theme of joy!
It’s so hard to choose! I’d have to choose the mug, I collect coffee mugs and it would be a beautiful addition!
Seriously it all looks like things I would love. But if I have to choose I guess the bag!
Thank you so much for the giveaway. I love the Joy theme & the tote is great — really cheerful!
My favorite is the monogram bag! Would love to have that to carry extra stuff! Merry Christmas!!!
I love them all! The beautiful mug was what I first noticed. It would be perfect for my morning cup of coffee with heavy cream and collagen. Love your blog! Merry Christmas!
I’m excited about it all but especially the sprouted wheat flour!
Oh my goodness I would love to try baking with the sprouted flours!
I’m excited about the Joy mug. Such a great reminder of how to start your day.
I am just in awe of your giveaway! I have not tried the sprouted items!
The purse, cause I just adore purses!!!!!
I’ve been wanting to try the sprouted flour. Thank you for the great giveaway!
I love the joy mug!
I love the water bottle! Thanks for the amazing giveaway!
The joy mug, I’m a sucker for cute coffee cups!
All the prizes look great! The mug is a favorite – it would be great to drink my morning coffee in.
The Lily’s chocolate! I haven’t tried it yet because it isn’t in our budget and I’m a chocoholic!
So much to like in this giveaway – tote, mug, plate, flours – everything, but I think my favorite is are the tea towels!
I like the blue and white wooden earrings, I’m a sucker for earrings.
sprouted white wheat flour! I love baking bread and haven’t found this locally.
I want to try the Lily’s chocolate. Thanks to the giveaway.
Wow, ALL of the items are just amazing and so beautiful! But, I think the thing that caught my eye the most about your giveaway is the “Joy” mug. I think it would remind me often that regardless how things get, I must choose joy and keep my eyes on Jesus. Thank you for the amazing giveaway…this is my first time “meeting” you. I am visiting from Briana’s blog post about the giveaways. God bless you and your family this Christmas season!
All of your prizes are so nice, but I’m interested in the sprouted flours. My family is all boys and they love their homemade bread!!
I’m excited to try the sprouted flours. I’ve tried to make it myself already and wasn’t very successful.
Those earrings are super cute, but I’m such a practical person–I’d have to say the sprouted flour!
I’m excited about the sprouted flours!
I like all of it! I do t think I can pick just one of them! The flours, the mug, the bag I like it all!
The item that stands out to me is Sprouted Purple and Yellow Corn Flour. I like trying new to me baking items, even if they don’t work out, at least I can say I’ve tried it.
I’d love to win the sprouted flours and begin to learn to use them!
Love the Water bottle mine broke a while back so i really need a new one! but also would love the sprouted flour!!
I would love to win some cuffin mix! I’ve not had the funds to try them yet, but I’ve heard great things!
What a great giveaway! I’d love to try out the sprouted flours!
My favorite item in the giveaway is the tote bag. It’d be perfect to carry my knit/crochet projects in.
I would love the monogrammed plate! How cute is that!?
I love it all but really love the personalized Christmas plate. We had one years ago for Santa cookies but lost it in a move.
I love pillows, so I’d have to say the Choose Joy Pillow is my favorite giveaway item!
I love the cheeriness of the mug but would also love to try the sprouted flours!!!
I love and make your bread machine sprouted bread recipe, can’t wait to try the new brand of flour!
the bag since I can’t have too many.
Excited to try the sprouted flour!
What a great giveaway! I never win but I am going to try anyway!. Looking forward to trying your bread recipe in the new year! Merry Christmas!!
Sprouted flour, because i love bake.
But this is such a hard choice!
i love the joy theme.
All the items are great, but I’m a really sucker for a really cool bag!
I would be so excited to try the sprouted white flour! I make bread with the sprouted wheat bread but haven’t tried white!
I love all of the “Joy” items! The tote bag looks amazing!
I’d love the plate because I love personalized items and the mug is adorable.
Thanks for the opportunity to win the give away.
I would love the choose Joy pillowcase!! Very good reminder!
I’m most excited about the Personalized Christmas Plate! I’ve always wanted one of these!
It all looks fabulous but I’d really love the blessings encouragement cards!
Definitely the sprouted corn flours!!!
Sprouted flour and the Christmas plate! I’ve been wanting to use srouted flour for a long time!
It is all so cute and fun!!! I want to make the cinnamon rolls!!
I love the pillow! Really, all of the prizes are amazing! Thank you for the giveaway! Merry Christmas!!
choose joy pillow, i could see it every morning when i make our bed and be reminded!
Love to try the sprouted flour but I also love the JOY them!
Great blog. Appreciate the meal plans!
the bag would be awesome!
Gee, how’s a girl to choose just one thing?! The personalized plate is lovely.
I would like to try sprouted flour for the first time. Also, the Joy mug looks like a sunshine way to start any day.
Love the joy theme. I have been learning about joy and how it often comes in surprising way for a few years not, so I can truly appreciate this.
So many wonderful things.I think the choose joy pillow. It is just a good reminder that joy is achoice.
Love the “Choose Joy!” pillow reminder!!
I love To Your Health Sprouted flour. Great giveaway!
What a fantastic Giveaway!! I would be super excited to win any of it. All the item are amazing. However, I’ve never tried the flours so that would be a new fun thing to try. Thank YOU and Happy Holidays!
I discovered your website a few weeks ago but haven’t had time to try any of your recipes. I look forward to doing so after Christmas! And I love the theme of “joy” on your blog and in your giveaway. That’s an important word at our house, too. In fact, it’s my and my youngest daughter’s middle name, as well as our dog’s name!
Everything looks amazing but I am most excited about the sprouted flour!
Any and all items would be appreciated!!! 😍 I’d love to win!!! Thanks!
I love the inspirational water bottle. I struggle to drink enough water throughout the day.
My favorite color is yellow, so the coffee cup is my favorite!
I’d like to try the Lily’s chocolate products. A sweet tooth is especially active this time of year! Merry Christmas.
Thanks for the opportunity to win these amazing pieces.
I just love it all…hard to pick one thing! Really love the mug and the bag though!
The Sprouted Wheat because baking and breads are my weakness and I am learning to change all my recipes over to the healthier sprouted option!
The Sprouted Wheat flour is what I’d use first to make my first ever sprouted rolls.
I would like the joy mug!
I love the pillow. I need that reminder daily! And I’ve never used sprouted corn flour!
Can I lump all the joy items into one! They are lovely and encouraging!
Personalized Christmas Blessings Plate with YOUR last name of choice written by hand in my calligraphy by yours truly… I have always wanted a family item to pass down with our name this is very special I would treasure this and pass it down.
It’s all beautiful! I’m most excited to try the sprouted flours!
I do t know how to choose my favorite!! I love all the sprouted flours. Yet your inspirational cards and gift items are gorgeous! I can think of so many people I love to give them to. They will lift their spirits. Ty!!
I would love to win. I have never used sprouted flour, but I would love to try some home made bread.
So many beautiful things! Especially loving that bag!
All of the gifts are lovely, but I really want to try the flour!
I would love to try the blue corn flower. I enjoy trying new and different things! Thanks for this giveaway!
The lovely print at the end is my favorite. And i am intrigued by the flours you listed.
I love the choose joy pillow. It is so simple yet meaningful.
The entire give away is just beautiful. I would love to try the sprouted flours in some of the recipes you shared.
I am very interested in trying the blue corn flour. I MISS cornbread. Wonder if this will satisfy that one?
Love it all but the tote bag is especially cute!
The calligraphy plate, it is beautiful. But everything looks amazing.
I love bags so that is probably my favorite but everything is amazing! Thanks!
I love it all, but would be most excited about the sprouted flours!
All of the products look amazing! I’d really like to try the sprouted white whole wheat flour!
While all the items are beautiful, the cards really jumped out. I think that giving a card is such a personal and thoughtful thing. Blessing others with encouraging words.
I really love both the pillow and the mug the best.
It’s really hard to choose, but probably the sprouted flour. I love homemade bread. Thanks!
I would adore those blue and white earings!!
Every. Single. Item. is special…Such a great giveaway! Thank you for offering it!
The print, mug, bag, and all the new recipes I could try with the flours.
I would love to make my own sprouted wheat bread..would love the flour!
It’s all WONDERFUL, but I really love the “Choose Joy” pillow cover!
Love, love, love the bag and mug!!!!
I love all your gifts – very tasteful. I’d like the water bottle as a gift for my daughter – she says that a lot.
It all looks great! But I would say the sprouted flours or the blessings cards.
The sprouted flour!!! I’ve tried making my own but the baked items don’t turn out light at all!!
I’m excited about the sprouted flour so I can bake stuff for my husband and son.
I’m having a hard time choosing just one thing in the giveaway that is my favorite. I think it’s a toss up between the monogrammed bag and the tea towels. The bag is really cute, and I love anything Christmasy.
I really love the tea towels!
Everything looks AMAZING but I have always wanted to try sprouted flour!
I’d love the flour, but the earrings and bag are calling to me too!
Love all of it! You have a knack for simple elegance….
I love the JOY mug! Thanks for a great giveaway!
I would choose the sprouted corn flour. My husband misses cornbread. I could make him some and he would be happy.
I really like the joy mug!
Sprouted flour! All of it!
Love tote bags and water bottles but all the items are wonderful! Would love to try the sprouted flours.
Love everything in the giveaway but especially love the blue corn flour. Would make some fun pancakes!
Definitely the THM chocolate chips and the Joy mug, it’s gorgeous!
All of it? 🙂 No seriously, all of it!!! <3 But if I HAVE to choose one thing, the mug. 🙂 What a beautiful reminder to choose Joy!
I love it all!!! Especially loving the joy mug!!!
I love home-made sprouted grain bread, so my favorite part of the giveaway is the sprouted flour. And it would be fun to try out the sprouted corn flours too; I’ve never used those!
I am so excited to have found your blog! I LOVE LOVE all of your favorite things!
Most excited for the personalized Christmas Blessings plate.
The personalized monogram bag and the water bottle.
Sprouted flour, i’m excited to bake with it.
Most excited about the sprouted flour.
I LOVE the Choose Joy pillow. It has been a rough season and we need the reminders!
So hard to choose, but I’d like to try the flour. Thanks!
Everything is lovely, but I realllllly want the sprouted corn flours. I’ve been eying them for a while!
The water bottle. I LOVE water bottles…my husband says I have an addiction to them. 😉 But…I find I stay hydrated more easily when I have a cute/fun bottle from which to drink my water!
I would be excited to have the plate. What a wonderful personalized item. I know I won’t win (I never do) but it is fun to enter.
The ‘Choose Joy’ pillow!! When life gets tough, I love to remember that I dont need to give into frustration and become weary, but instead, in all circumstances, I can choose the joy of the Lord!
Love the purse and mug! Thanks for doing this giveaway.
I love the Choose Joy Pillow!
All the things! Haha! But I would love to try the sprouted flours.
101 blessings – would be great to have something quick each day!
My favorite items here are the sprouted flours! Since or family does a lot of travel, sprouting or own is virtually impossible.
Uggg, phone autocorrected ‘our’ to ‘or’!
Love the choose joy pillow!!!so darling! N generous..all of it!!
My favorite item is the purse. Mostly because I have a large hole in my favorite one. Lol.
There are so many nice things in this giveaway! How can I choose just one? 🙂I really like the water bottle, and the “Choose Joy” pillow case! A good reminder as we go to bed each night, and wake up to a new day!
Wow, it’s tough to choose a favorite. I’ve always thought that we could choose joy, because happiness is only a feeling. So all your wonderful joy items are such a great reminder of that to me. I think if I had to choose, though, I’d choose the mug, since I’m always cold. It’s always so nice to fill it with something warm!
I’m excited about the mug, tote, and different flours. I’ve only experimented with coconut and almond flours, so I’d be very interest in trying to trying these! Thanks for the opportunity!
Wow! What an amazing giveaway! Thank you for the chance to win! My favorite item is probably the scripture print. It is beautiful, and an important reminder to always be grateful for God’s love.
The sprouted corn looks interesting. I’ve never tried it before.
Excited to win the sprouted floor!!!
Love the sprouted wheat flour love to bake. All of the items are fantastic.
It’s hard to choose, but I think my favorite item in the giveaway is the sprouted flour!
I would love the choose joy pillow cover. It’s a great daily reminder.
I’m excited to try the sprouted flour… but the bag and coffee cup is pretty nice.
I love cinnamon rolls and sprouted flour let’s me enjoy them !
The pillow and sprouted flour!
What a wonderful give away – I’m loving your ‘Joyful’ theme!
I’ve never heard of some of these products but I love them all by the looks of them!
I like the tote bag and sprouted flour.
Anything to do with Joy because I need daily reminders of joy in my life!
Thank you for the very nice giveaway. So many great things. I like the glass bottle.
I think I would be most excited about the pretty print and the mug. Everything is great so it is hard to pick.
I would love to try that sprouted flour!
What a beautiful, joy-filled giveaway! All your hand-made gifts are stunning!
I’d love to try the sprouted flours!! I’ve toyed with the idea of making my own because it’s so expensive to buy. Oh, how fun it would be to win 😀!
I don’t really know how to decide which item is my favorite! I would be most excited to try the sprouted flours, but I love that pillow!!! And all the personalized items!!!
There is so much in this giveaway, it’s hard to choose a favorite. I especially love the tote bag and the JOY mug.
If I could say everything I would! However, if I had had to choose one thing it would most likely be the beautiful calligraphy plate or the blessing cards.
It’s so hard to choose- there are so many cute and wonderful things. I really love the mug because I love yellow. And I had no idea that there was sprouted flour available- those cinnamon rolls look delicious!
Love your blog! I need to try that white wheat sprouted flour.
The sprouted flour would help my baking so much! But I also Looooovve that tote and the choose joy pillow cover! Thanks for a great giveaway!
My name is Joy and I love the Joy pillow cover. Joy is a choice!
what a terrific assortment of goodies- i don’t think i could choose just one favorite! they all look good….
Would love to try the sprouted flours!
The sprouted flours, excited about them because I miss good bread.
Love your website! Gorgeous giveaway items!!
It’s all so beautiful. I’ve never tried sprouted corn flour before!
i am most excited about the sprouted flours!
Choose Joy pillow! A favorite reminder!!
It is really hard to choose, but probably the sprouted flours!
I’ve been wanted to try sprouted flour. Your recipes using it look so good.
I like them all but I guess any of the sprouted flours!
The Joy Mug. It would bring me joy all day long as I drink my coffee and tea!
Your calligraphy is beautiful! Anything with that on it would be great!
Its hard to choose only one thing from your giveaway but if I had to choose it would be the monogramed tote bag because I have alot of totes to use for my crochet projects and this one looks like a nice size for me to use for that purpose thanks for the chance to win this.
I’d love the sprouted flours! And the mug!
Sprouted flour. I’ve never used it before!
Awesome giveaway! I would love to try any of the sprouted flours!!
Oh what a generous giveaway! I’d love to win your Scripture print and Briana’s Cookbook!
Everything looks great! But, the purse and earrings are especially calling my name! You do such great giveaways!
Love the pillow! I too have the choose joy shirt. I often need to be reminded to choose joy!
I really like the tea towels. They are lovely.
I excited to try the sprouted flours. So many possibilities.
Thank you so much! This is a neat giveaway.
Love the joy reminder items and spirited flours.
I’d love any of them!! They are all great!
I have to try sprouted corn flour!
I’m excited to try the sprouted flours. Didn’t know there were so many kinds.
Wow, this is an wonderful giveaway, thank you! I would love the earrings they are my style, I love the joy mug and the inspirational cards. I have choose Joy all over my house.
I love water bottles! I would also love to try the sprouted flours. Thank you for being part of this giveaway!
All your items look wonderful, thank you for doing the giveaway. Any of the sprouted flours would be helpful for sure as I’m just starting this journey.
I’d be excited to try the sprouted corn flours! It all looks so beautiful!
I’m very excited for the Sprouted flours.
I could really use a new bag, so the monogrammed tote is my favorite!
I would like the pillow or mug.
The monogrammed bag is my favorite thing; I love the gold and turquoise!!
I would love to win the scripture print, most beautiful to display! Thanks for the opportunity to win!
I’d love to try the sprouted flours.
I’m excited about the personalized bag. It looks great.
Love the Joy theme. Last year was a difficult one for Us. My home was flooded with 6 feet of water my Mom away 5 days before Christmas . Things have improved this Christmas! Ready to start baking again would love to try sprouted flours!!
It would be a huge blessing to receive this!
It’s a hard choice because everything is awesome, but I’m very excited about the sprouted flour. I love to bake and I’ve not tried any of the sprouted flour since following the THM lifestyle. This could be life changing.
I’m a sucker for a good water bottle!
What a fun and wonderful prize! I would be so excited to use all of these goodies especially the baking goods! Thanks! Merry Christmas!
The sprouted flours sound great! I love to bake my own bread.
What a great assortment of goodies! I’d like to bake with sprouted flour.
I really like the tote bag because I am always trying to juggle too much of mine and my children’s things and I need a great tote bag.
I’m looking forward if I win,to the sprouted corn flours and the scripture print!
Where I live I haven’t been able to find the sprouted flours and I have been wanting them and I just think that the scripture print would be so neat to have and display in the home!
I have been living THM for two years and have never used the sprouted flours. It just might open a whole new world for us 🙂 Plus the bag is just way to pretty, amongst all the other cute items!
I really want to try making sprouted breads!
So much to love here. Love that you are homeschooling 8 children. Love your hand made gifts. And I am so excited to think there is sprouted corn flour….who knew? Thanks.
I like the tote – but I would also like to try to make anything sprouted!
Everything is so beautiful! I would love the true sprouted corn flours, it would be a game changer in our family who loves making homemade tortillas and tamales.
This is an amazing giveaway! And you can never have too many reminders that JOY is a choice 🙂 Thanks SO much!
I love the Choose Joy pillow cover, and the sprouted flours would be fun to try!
All those look so great to share and keep! Thanks so much!
I’d really like to try the sprouted flours. But then I never splurge on cute decorative items so the pillow and plate and towels would be fun.
All the items are great! I really love the Monogrammed Gold, White and Turquoise Bag! Thanks for the giveaway!
Your giveaway looks awesome! It’s hard to pick just one, they are all great!
Torn between the bag, pillow, and tea towels. The pillow cover and towels for our new home and the bag v/c I’m a bag junkie. Lol!
I would love any of it but I’ve never had the Lily’s chocolate and I’ve not tried sprouted flour so those are 2 big ones.
Love it all! Would love to try the sprouted flour! Merry Christmas!
I love the yellow Joy mug! It’s cheery and serves as a good reminder as you start your morning.
I am most excited about the sprouted flour! I would love to use it for baking!
Your sprouted bread recipe is my fav!!! Sadly, I’m having a lot of trouble finding sprouted flour that isn’t crazy expensive. It would be such a blessing to win this bundle!
Along with all the others, I too am excited about the sprouted flour. They tend to be dear and I hesitate to buy them without knowing whether or not I will enjoy the product. <3 Thank you for offering them up on your giveaway!
I would love to win the sprouted flour as we have a hard time finding it locally where I live.
I love everything but I would have to say my favorite is the bag. Super cute!
Cool giveaway! I love your theme!
Would love to try the sprouted grains to make bread!
I would be happy to receive any of the giveaway items, but I’ve always wanted to try out that brand of sprouted flour!
I love the sprouted flours!
I am excited about the flours!
We all need more JOY in our lives.
So many wonderful things, but I’m really excited to try sprouted flour. I haven’t used it yet, and have wanted to.
I love the tote and would love to carry it, and everything else you are giving away! Merry Christmas!!
I have been wanting to make my Mother-in-law’s Christmas bread with sprouted flour!
Choose Joy has been my motto since last year when my dad died. So everything about this giveaway is right up my alley. Thank you for hosting it!
I would love to win the sprouted flour to make your bread recipes.
The joy mug. Joy is my word this year and I use mugs a lot.
The Sprouted Whole Wheat flour since I haven’t tried that yet.
The sprouted flours would be great to try!
I love ALL the things that say JOY! That’s my middle name… and my daughter’s… and my granddaughter’s!!! We’re spreading the JOY all around!
So many great products! I’d love to eat some sprouted treats while drinking coffee from that mug!
Everything looks great, especially the inspiration cards!!
What a beautiful give-away you’ve created. Thanks!
Would love to win gluten free sprouted flours. I’ve never seen these before and would love to try them.
This would be a lovely package to win! The choose joy pillow would be very fitting for the journey i am.
All of the sprouted flours seem like they’d be wonderful to bake with! | 2019-04-21T20:25:29Z | https://www.joyful-jane.com/favorite-things-huge-christmas-giveaway-blogger-test-kitchen-blog-hop-giveaway-2017/ |
Writing Completed: c. 56 C.E.
7 to all those who are in Rome as beloved ones of God, called to be holy ones: Grace to you and peace from God our Father and the Lord Jesus Christ.
8 First, I thank my God through Jesus Christ concerning all of you, because your faith is being proclaimed in the whole world. 9 For God, whom I serve with my spirit in the gospel of his Son, is my witness, how unceasingly I make mention of you, 10 always in my prayers making request, if somehow now at last by the will of God I may succeed in coming to you. 11 For I am longing to see you, that I may impart some spiritual gift to you for you to be strengthened; 12 that is, that I may be encouraged together with you while among you, each of us by one another’s faith, both yours and mine. 13 But I do not want you to be unaware, brothers, that I often planned to come to you (but I have been prevented until now) in order that I might acquire some fruitage also among you just as among the rest of the Gentiles. 14 I am a debtor both to Greeks and to barbarians, both to the wise and to the foolish. 15 So, on my part, I am eager to preach the gospel to you also who are in Rome.
18 For the wrath of God is revealed from heaven against all ungodliness and unrighteousness of men, who suppress the truth in unrighteousness, 19 because that which is known about God is evident among them; for God made it evident to them. 20 For his invisible attributes are clearly seen from the creation of the world, being perceived through what has been made, even his eternal power and divine nature, so that they are without excuse. 21 For although they knew God, they did not honor him as God or give thanks, but they became futile in their reasoning, and their foolish hearts were darkened. 22 Claiming to be wise, they became fools, 23 and exchanged the glory of the incorruptible God for an image in the form of corruptible man and of birds and four-footed animals and creeping things.
24 Therefore God gave them over in the lusts of their hearts to impurity, so that their bodies would be dishonored among them. 25 For they exchanged the truth of God for the lie, and worshiped and served the creature rather than the Creator, who is blessed forever. Amen.
26 For this reason God gave them over to degrading passions; for their women exchanged natural relations for those that are contrary to nature, 27 and the men likewise gave up natural relations with women and were violently inflamed in their lust toward one another, males with males committing the shameless deed, and receiving in themselves the due penalty for their error.
28 And just as they did not see fit to acknowledge God any longer, God gave them over to a depraved mind, to do those things which are not proper, 29 being filled with all unrighteousness, wickedness, greed, evil; full of envy, murder, strife, deceit, malice; they are gossips, 30 slanderers, haters of God, insolent, arrogant, boastful, inventors of evil, disobedient to parents, 31 without understanding, untrustworthy, unloving, unmerciful; 32 and although they know the ordinance of God, that those who practice such things are worthy of death, they not only do the same, but also give wholehearted approval to those who practice them.
2 Therefore you have no excuse, O man, every one of you who judges. For in passing judgment on another you condemn yourself, for you who judge practice the same things. 2 And we know that the judgment of God is according to truth against those who practice such things. 3 But do you suppose this, O man, who passes judgment on those who practice such things and do the same yourself, that you will escape the judgment of God? 4 Or do you despise the riches of his kindness and forbearance and patience, not knowing that the kindness of God leads you to repentance? 5 But because of your stubbornness and unrepentant heart, you are storing up for yourself wrath in the day of wrath and of the revelation of the righteous judgment of God, 6 who will render to each one according to his works: 7 to those who, by perseverance in good work, seek glory and honor and immortality, eternal life; 8 but to those who act from selfishly ambitious and who disobey the truth, but who obey unrighteousness, wrath and anger. 9 There will be tribulation and distress upon every soul of man who does evil, of the Jew first and also of the Greek, 10 but glory and honor and peace to everyone who does good, to the Jew first and also to the Greek. 11 For there is no partiality with God.
12 For all who have sinned without the law will also perish without the law, and all who have sinned under the law will be judged by the law; 13 for it is not the hearers of the law who are righteous before God, but the doers of the law who will be justified. 14 For when Gentiles who do not have the law by nature the things of the law, these, not having the law, are a law to themselves, 15 in that they show the work of the law written in their hearts, their conscience bearing witness and between their own thoughts they are being accused or even excused, 16 on the day when, according to my gospel, God will judge the secrets of men through Christ Jesus.
17 But if you call yourself a Jew and rely on the law and boast in God, 18 and know his will and approve the things that are superior, because you are instructed by the law, 19 and are confident that you yourself are a guide to the blind, a light to those who are in darkness, 20 an instructor of the foolish, a teacher of the immature, having the embodiment of knowledge and of the truth in the law, 21 you, therefore, who teach another, do you not teach yourself? You who preach that one shall not steal, do you steal? 22 You who say that one should not commit adultery, do you commit adultery? You who abhor idols, do you rob temples? 23 You who boast in the Law, through your breaking the Law, do you dishonor God? 24 For “the name of God is blasphemed among the Gentiles because of you,” just as it is written.
25 For circumcision is of value if you do the law, but if you should be a transgressor of the law, your circumcision has become uncircumcision. 26 So if the uncircumcised man keeps the requirements of the law, will not his uncircumcision be regarded as circumcision? 27 And he who is physically uncircumcised, if he keeps the law, will he not judge you who though having the letter of the Law and circumcision are a transgressor of the law? 28 For he is not a Jew who is one outwardly, nor is circumcision that which is outward in the flesh. 29 But he is a Jew who is one inwardly; and circumcision is that which is of the heart, by the Spirit, not by the letter; and his praise is not from men, but from God.
5 But if our unrighteousness demonstrates the righteousness of God, what shall we say? God, who inflicts wrath, is not unjust, is he? (I am speaking in human terms.) 6 May it never be! For otherwise, how will God judge the world? 7 But if through my lie the truth of God abounded to his glory, why am I also still being judged as a sinner? 8 And why not say, just as we are slandered, and as some affirm that we say, “Let us do evil things that good things may come”? Their condemnation is just.
19 Now we know that whatever the Law says, it speaks to those who are under the Law, so that every mouth may be closed and all the world may become accountable to God; 20 because by the works of law no flesh will be justified in his sight; for by law comes the accurate knowledge of sin.
21 But now apart from law the righteousness of God has been manifested, being witnessed by law and the Prophets, 22 even the righteousness of God through faith in Jesus Christ for all those who believe; for there is no distinction; 23 for all have sinned and fall short of the glory of God, 24 being justified as a gift by his grace through the redemption which is in Christ Jesus; 25 whom God displayed publicly as a propitiation in his blood through faith. This was to demonstrate his righteousness, because in the forbearance of God he passed over the sins previously committed; 26 it was to show his righteousness at the present time, so that he might be just and the justifier of the one who has faith in Jesus.
27 Therefore, where is boasting? It has been excluded. By what kind of law? Of works? No, but by a law of faith. 28 For we consider a person to be justified by faith apart from the works of the law. 29 Or is God the God of Jews only? Is he not the God of Gentiles also? Yes, of Gentiles also, 30 since God is one, who will justify those who are circumcised by faith and those who are uncircumcised through faith.
31 Therefore, do we nullify the law through faith? May it never be! But we uphold the law.
9 Is this blessing then on the circumcised, or on the uncircumcised also? For we say, “Faith was credited to Abraham as righteousness.” 10 How then was it credited? While he was circumcised, or uncircumcised? Not while circumcised, but while uncircumcised; 11 and he received the sign of circumcision, a seal of the righteousness of the faith which he had while uncircumcised, so that he might be the father of all who believe without being circumcised, that righteousness might be credited to them, 12 and the father of circumcision to those who not only are of the circumcision, but who also follow in the steps of the faith of our father Abraham which he had while uncircumcised.
13 For the promise to Abraham and his offspring that he would be heir of the world did not come through the law but through the righteousness of faith. 14 For if those who are of the Law are heirs, faith is made void and the promise is nullified; 15 for the law produces wrath, but where there is no law, neither is there transgression.
16 That is why it is through faith, in order that it may be in accordance with grace, so that the promise will be guaranteed to all the descendants, not only to those who are of the law, but also to those who are of the faith of Abraham, who is the father of us all, 17 (as it is written, “A father of many nations have I made you”) in the presence of Him whom he believed, even God, who gives life to the dead and who calls the things that are not as though they are, 18 In hope he believed against hope, that he should become the father of many nations, as he had been told, “So shall your offspring be.” 19 He did not weaken in faith when he considered his own body, which was as good as dead (since he was about a hundred years old), and the deadness of Sarah’s womb; 20 yet, with respect to the promise of God, he did not waver in unbelief but grew strong in faith, giving glory to God, 21 and being fully assured that what God had promised, he was able also to perform. 22 Therefore it was also credited to him as righteousness. 23 However, the words “it was credited to him” were not written for his sake alone, 24 but for our sake also, to whom it will be credited, as those who believe in Him who raised Jesus our Lord from the dead, 25 who was delivered over because of our trespasses, and was raised because of our justification.
5 Therefore, having been justified by faith, we have peace with God through our Lord Jesus Christ, 2 through whom also we have obtained access by faith into this grace in which we stand, and we boast in the hope of the glory of God. 3 And not only that, but let us exult while in tribulations, since we know that tribulation produces endurance; 4 and endurance produces proven character, and proven character produces hope; 5 and hope does not disappoint, because the love of God has been poured out within our hearts through the Holy Spirit who was given to us.
6 For while we were still helpless, at the right time Christ died for the ungodly. 7 For one will scarcely die for a righteous man; though perhaps for a good man one would dare even to die. 8 But God shows his love for us in that while we were still sinners, Christ died for us. 9 Much more then, having now been justified by his blood, we shall be saved from the wrath of God through him. 10 For if while we were enemies we were reconciled to God through the death of his Son, much more, having been reconciled, we shall be saved by his life. 11 Not only that, but we are also exulting in God through our Lord Jesus Christ, through whom we have now received the reconciliation.
12 Therefore, just as through one man sin entered into the world, and death through sin, and so death spread to all men, because all sinned, 13 or until the law sin was in the world, but sin is not imputed when there is no law. 14 Nevertheless death reigned from Adam until Moses, even over them that had not sinned after the likeness of Adam's transgression, who is a type of the one who is to come.
15 But the free gift is not like the trespass. For if by the trespass of the one the many died, much more did the grace of God and the gift by the grace of the one man, Jesus Christ, abound to the many. 16 And it is not the same with the free gift as with the way things worked through the one man who sinned. For the judgment after one trespass was condemnation, but the gift after many trespasses was justification. 17 For if by the trespass of the one, death reigned through the one, much more those who receive the abundance of grace and of the gift of righteousness will reign in life through the one, Jesus Christ.
18 So, then, as through one trespass there was condemnation to all men, so too through one act of righteousness there was justification of life to all men. 19 For as through the one man’s disobedience the many were made sinners, so also through the obedience of the one the many will be made righteous. 20 The Law came in so that the transgression would increase; but where sin increased, grace abounded all the more, 21 so that, as sin reigned in death, even so grace would reign through righteousness to eternal life through Jesus Christ our Lord.
6 What shall we say then? Are we to continue in sin that grace may abound? 2 May it never be! How can we who died to sin still live in it? 3 Or do you not know that all of us who have been baptized into Christ Jesus were baptized into his death? 4 Therefore we have been buried with him through baptism into death, so that as Christ was raised from the dead through the glory of the Father, so we too might walk in newness of life. 5 For if we have been united with him in the likeness of his death, we will certainly also be[a] in the likeness of his resurrection, 6 knowing this, that our old man was crucified together with him, in order that the body of sin might be done away with, so that we would no longer be slaves to sin; 7 for he who has died is freed from sin.
8 Now if we have died with Christ, we believe that we will also live with him,9 knowing that Christ, having been raised from the dead, dies no more, death is master over him no more. 10 For the death he died he died to sin, once for all, but the life he lives he lives to God. 11 Even so consider yourselves to be dead to sin, but alive to God in Christ Jesus.
12 Therefore do not let sin reign in your mortal body so that you obey its lusts, 13 and do not go on presenting the members of your body to sin as instruments of unrighteousness; but present yourselves to God as those alive from the dead, and your members as instruments of righteousness to God. 14 For sin will have no dominion over you, since you are not under law but under grace.
15 What then? Shall we sin because we are not under law but under grace? May it never be! 16 Do you not know that when you present yourselves to someone as slaves for obedience, you are slaves of the one whom you obey, either of sin resulting in death, or of obedience resulting in righteousness? 17 But thanks be to God that you were slaves of sin, but you became obedient from the heart to that form of teaching to which you were committed, 18 and having been freed from sin, you became slaves of righteousness. 19 I am speaking in human terms, because of your natural limitations. For just as you once presented your members as slaves to impurity and to lawlessness leading to more lawlessness, so now present your members as slaves to righteousness leading to sanctification.
20 For when you were slaves of sin, you were free in regard to righteousness. 21 Therefore what fruit were you producing at that time from the things of which you are now ashamed? For the end of those things is death. 22 But now having been set free from sin and having become slaves to God, you are producing your fruit in the way of sanctification, and the end is eternal life. 23 For the wages of sin is death, but the free gift of God is eternal life in Christ Jesus our Lord.
7 Or do you not know, brothers, (for I am speaking to those who know law) that the law is master over a man as long as he lives? 2 For a married woman is bound by law to her husband while he lives, but if her husband dies she is released from the law concerning the husband. 3 So then, if while her husband is living she is joined to another man, she shall be called an adulteress; but if her husband dies, she is free from the law, so that she is not an adulteress though she is joined to another man.
4 Therefore, my brothers, you also have died to the law through the body of Christ, so that you may belong to another, to him who has been raised from the dead, in order that we may bear fruit for God. 5 For while we were living in the flesh, our sinful passions, aroused by the law, were at work in our members to bear fruit for death. 6 But now we have been released from the Law, having died to that by which we were bound, so that we serve in newness of the Spirit and not in oldness of the letter.
7 What shall we say then? Is the Law sin? May it never be! On the contrary, I would not have come to know sin except through the Law; for I would not have known about coveting if the Law had not said, “You shall not covet.” 8 But sin, taking opportunity through the commandment, produced in me coveting of every kind; for apart from the Law sin is dead. 9 I was once alive apart from the law, but when the commandment came, sin came alive and I died; 10 and the commandment that was to lead to life, this I found led to death; 11 for sin, seizing an opportunity through the commandment, deceived me and through it killed me. 12 So then, the Law is holy, and the commandment is holy and righteous and good.
13 Therefore did that which is good become a cause of death for me? May it never be! Rather it was sin, in order that it might be shown to be sin by effecting my death through that which is good, so that through the commandment sin might become exceedingly sinful.
14 For we know that the law is spiritual, but I am of the flesh, sold under sin. 15 For what I am doing, I do not understand; for I am not practicing what I would like to do, but I am doing the very thing I hate. 16 But if what I am not willing to do, this I am doing, I agree that the law is good. 17 So now I am no longer the one doing it, but sin that dwells in me. 18 For I know that nothing good dwells in me, that is, in my flesh; for the desire is present in me, but the doing of the good is not. 19 For the good that I want, I do not do, but I practice the very evil that I do not want. 20 But if what I do not want to do, this I am doing, I am no longer the one doing it, but sin which dwells in me.
21 I find then the law in me that when I want to do right, that evil is present in me. 22 For I delight in the law of God according to the inner man, 23 but I see a different law in my members, warring against the law of my mind and taking me captive in the law of sin which is in my members. 24 Wretched man that I am! Who will deliver me from this body of death? 25 Thanks be to God through Jesus Christ our Lord! So then, I myself serve the law of God with my mind, but with my flesh, I serve the law of sin.
8 There is therefore now no condemnation for those who are in Christ Jesus. 2 For the law of the Spirit of life in Christ Jesus has set you free from the law of sin and death. 3 For what was impossible for the law, in that it was weak through the flesh, God did, sending his own Son in the likeness of sinful flesh and concerning sin, he condemned sin in the flesh, 4 in order that the righteous requirement of the law might be fulfilled in us, who walk not according to the flesh but according to the Spirit. 5 For those who are according to the flesh set their minds on the things of the flesh, but those who are according to the Spirit, the things of the Spirit. 6 For setting the mind on the flesh is death, but setting the mind on the spirit is life and peace 7 because setting the mind on the flesh means enmity toward God, for it is not subjected to the law of God, for it is not even able to do so, 8 and those who are in the flesh cannot please God.
9 However, you are not in the flesh but in the Spirit, if indeed the Spirit of God dwells in you. But if anyone does not have the Spirit of Christ, he does not belong to him. 10 If Christ is in you, though the body is dead because of sin, but the spirit is life because of righteousness. 11 If the Spirit of him who raised Jesus from the dead dwells in you, he who raised Christ Jesus from the dead will also give life to your mortal bodies through his Spirit who dwells in you.
12 So then, brothers, we are debtors, not to the flesh, to live according to the flesh, 13 for if you are living according to the flesh, you must die; but if by the Spirit you put to death the deeds of the body, you will live. 14 For all who are led by the Spirit of God are sons of God. 15 For you have not received a spirit of slavery leading to fear again, but you have received a spirit of adoption as sons, by which we cry out, “Abba! Father!” 16 The Spirit itself bears witness with our spirit that we are children of God, 17 and if children, we are also heir, heirs indeed of God, but joint heirs with Christ, if indeed we suffer together so that we may also be glorified together.
18 For I consider that the sufferings of this present time are not worthy to be compared with the glory that is to be revealed to us. 19 For the creation is waiting with eager expectation for the revealing of the sons of God. 20 For the creation was subjected to futility, not willingly, but because of him who subjected it, in hope 21 that the creation itself also will be set free from its slavery to corruption into the freedom of the glory of the children of God. 22 For we know that the whole creation has been groaning together in the pains of childbirth until now. 23 And not only this, but also we ourselves, having the first fruits of the Spirit, even we ourselves groan within ourselves, waiting eagerly for our adoption as sons, the redemption of our body. 24 For in hope we were saved, but hope that is seen is not hope, for who hopes for what he sees? 25 But if we hope for what we do not see, we eagerly wait for it with patience.
26 In the same way the Spirit also helps our weakness; for we do not know how to pray as we should, but the Spirit himself intercedes for us with groanings too deep for words; 27 and he who searches hearts knows what is the mind of the Spirit, because the Spirit intercedes for the holy ones according to the will of God.
28 And we know that all things work together for good for those who love God, for those who are called according to his purpose. 29 For those whom he foreknew he also decided beforehand to be conformed to the image of his Son, in order that he might be the firstborn among many brothers; 30 and those whom he decided beforehand he also called, and those whom he called he also justified, and those whom he justified he also glorified.
37 But in all these things we are more than conquerors through the one having loved us. 38 For I am convinced that neither death, nor life, nor angels, nor rulers, nor things present, nor things to come, nor powers, 39 nor height, nor depth, nor any other created thing, will be able to separate us from the love of God that is in Christ Jesus our Lord.
9 I am telling the truth in Christ, I am not lying, my conscience bears witness to me in the Holy Spirit, 2 that I have great sorrow and unceasing anguish in my heart. 3 For I could pray that I myself were accursed and cut off from Christ for the sake of my brothers, my kinsmen according to the flesh. 4 who are Israelites, to whom belongs the adoption as sons, and the glory and the covenants and the giving of the Law and the temple service and the promises, 5 to whom belong the patriarchs, and from whom is the Christ according to the flesh. God who is over all be praised forever. Amen.
14 What shall we say then? There is no injustice with God, is there? May it never be! 15 For he says to Moses, “I will have mercy on whom I have mercy, and I will have compassion on whom I have compassion.” 16 So then it does not depend on the man who wills or the man who runs, but on God who has mercy. 17 For the Scripture says to Pharaoh, “For this very purpose I have raised you up, that I might show my power in you, and that my name might be proclaimed in all the earth.” 18 So then he has mercy on whom he wants, and he hardens whom he wants.
10 Brothers, my heart's desire and my prayer to God for them is for their salvation. 2 For I bear them witness that they have a zeal for God, but not according to accurate knowledge. 3 For ignoring the righteousness of God, and seeking to establish their own, they did not subject themselves to the righteousness of God. 4 For Christ is the end of the law for righteousness to everyone who believes.
16 But they have not all obeyed the gospel. For Isaiah says, “Lord, who has believed what he has heard from us?” 17 So faith comes from hearing, and hearing through the word of Christ.
11 I say then, God has not rejected his people, has he? May it never be! For I also am an Israelite, from the descendants of Abraham, of the tribe of Benjamin. 2 God has not rejected his people whom he foreknew. Do you not know what the Scripture says of Elijah, how he appeals to God against Israel? 3 “Lord, they have killed your prophets, they have torn down your altars, and I alone am left, and they are seeking my soul.” 4 But what does the divine response say to him? “I have kept for myself seven thousand men who have not bowed the knee to Baal.” 5 So in the same way, at the present time also, there is a remnant according to a choosing through grace. 6 But if it is by grace, it is no longer on the basis of works; otherwise grace would no longer be grace.
11 I say then, they did not stumble so that they fell, did they? May it never be! But by their trespass, salvation has come to the Gentiles, to make them jealous. 12 Now if their trespass means riches for the world, and if their failure means riches for the Gentiles, how much more will their fullness mean! 13 Now I am speaking to you Gentiles. Inasmuch then as I am an apostle to the Gentiles, I magnify my ministry, 14 if I might somehow make my fellow Jews jealous, and thus save some of them. 15 For if their rejection means the reconciliation of the world, what will their acceptance mean but life from the dead? 16 If the firstfruits is holy, the batch is also; and if the root is holy, the branches are also.
17 But if some of the branches were broken off, and you, although being a wild olive, were grafted in among them and became a sharer of the richness of the olive’s root, 18 do not be arrogant toward the branches; but if you are arrogant, remember that it is not you who supports the root, but the root supports you. 19 You will say then, “Branches were broken off so that I might be grafted in.” 20 That is true. They were broken off because of their unbelief, but you stand fast through faith. So do not become haughty, but fear; 21 for if God did not spare the natural branches, He will not spare you, either. 22 Behold then the kindness and severity of God; to those who fell, severity, but to you, God’s kindness, if you continue in His kindness; otherwise you also will be cut off. 23 And they also, if they do not continue in their unbelief, will be grafted in, for God is able to graft them in again. 24 For if you were cut from what is by nature a wild olive tree, and grafted, contrary to nature, into a cultivated olive tree, how much more will these, the natural branches, be grafted back into their own olive tree.
28 As regards the gospel, they are enemies for your sake. But as regards God’s choosing, they are beloved for the sake of their forefathers; 29 for the gifts and the calling of God are irrevocable. 30 For just as you were at one time disobedient to God but now have received mercy because of their disobedience, 31 so these also now have been disobedient, that because of the mercy shown to you they also may now be shown mercy. 32 For God has shut up all in disobedience so that he may have mercy on all.
33 Oh, the depth of the riches and wisdom and knowledge of God! How unsearchable are his judgments and how untraceable his ways!
12 Therefore I urge you, brothers, by the mercies of God, to present your bodies a living and holy sacrifice, acceptable to God, which is your reasonable service. 2 And do not be conformed to this world, but be transformed by the renewing of your mind, so that you may prove what the will of God is, that which is good and acceptable and perfect.
3 For through the grace given to me I say to everyone among you not to think more highly of himself than he ought to think; but to think so as to have a sound mind, each one as God has apportioned to him a measure of faith. 4 For just as we have many members in one body and all the members do not have the same function, 5 so we, though many, are one body in Christ, and individually members one of another. 6 Since, then, we have gifts that differ according to the grace given to us, if it is of prophecy, let us prophesy in proportion to our faith; 7 if service, in our serving; the one who teaches, in his teaching; 8 or he who exhorts, in his exhortation; he who gives, let him do it liberally; he who leads, let him do it diligently; he who shows mercy, let him do it cheerfully.
9 Let love be without hypocrisy. Abhor what is evil; cling to what is good. 10 In brotherly love have tender affection for one another; in showing honor to one another, take the lead; 11 Do not be slothful in zeal, be fervent in spirit, serving the Lord; 12 rejoicing in hope, enduring under tribulation, persevering in prayer, 13 contributing to the needs of the holy ones, pursuing hospitality.
14 Bless those who persecute you; bless and do not curse. 15 Rejoice with those who rejoice, and weep with those who weep. 16 Be of the same mind toward one another; do not be haughty in mind, but associate with the lowly. Do not be wise in your own eyes. 17 Return evil for evil to no one. Take thought to do what is honorable in the sight of all men. 18 If possible, so far as it depends on you, be at peace with all men. 19 Do not avenge yourselves, beloved, but yield place to the wrath; for it is written: “‘Vengeance is mine; I will repay,’ says the Lord. 20 But “if your enemy is hungry, feed him; if he is thirsty, give him something to drink; for by doing this you will heap burning coals on his head.” 21 Do not be overcome by evil, but overcome evil with good.
13 Let every soul be in subjection to the governing authorities. For there is no authority except by God, and those that exist have been placed by God. 2 Therefore the one setting himself against authority has taken a stand against the ordinance of God; and those who have taken a stand against it will receive judgment against themselves. 3 For rulers are not a cause of fear, not to the good deed, but to the bad. Do you want to be free of fear of the authority? Keep doing good, and you will have praise from it; 4 for it is a minister of God to you for good. But if you do what is evil, be afraid; for it does not bear the sword for nothing; for it is a minister of God, an avenger who brings wrath on the one who practices bad. 5 Therefore it is necessary to be in subjection, not only because of wrath, but also for conscience’ sake. 6 For because of this you also pay taxes, for the authorities are ministers of God, attending to this very thing. 7 Render to all what is due them: tax to whom tax is due; custom to whom custom; fear to whom fear; honor to whom honor.
8 Owe nothing to anyone, except to love one another, for the one who loves someone else has fulfilled the law. 9 For the commandments, “You shall not commit adultery, you shall not commit murder, you shall not steal, you shall not covet,” and if there is any other commandment, are summed up in this statement: “You shall love your neighbor as yourself.” 10 Love does not work evil to a neighbor; therefore love is the fulfilling of the law.
11 Do this, knowing the season, that it is already the hour for you to awaken from sleep; for now salvation is nearer to us than when we believed. 12 The night is well along; the day has drawn near. Let us therefore throw off the works belonging to darkness and let us put on the weapons of the light. 13 Let us behave properly as in the day, not in carousing and drunkenness, not in sexual promiscuity and sensuality, not in strife and jealousy. 14 But put on the Lord Jesus Christ, and make no provision for the flesh, in regard to desires.
14 As for the one who is weak in faith, welcome him, but not to quarrel over opinions. 2 One person has faith that he may eat all things, but he who is weak eats only vegetables. 3 Let not the one who eats despise the one who does not eat, and the one who does not eat must not judge the one who eats, because God has accepted him. 4 Who are you to pass judgment on the servant of another? It is before his own master that he stands or falls. And he will be upheld, for the Lord is able to make him stand.
5 One person esteems one day above another, while another esteems all days alike. Each one should be fully convinced in his own mind. 6 The one who observes the day, observes it in honor of the Lord. The one who eats, eats in honor of the Lord, since he gives thanks to God, while the one who abstains, abstains in honor of the Lord and gives thanks to God. 7 For not one of us lives for himself, and not one dies for himself; 8 for if we live, we live for the Lord, or if we die, we die for the Lord; therefore whether we live or die, we are the Lord’s. 9 For to this end Christ died and lived again, that he might be Lord both of the dead and of the living.
12 So, then, each of us will render an account for himself to God.
13 Therefore, let us no longer pass judgment on one another, but rather decide this: not to place a cause for stumbling or a temptation before a brother. 14 I know and am persuaded in the Lord Jesus that nothing is unclean in itself, but to him who thinks anything to be unclean, to him it is unclean. 15 For if because of food your brother is hurt, you are no longer walking according to love. Do not destroy with your food him for whom Christ died. 16 Therefore, do not let the good you do be spoken of as bad; 17 for the kingdom of God is not eating and drinking, but righteousness and peace and joy in the Holy Spirit. 18 For the one who serves Christ in this way is well-pleasing to God and approved by men.
19 So then we pursue the things which make for peace and the building up of one another. 20 Do not, for the sake of food, destroy the work of God. All things indeed are clean, but it is harmful for the man to eat and cause stumbling. 21 It is good not to eat meat or drink wine or do anything over which your brother stumbles. 22 The faith that you have, keep it to yourself before God. Blessed is the man who does not judge himself by what he approves. 23 But the one who doubts is condemned if he eats, because he does not do so from faith; and whatever is not from faith is sin.
15 Now we who are strong ought to bear the weaknesses of those without strength and not please ourselves. 2 Let each of us please his neighbor for his good, to build him up. 3 For even the Christ did not please himself, but just as it is written: “The reproaches of those reproaching you have fallen upon me.” 4 For whatever was written in former days was written for our instruction, that through endurance and through the encouragement of the Scriptures we might have hope. 5 Now may the God who gives endurance and comfort grant you to be of the same mind with one another according to Christ Jesus, 6 so that with one mind you may glorify with one mouth the God and Father of our Lord Jesus Christ.
22 For this reason also I was many times hindered from coming to you.; 23 but now I no longer have a place in these regions, and for many years I have longed to come to you, 24 whenever I journey to Spain, I hope that I will see you in passing and to be helped on my way there by you after I have first enjoyed your company for a time. 25 But now I am about to travel to Jerusalem to minister to the holy ones. 26 For Macedonia and Achaia have been pleased to make some contribution for the poor among the holy ones at Jerusalem. 27 Yes, they were pleased to do so, and they are indebted to them. For if the Gentiles have shared in their spiritual things, they are indebted to minister to them also in material things. 28 Therefore, when I have finished this, and have sealed to them this fruit, I will go on by way of you to Spain. 29 I know that when I come to you, I will come in the fullness of the blessing of Christ.
30 Now I urge you, brothers, through our Lord Jesus Christ and through the love of the Spirit, that you exert yourselves with me in prayers to God for me, 31 that I may be delivered from the unbelievers in Judea, and that my service for Jerusalem may be acceptable to the holy ones; 32 so that I may come to you in joy by the will of God and find refreshing rest in your company. 33 Now the God of peace be with you all. Amen.
16 I commend to you our sister Phoebe, a minister of the congregation at Cenchreae, 2 in order that you may welcome her in the Lord in a manner worthy of the holy ones, and help her in whatever task she may have need from you, for she herself also has been a helper of many, even me myself.
3 Greet Prisca and Aquila, my fellow workers in Christ Jesus, 4 who for my life risked their own necks, to whom not only do I give thanks, but also all the congregations of the Gentiles; 5 also greet the church that is in their house. Greet Epaenetus, my beloved, who is the first convert to Christ from Asia. 6 Greet Mary, who has worked hard for you. 7 Greet Andronicus and Junias, my kinsmen and my fellow prisoners, who are well known among the apostles, who also were in Christ before me. 8 Greet Ampliatus, my beloved in the Lord. 9 Greet Urbanus, our fellow worker in Christ, and Stachys my beloved. 10 Greet Apelles, the approved in Christ. Greet those who are of the household of Aristobulus. 11 Greet Herodion, my kinsman. Greet those of the household of Narcissus, who are in the Lord. 12 Greet Tryphaena and Tryphosa, women who are working hard in the Lord. Greet Persis, our beloved one, for she has worked hard in the Lord. 13 Greet Rufus, a choice man in the Lord, also his mother and mine. 14 Greet Asyncritus, Phlegon, Hermes, Patrobas, Hermas and the brother with them. 15 Greet Philologus and Julia, Nereus and his sister, and Olympas, and all the holy ones who are with them. 16 Greet one another with a holy kiss. All the congregations of Christ greet you.
17 Now I urge you, brothers, to keep your eye on those who cause divisions and occasions of stumbling contrary to the teaching that you have learned, and turn away from them. 18 For such men are slaves, not of our Lord Christ but of their own appetites; and by their smooth and flattering speech they deceive the hearts of the unsuspecting. 19 For the report of your obedience has reached to all; therefore I am rejoicing over you, but I want you to be wise in what is good and innocent in what is evil. 20 The God of peace will soon crush Satan under your feet. The grace of our Lord Jesus Christ be with you.
25 Now to him who is able to strengthen you according to my gospel and the proclaiming of Jesus Christ, according to the revelation of the mystery that was kept secret for long ages, 26 but has now been disclosed and through the prophetic writings has been made known to all nations, according to the command of the eternal God, to bring about the obedience of faith; 27 to the only wise God, through Jesus Christ, be the glory forever. Amen.
Brothers: (Gr. adelphoi) This refers to male siblings. (Matt 4:18) It also refers to a group of persons, that is, fellow believers (male and female at times, Rom. 18:29), regardless of the masculine form. It can also refer to a fellow Jew (Ac 22:1); to fellow countryman (Ac 2:29), as well as one’s neighbor (Matt. 5:22)–Acts 1:15-16; 9:30; 11:1; Romans 1:13; 1 Corinthians 1:1, 10.
Barbarian: (Gr. barbaros) The repetition of the “bar bar” in the Greek originally convey the idea of a stammering, stuttering, babble, or any form of unintelligible sounds. Thus, the term “barbarian” was a term used by the Greeks, which referred to any foreigner, especially one who did not speak Greek, only later being viewed as uncivilized foreigners. Initially, there was no sense of hostility or contempt, and these non-Greeks were not offended by the term. It is similar to Gentile being used to refer to non-Jews. Eventually, a barbarian, any non-Greek, came to suggest one who was uncivilized.–Ac 28:2, 4; Rom. 1:14; 1 Cor. 14:11; Col. 3:11.
Transgression: (Heb. ’avar; Gr. parabasis) Sin can take the form of a “transgression.” This is an overstepping, namely, to exceed a moral limit or boundary. Biblically speaking, this would be crossing the line and saying, feeling, thinking or doing something that is contrary to God’s personality, standards, ways, will and purposes, as set out in the Scriptures. It is breaking God’s moral law.–Num. 14:41; Deut. 17:2, 3; Josh. 7:11, 15; 1 Sam 15:24; Isa 24:5; Jer. 34:18; Rom. 2:23; 4:15; 5:14; Gal. 3:19; 1 Tim. 2:14; Heb. 2:2; 9:15.
Believe, faith, Trust in: (Gr. pisteuo) If pisteuo is followed by the Greek preposition eis, (“into, in, among,” accusative case), it is generally rendered “trusting in” or “trust in.” (John 3:16, 36; 12:36; 14:1) The grammatical construction of the Greek verb pisteuo “believe” followed by the Greek preposition eis “into” in the accusative gives us the sense of having faith into Jesus, putting faith in, trusting in Jesus.–Matt. 21:25, 32; 27:42; John 1:7, 12; 2:23–24; 3:15-16, 36; 6:47; 11:25; 12:36; 14:1; 20:31; Acts 16:31; Rom. 4:3.
Trespass: (Gr. paraptōma) This is a sin that can come in the way of some desire (lusting), some thinking (entertaining a wrongdoing) or some action (carrying out one’s desires or thoughts that he or she has been entertaining) that is beyond or overstepping God’s righteous standards, as set out in the Scriptures. It is falling or making a false step as opposed to standing or walking upright in harmony with the righteous requirements of God.–Matt. 6:14; Mark 11:25; Rom. 4:25; 5:15-20; 11:11; 2 Cor. 5:19; Gal. 6:1; Eph. 1:7; 2:1, 5; Col 2:13.
Body: (Gr. sōma) The complete material structure or physical form of a organism, human being, or animal. (Mark 14:22; Lu 17:37; Rom. 8:23; 1 Cor. 12:12; 15:37; Phil. 3:21) There are also spiritual bodies, which are invisible to human eyes and completely beyond human senses. (1 Cor. 15:40, 44) The term “body” is also used in symbolically.–Rom 6:3-6; 1 Cor. 12:13; Gal. 3:28; Eph. 1:22-23; 2:16; 4:4; Col. 1:18.
Adoption: (Gr. huiothesia) The Greek noun is a legal term that literally means “adoption as son,” which means to take or accept a son or daughter who is not naturally such by relationship, including complete inheritance rights. The apostle Paul mentions adoption several times in reference to those with a new status as called and chosen by God. These ones were born as offspring of the imperfect Adam, were formerly in slavery to sin. Through purchase by means of Jesus’ life as a ransom, many have received the adoption as sons and daughters becoming heirs with the only-begotten Son of God, Jesus Christ.–Rom. 8:15, 23; 9:4; Gal. 4:5; Eph. 1:5.
Accurate Knowledge: (Gr. Epignosis) A strengthened or intensified form of gnosis (epi, meaning “additional”), meaning, “true,” “real,” “full,” “complete” or “accurate,” depending upon the context. Paul and Peter alone use epignosis.–Rom. 1:28; Eph. 1:17; Php 1:9; Col. 1:9-10; 1 Tim 2:4.
Abyss: (Gr. abussos) It is a very deep place, which is rendered “the bottomless pit” in some versions (KJV). This is found the NT and refers to a place or condition, where Satan and his demons will be confined for a thousand years. (Rev. 20:1-3) Abaddon rules over the abyss (Rev. 9:11) The beast is of Satan’s design and will rise from the abyss in the last days. (Rev. 11:7) The beast will go off into destruction. (Rev 17:8) It is used at times to refer to the grave as well. – Lu 8:31; Rom. 10:7; Rev. 20:3.
Quotation from Joel 2:32, which reads, “everyone who calls on the name of Jehovah shall be saved.” In other words, Paul was referring to the Father not the Son.
I let myself be found by those who did not seek me.
I said, ‘Here I am; here I am!’ to a nation that was not calling on my name.
Baal: (Heb. bǎʿǎl; Gr. Βάαλ) The Hebrew means “Owner; Master; Husband.” An ancient Canaanite god: a fertility or nature god, seen as the owner of the sky and giver of rains, worshiped by the Canaanites and the Phoenicians.– 1 Ki 18:21; Rom. 11:4.
Stumble, fall away, to be offended: (Gr. skandalizomai) In Greek, “stumbling block” (skandalon) was originally a device or trap, which contained bait, to ensnare or catch something alive. (1 John 2:10) It is used in the Scriptures as a trap, obstacle, or snare that stumbles one into sinning. (Rom. 11:9; Matt. 13:41) It can also be used as an obstacle that causes offense, resulting in opposition. (1 Cor. 1:23; Gal. 5:11) The Greek, (skandalizomai) refers to one who ceases to believe because of tribulation. (Matt. 13:21) It can also refer to one who is spiritually weak, immature in the faith, resulting in their falling into sin. (2 Cor. 11:29) In addition, it can refer to one who takes offense to some action. (Matt. 15:12) It can refer to one who causes another no longer to believe (John 6:61) It can also refer to something or someone that causes another to sin because they are spiritually weak or immature in the faith. (Matt. 5:29; Rom. 14:21) It can refer to another who is angered or shocked by something or someone, which could result in their sinning.–Matt. 17:27; John 6:61.
Junias received a special greeting from Paul at the end of his letter to the Romans. (16:7) Andronicus and Junias were his “kinsmen.” While the Greek word used here (συγγενής) can mean “a man from one's own country,” "fellow countryman," the primary meaning is blood relative, including the extended family," of the same generation. The two were Paul’s “fellow prisoners,” meaning that they had been in prison with him somewhere. Paul calls them both “well known among the apostles,” perhaps remembering their fine reputation with the apostles. Note that it does not call Andronicus and Junias apostles but only says that they were well known among the apostles. The Greek term (episēmos) rendered well know is a plural masculine adjective. Therefore, it could rightly be rendered, "men who are well known among the apostles."
P46 P61 א A B C 1739 Itb cop omit; DItVgc, [The grace of our Lord Jesus Christ be with you all. Amen.], which is the same as the end of vs 20. The earliest MSS support the omission of this verse. All modern translation does not include this verse because of superior testimony. | 2019-04-23T08:35:25Z | https://www.uasvbible.org/46-epistle-to-romans |
1 Alif, Lam, Meem, Sad.
2 [This is] a Book revealed to you, [O Muhammad] - so let there not be in your breast distress therefrom - that you may warn thereby and as a reminder to the believers.
3 Follow, [O mankind], what has been revealed to you from your Lord and do not follow other than Him any allies. Little do you remember.
4 And how many cities have We destroyed, and Our punishment came to them at night or while they were sleeping at noon.
5 And their declaration when Our punishment came to them was only that they said, "Indeed, we were wrongdoers!"
6 Then We will surely question those to whom [a message] was sent, and We will surely question the messengers.
7 Then We will surely relate [their deeds] to them with knowledge, and We were not [at all] absent.
8 And the weighing [of deeds] that Day will be the truth. So those whose scales are heavy - it is they who will be the successful.
9 And those whose scales are light - they are the ones who will lose themselves for what injustice they were doing toward Our verses.
10 And We have certainly established you upon the earth and made for you therein ways of livelihood. Little are you grateful.
12 [ Allah ] said, "What prevented you from prostrating when I commanded you?" [Satan] said, "I am better than him. You created me from fire and created him from clay."
13 [ Allah ] said, "Descend from Paradise, for it is not for you to be arrogant therein. So get out; indeed, you are of the debased.
14 [Satan] said, "Reprieve me until the Day they are resurrected."
15 [ Allah ] said, "Indeed, you are of those reprieved."
16 [Satan] said, "Because You have put me in error, I will surely sit in wait for them on Your straight path.
17 Then I will come to them from before them and from behind them and on their right and on their left, and You will not find most of them grateful [to You]."
18 [ Allah ] said, "Get out of Paradise, reproached and expelled. Whoever follows you among them - I will surely fill Hell with you, all together."
19 And "O Adam, dwell, you and your wife, in Paradise and eat from wherever you will but do not approach this tree, lest you be among the wrongdoers."
20 But Satan whispered to them to make apparent to them that which was concealed from them of their private parts. He said, "Your Lord did not forbid you this tree except that you become angels or become of the immortal."
21 And he swore [by Allah ] to them, "Indeed, I am to you from among the sincere advisors."
22 So he made them fall, through deception. And when they tasted of the tree, their private parts became apparent to them, and they began to fasten together over themselves from the leaves of Paradise. And their Lord called to them, "Did I not forbid you from that tree and tell you that Satan is to you a clear enemy?"
23 They said, "Our Lord, we have wronged ourselves, and if You do not forgive us and have mercy upon us, we will surely be among the losers."
24 [ Allah ] said, "Descend, being to one another enemies. And for you on the earth is a place of settlement and enjoyment for a time."
25 He said, "Therein you will live, and therein you will die, and from it you will be brought forth."
26 O children of Adam, We have bestowed upon you clothing to conceal your private parts and as adornment. But the clothing of righteousness - that is best. That is from the signs of Allah that perhaps they will remember.
27 O children of Adam, let not Satan tempt you as he removed your parents from Paradise, stripping them of their clothing to show them their private parts. Indeed, he sees you, he and his tribe, from where you do not see them. Indeed, We have made the devils allies to those who do not believe.
28 And when they commit an immorality, they say, "We found our fathers doing it, and Allah has ordered us to do it." Say, "Indeed, Allah does not order immorality. Do you say about Allah that which you do not know?"
30 A group [of you] He guided, and a group deserved [to be in] error. Indeed, they had taken the devils as allies instead of Allah while they thought that they were guided.
31 O children of Adam, take your adornment at every masjid, and eat and drink, but be not excessive. Indeed, He likes not those who commit excess.
33 Say, "My Lord has only forbidden immoralities - what is apparent of them and what is concealed - and sin, and oppression without right, and that you associate with Allah that for which He has not sent down authority, and that you say about Allah that which you do not know."
34 And for every nation is a [specified] term. So when their time has come, they will not remain behind an hour, nor will they precede [it].
35 O children of Adam, if there come to you messengers from among you relating to you My verses, then whoever fears Allah and reforms - there will be no fear concerning them, nor will they grieve.
36 But the ones who deny Our verses and are arrogant toward them - those are the companions of the Fire; they will abide therein eternally.
37 And who is more unjust than one who invents about Allah a lie or denies His verses? Those will attain their portion of the decree until when Our messengers come to them to take them in death, they will say, "Where are those you used to invoke besides Allah ?" They will say, "They have departed from us," and will bear witness against themselves that they were disbelievers.
38 [ Allah ] will say, "Enter among nations which had passed on before you of jinn and mankind into the Fire." Every time a nation enters, it will curse its sister until, when they have all overtaken one another therein, the last of them will say about the first of them "Our Lord, these had misled us, so give them a double punishment of the Fire. He will say, "For each is double, but you do not know."
39 And the first of them will say to the last of them, "Then you had not any favor over us, so taste the punishment for what you used to earn."
40 Indeed, those who deny Our verses and are arrogant toward them - the gates of Heaven will not be opened for them, nor will they enter Paradise until a camel enters into the eye of a needle. And thus do We recompense the criminals.
41 They will have from Hell a bed and over them coverings [of fire]. And thus do We recompense the wrongdoers.
42 But those who believed and did righteous deeds - We charge no soul except [within] its capacity. Those are the companions of Paradise; they will abide therein eternally.
43 And We will have removed whatever is within their breasts of resentment, [while] flowing beneath them are rivers. And they will say, "Praise to Allah , who has guided us to this; and we would never have been guided if Allah had not guided us. Certainly the messengers of our Lord had come with the truth." And they will be called, "This is Paradise, which you have been made to inherit for what you used to do."
44 And the companions of Paradise will call out to the companions of the Fire, "We have already found what our Lord promised us to be true. Have you found what your Lord promised to be true?" They will say, "Yes." Then an announcer will announce among them, "The curse of Allah shall be upon the wrongdoers."
45 Who averted [people] from the way of Allah and sought to make it [seem] deviant while they were, concerning the Hereafter, disbelievers.
46 And between them will be a partition, and on [its] elevations are men who recognize all by their mark. And they call out to the companions of Paradise, "Peace be upon you." They have not [yet] entered it, but they long intensely.
47 And when their eyes are turned toward the companions of the Fire, they say, "Our Lord, do not place us with the wrongdoing people."
48 And the companions of the Elevations will call to men [within Hell] whom they recognize by their mark, saying, "Of no avail to you was your gathering and [the fact] that you were arrogant."
49 [ Allah will say], "Are these the ones whom you [inhabitants of Hell] swore that Allah would never offer them mercy? Enter Paradise, [O People of the Elevations]. No fear will there be concerning you, nor will you grieve."
50 And the companions of the Fire will call to the companions of Paradise, "Pour upon us some water or from whatever Allah has provided you." They will say, "Indeed, Allah has forbidden them both to the disbelievers."
52 And We had certainly brought them a Book which We detailed by knowledge - as guidance and mercy to a people who believe.
53 Do they await except its result? The Day its result comes those who had ignored it before will say, "The messengers of our Lord had come with the truth, so are there [now] any intercessors to intercede for us or could we be sent back to do other than we used to do?" They will have lost themselves, and lost from them is what they used to invent.
54 Indeed, your Lord is Allah , who created the heavens and earth in six days and then established Himself above the Throne. He covers the night with the day, [another night] chasing it rapidly; and [He created] the sun, the moon, and the stars, subjected by His command. Unquestionably, His is the creation and the command; blessed is Allah , Lord of the worlds.
55 Call upon your Lord in humility and privately; indeed, He does not like transgressors.
56 And cause not corruption upon the earth after its reformation. And invoke Him in fear and aspiration. Indeed, the mercy of Allah is near to the doers of good.
58 And the good land - its vegetation emerges by permission of its Lord; but that which is bad - nothing emerges except sparsely, with difficulty. Thus do We diversify the signs for a people who are grateful.
59 We had certainly sent Noah to his people, and he said, "O my people, worship Allah ; you have no deity other than Him. Indeed, I fear for you the punishment of a tremendous Day.
60 Said the eminent among his people, "Indeed, we see you in clear error."
61 [Noah] said, "O my people, there is not error in me, but I am a messenger from the Lord of the worlds."
62 I convey to you the messages of my Lord and advise you; and I know from Allah what you do not know.
63 Then do you wonder that there has come to you a reminder from your Lord through a man from among you, that he may warn you and that you may fear Allah so you might receive mercy."
64 But they denied him, so We saved him and those who were with him in the ship. And We drowned those who denied Our signs. Indeed, they were a blind people.
65 And to the 'Aad [We sent] their brother Hud. He said, "O my people, worship Allah ; you have no deity other than Him. Then will you not fear Him?"
66 Said the eminent ones who disbelieved among his people, "Indeed, we see you in foolishness, and indeed, we think you are of the liars."
67 [Hud] said, "O my people, there is not foolishness in me, but I am a messenger from the Lord of the worlds."
68 I convey to you the messages of my Lord, and I am to you a trustworthy adviser.
69 Then do you wonder that there has come to you a reminder from your Lord through a man from among you, that he may warn you? And remember when He made you successors after the people of Noah and increased you in stature extensively. So remember the favors of Allah that you might succeed.
70 They said, "Have you come to us that we should worship Allah alone and leave what our fathers have worshipped? Then bring us what you promise us, if you should be of the truthful."
71 [Hud] said, "Already have defilement and anger fallen upon you from your Lord. Do you dispute with me concerning [mere] names you have named them, you and your fathers, for which Allah has not sent down any authority? Then wait; indeed, I am with you among those who wait."
72 So We saved him and those with him by mercy from Us. And We eliminated those who denied Our signs, and they were not [at all] believers.
73 And to the Thamud [We sent] their brother Salih. He said, "O my people, worship Allah ; you have no deity other than Him. There has come to you clear evidence from your Lord. This is the she-camel of Allah [sent] to you as a sign. So leave her to eat within Allah 's land and do not touch her with harm, lest there seize you a painful punishment.
74 And remember when He made you successors after the 'Aad and settled you in the land, [and] you take for yourselves palaces from its plains and carve from the mountains, homes. Then remember the favors of Allah and do not commit abuse on the earth, spreading corruption."
75 Said the eminent ones who were arrogant among his people to those who were oppressed - to those who believed among them, "Do you [actually] know that Salih is sent from his Lord?" They said, "Indeed we, in that with which he was sent, are believers."
76 Said those who were arrogant, "Indeed we, in that which you have believed, are disbelievers."
77 So they hamstrung the she-camel and were insolent toward the command of their Lord and said, "O Salih, bring us what you promise us, if you should be of the messengers."
78 So the earthquake seized them, and they became within their home [corpses] fallen prone.
79 And he turned away from them and said, "O my people, I had certainly conveyed to you the message of my Lord and advised you, but you do not like advisors."
80 And [We had sent] Lot when he said to his people, "Do you commit such immorality as no one has preceded you with from among the worlds?
81 Indeed, you approach men with desire, instead of women. Rather, you are a transgressing people."
82 But the answer of his people was only that they said, "Evict them from your city! Indeed, they are men who keep themselves pure."
83 So We saved him and his family, except for his wife; she was of those who remained [with the evildoers].
84 And We rained upon them a rain [of stones]. Then see how was the end of the criminals.
85 And to [the people of] Madyan [We sent] their brother Shu'ayb. He said, "O my people, worship Allah ; you have no deity other than Him. There has come to you clear evidence from your Lord. So fulfill the measure and weight and do not deprive people of their due and cause not corruption upon the earth after its reformation. That is better for you, if you should be believers.
86 And do not sit on every path, threatening and averting from the way of Allah those who believe in Him, seeking to make it [seem] deviant. And remember when you were few and He increased you. And see how was the end of the corrupters.
87 And if there should be a group among you who has believed in that with which I have been sent and a group that has not believed, then be patient until Allah judges between us. And He is the best of judges."
88 Said the eminent ones who were arrogant among his people, "We will surely evict you, O Shu'ayb, and those who have believed with you from our city, or you must return to our religion." He said, "Even if we were unwilling?"
89 We would have invented against Allah a lie if we returned to your religion after Allah had saved us from it. And it is not for us to return to it except that Allah , our Lord, should will. Our Lord has encompassed all things in knowledge. Upon Allah we have relied. Our Lord, decide between us and our people in truth, and You are the best of those who give decision."
90 Said the eminent ones who disbelieved among his people, "If you should follow Shu'ayb, indeed, you would then be losers."
91 So the earthquake seized them, and they became within their home [corpses] fallen prone.
92 Those who denied Shu'ayb - it was as though they had never resided there. Those who denied Shu'ayb - it was they who were the losers.
93 And he turned away from them and said, "O my people, I had certainly conveyed to you the messages of my Lord and advised you, so how could I grieve for a disbelieving people?"
94 And We sent to no city a prophet [who was denied] except that We seized its people with poverty and hardship that they might humble themselves [to Allah ].
95 Then We exchanged in place of the bad [condition], good, until they increased [and prospered] and said, "Our fathers [also] were touched with hardship and ease." So We seized them suddenly while they did not perceive.
96 And if only the people of the cities had believed and feared Allah , We would have opened upon them blessings from the heaven and the earth; but they denied [the messengers], so We seized them for what they were earning."
97 Then, did the people of the cities feel secure from Our punishment coming to them at night while they were asleep?
98 Or did the people of the cities feel secure from Our punishment coming to them in the morning while they were at play?
99 Then did they feel secure from the plan of Allah ? But no one feels secure from the plan of Allah except the losing people.
100 Has it not become clear to those who inherited the earth after its [previous] people that if We willed, We could afflict them for their sins? But We seal over their hearts so they do not hear.
101 Those cities - We relate to you, [O Muhammad], some of their news. And certainly did their messengers come to them with clear proofs, but they were not to believe in that which they had denied before. Thus does Allah seal over the hearts of the disbelievers.
102 And We did not find for most of them any covenant; but indeed, We found most of them defiantly disobedient.
103 Then We sent after them Moses with Our signs to Pharaoh and his establishment, but they were unjust toward them. So see how was the end of the corrupters.
105 [Who is] obligated not to say about Allah except the truth. I have come to you with clear evidence from your Lord, so send with me the Children of Israel."
106 [Pharaoh] said, "If you have come with a sign, then bring it forth, if you should be of the truthful."
107 So Moses threw his staff, and suddenly it was a serpent, manifest.
108 And he drew out his hand; thereupon it was white [with radiance] for the observers.
110 Who wants to expel you from your land [through magic], so what do you instruct?"
112 Who will bring you every learned magician."
113 And the magicians came to Pharaoh. They said, "Indeed for us is a reward if we are the predominant."
114 He said, "Yes, and, [moreover], you will be among those made near [to me]."
115 They said, "O Moses, either you throw [your staff], or we will be the ones to throw [first]."
116 He said, "Throw," and when they threw, they bewitched the eyes of the people and struck terror into them, and they presented a great [feat of] magic.
117 And We inspired to Moses, "Throw your staff," and at once it devoured what they were falsifying.
118 So the truth was established, and abolished was what they were doing.
119 And Pharaoh and his people were overcome right there and became debased.
120 And the magicians fell down in prostration [to Allah ].
122 The Lord of Moses and Aaron."
123 Said Pharaoh, "You believed in him before I gave you permission. Indeed, this is a conspiracy which you conspired in the city to expel therefrom its people. But you are going to know.
124 I will surely cut off your hands and your feet on opposite sides; then I will surely crucify you all."
125 They said, "Indeed, to our Lord we will return.
126 And you do not resent us except because we believed in the signs of our Lord when they came to us. Our Lord, pour upon us patience and let us die as Muslims [in submission to You]."
127 And the eminent among the people of Pharaoh said," Will you leave Moses and his people to cause corruption in the land and abandon you and your gods?" [Pharaoh] said, "We will kill their sons and keep their women alive; and indeed, we are subjugators over them."
128 Said Moses to his people, "Seek help through Allah and be patient. Indeed, the earth belongs to Allah . He causes to inherit it whom He wills of His servants. And the [best] outcome is for the righteous."
129 They said, "We have been harmed before you came to us and after you have come to us." He said, "Perhaps your Lord will destroy your enemy and grant you succession in the land and see how you will do."
130 And We certainly seized the people of Pharaoh with years of famine and a deficiency in fruits that perhaps they would be reminded.
131 And But when good came to them, they said, "This is ours [by right]." And if a bad [condition] struck them, they saw an evil omen in Moses and those with him. Unquestionably, their fortune is with Allah , but most of them do not know.
132 And And they said, "No matter what sign you bring us with which to bewitch us, we will not be believers in you."
133 And So We sent upon them the flood and locusts and lice and frogs and blood as distinct signs, but they were arrogant and were a criminal people.
134 And And when the punishment descended upon them, they said, "O Moses, invoke for us your Lord by what He has promised you. If you [can] remove the punishment from us, we will surely believe you, and we will send with you the Children of Israel."
135 And But when We removed the punishment from them until a term which they were to reach, then at once they broke their word.
136 And So We took retribution from them, and We drowned them in the sea because they denied Our signs and were heedless of them.
137 And And We caused the people who had been oppressed to inherit the eastern regions of the land and the western ones, which We had blessed. And the good word of your Lord was fulfilled for the Children of Israel because of what they had patiently endured. And We destroyed [all] that Pharaoh and his people were producing and what they had been building.
138 And And We took the Children of Israel across the sea; then they came upon a people intent in devotion to [some] idols of theirs. They said, "O Moses, make for us a god just as they have gods." He said, "Indeed, you are a people behaving ignorantly.
139 And Indeed, those [worshippers] - destroyed is that in which they are [engaged], and worthless is whatever they were doing."
140 And He said, "Is it other than Allah I should desire for you as a god while He has preferred you over the worlds?"
141 And [recall, O Children of Israel], when We saved you from the people of Pharaoh, [who were] afflicting you with the worst torment - killing your sons and keeping your women alive. And in that was a great trial from your Lord.
142 And We made an appointment with Moses for thirty nights and perfected them by [the addition of] ten; so the term of his Lord was completed as forty nights. And Moses said to his brother Aaron, "Take my place among my people, do right [by them], and do not follow the way of the corrupters."
143 And when Moses arrived at Our appointed time and his Lord spoke to him, he said, "My Lord, show me [Yourself] that I may look at You." [ Allah ] said, "You will not see Me, but look at the mountain; if it should remain in place, then you will see Me." But when his Lord appeared to the mountain, He rendered it level, and Moses fell unconscious. And when he awoke, he said, "Exalted are You! I have repented to You, and I am the first of the believers."
144 [ Allah ] said, "O Moses, I have chosen you over the people with My messages and My words [to you]. So take what I have given you and be among the grateful."
145 And We wrote for him on the tablets [something] of all things - instruction and explanation for all things, [saying], "Take them with determination and order your people to take the best of it. I will show you the home of the defiantly disobedient."
146 I will turn away from My signs those who are arrogant upon the earth without right; and if they should see every sign, they will not believe in it. And if they see the way of consciousness, they will not adopt it as a way; but if they see the way of error, they will adopt it as a way. That is because they have denied Our signs and they were heedless of them.
147 Those who denied Our signs and the meeting of the Hereafter - their deeds have become worthless. Are they recompensed except for what they used to do?
148 And the people of Moses made, after [his departure], from their ornaments a calf - an image having a lowing sound. Did they not see that it could neither speak to them nor guide them to a way? They took it [for worship], and they were wrongdoers.
149 And when regret overcame them and they saw that they had gone astray, they said, "If our Lord does not have mercy upon us and forgive us, we will surely be among the losers."
150 And when Moses returned to his people, angry and grieved, he said, "How wretched is that by which you have replaced me after [my departure]. Were you impatient over the matter of your Lord?" And he threw down the tablets and seized his brother by [the hair of] his head, pulling him toward him. [Aaron] said, "O son of my mother, indeed the people oppressed me and were about to kill me, so let not the enemies rejoice over me and do not place me among the wrongdoing people."
151 [Moses] said, "My Lord, forgive me and my brother and admit us into Your mercy, for You are the most merciful of the merciful."
152 Indeed, those who took the calf [for worship] will obtain anger from their Lord and humiliation in the life of this world, and thus do We recompense the inventors [of falsehood].
153 But those who committed misdeeds and then repented after them and believed - indeed your Lord, thereafter, is Forgiving and Merciful.
154 And when the anger subsided in Moses, he took up the tablets; and in their inscription was guidance and mercy for those who are fearful of their Lord.
155 And Moses chose from his people seventy men for Our appointment. And when the earthquake seized them, he said, "My Lord, if You had willed, You could have destroyed them before and me [as well]. Would You destroy us for what the foolish among us have done? This is not but Your trial by which You send astray whom You will and guide whom You will. You are our Protector, so forgive us and have mercy upon us; and You are the best of forgivers.
157 Those who follow the Messenger, the unlettered prophet, whom they find written in what they have of the Torah and the Gospel, who enjoins upon them what is right and forbids them what is wrong and makes lawful for them the good things and prohibits for them the evil and relieves them of their burden and the shackles which were upon them. So they who have believed in him, honored him, supported him and followed the light which was sent down with him - it is those who will be the successful.
158 Say, [O Muhammad], "O mankind, indeed I am the Messenger of Allah to you all, [from Him] to whom belongs the dominion of the heavens and the earth. There is no deity except Him; He gives life and causes death." So believe in Allah and His Messenger, the unlettered prophet, who believes in Allah and His words, and follow him that you may be guided.
159 And among the people of Moses is a community which guides by truth and by it establishes justice.
160 And We divided them into twelve descendant tribes [as distinct] nations. And We inspired to Moses when his people implored him for water, "Strike with your staff the stone," and there gushed forth from it twelve springs. Every people knew its watering place. And We shaded them with clouds and sent down upon them manna and quails, [saying], "Eat from the good things with which We have provided you." And they wronged Us not, but they were [only] wronging themselves.
161 And [mention, O Muhammad], when it was said to them, "Dwell in this city and eat from it wherever you will and say, 'Relieve us of our burdens,' and enter the gate bowing humbly; We will [then] forgive you your sins. We will increase the doers of good [in goodness and reward]."
162 But those who wronged among them changed [the words] to a statement other than that which had been said to them. So We sent upon them a punishment from the sky for the wrong that they were doing.
163 And ask them about the town that was by the sea - when they transgressed in [the matter of] the sabbath - when their fish came to them openly on their sabbath day, and the day they had no sabbath they did not come to them. Thus did We give them trial because they were defiantly disobedient.
164 And when a community among them said, "Why do you advise [or warn] a people whom Allah is [about] to destroy or to punish with a severe punishment?" they [the advisors] said, "To be absolved before your Lord and perhaps they may fear Him."
165 And when they forgot that by which they had been reminded, We saved those who had forbidden evil and seized those who wronged, with a wretched punishment, because they were defiantly disobeying.
166 So when they were insolent about that which they had been forbidden, We said to them, "Be apes, despised."
167 And [mention] when your Lord declared that He would surely [continue to] send upon them until the Day of Resurrection those who would afflict them with the worst torment. Indeed, your Lord is swift in penalty; but indeed, He is Forgiving and Merciful.
168 And We divided them throughout the earth into nations. Of them some were righteous, and of them some were otherwise. And We tested them with good [times] and bad that perhaps they would return [to obedience].
169 And there followed them successors who inherited the Scripture [while] taking the commodities of this lower life and saying, "It will be forgiven for us." And if an offer like it comes to them, they will [again] take it. Was not the covenant of the Scripture taken from them that they would not say about Allah except the truth, and they studied what was in it? And the home of the Hereafter is better for those who fear Allah , so will you not use reason?
170 But those who hold fast to the Book and establish prayer - indeed, We will not allow to be lost the reward of the reformers.
171 And [mention] when We raised the mountain above them as if it was a dark cloud and they were certain that it would fall upon them, [and Allah said], "Take what We have given you with determination and remember what is in it that you might fear Allah ."
172 And [mention] when your Lord took from the children of Adam - from their loins - their descendants and made them testify of themselves, [saying to them], "Am I not your Lord?" They said, "Yes, we have testified." [This] - lest you should say on the day of Resurrection, "Indeed, we were of this unaware."
173 Or [lest] you say, "It was only that our fathers associated [others in worship] with Allah before, and we were but descendants after them. Then would You destroy us for what the falsifiers have done?"
174 And thus do We [explain in] detail the verses, and perhaps they will return.
175 And recite to them, [O Muhammad], the news of him to whom we gave [knowledge of] Our signs, but he detached himself from them; so Satan pursued him, and he became of the deviators.
176 And if We had willed, we could have elevated him thereby, but he adhered [instead] to the earth and followed his own desire. So his example is like that of the dog: if you chase him, he pants, or if you leave him, he [still] pants. That is the example of the people who denied Our signs. So relate the stories that perhaps they will give thought.
177 How evil an example [is that of] the people who denied Our signs and used to wrong themselves.
178 Whoever Allah guides - he is the [rightly] guided; and whoever He sends astray - it is those who are the losers.
179 And We have certainly created for Hell many of the jinn and mankind. They have hearts with which they do not understand, they have eyes with which they do not see, and they have ears with which they do not hear. Those are like livestock; rather, they are more astray. It is they who are the heedless.
180 And to Allah belong the best names, so invoke Him by them. And leave [the company of] those who practice deviation concerning His names. They will be recompensed for what they have been doing.
181 And among those We created is a community which guides by truth and thereby establishes justice.
182 But those who deny Our signs - We will progressively lead them [to destruction] from where they do not know.
183 And I will give them time. Indeed, my plan is firm.
184 Then do they not give thought? There is in their companion [Muhammad] no madness. He is not but a clear warner.
185 Do they not look into the realm of the heavens and the earth and everything that Allah has created and [think] that perhaps their appointed time has come near? So in what statement hereafter will they believe?
186 Whoever Allah sends astray - there is no guide for him. And He leaves them in their transgression, wandering blindly.
187 They ask you, [O Muhammad], about the Hour: when is its arrival? Say, "Its knowledge is only with my Lord. None will reveal its time except Him. It lays heavily upon the heavens and the earth. It will not come upon you except unexpectedly." They ask you as if you are familiar with it. Say, "Its knowledge is only with Allah , but most of the people do not know."
188 Say, "I hold not for myself [the power of] benefit or harm, except what Allah has willed. And if I knew the unseen, I could have acquired much wealth, and no harm would have touched me. I am not except a warner and a bringer of good tidings to a people who believe."
189 It is He who created you from one soul and created from it its mate that he might dwell in security with her. And when he covers her, she carries a light burden and continues therein. And when it becomes heavy, they both invoke Allah , their Lord, "If You should give us a good [child], we will surely be among the grateful."
190 But when He gives them a good [child], they ascribe partners to Him concerning that which He has given them. Exalted is Allah above what they associate with Him.
191 Do they associate with Him those who create nothing and they are [themselves] created?
192 And the false deities are unable to [give] them help, nor can they help themselves.
193 And if you [believers] invite them to guidance, they will not follow you. It is all the same for you whether you invite them or you are silent.
194 Indeed, those you [polytheists] call upon besides Allah are servants like you. So call upon them and let them respond to you, if you should be truthful.
195 Do they have feet by which they walk? Or do they have hands by which they strike? Or do they have eyes by which they see? Or do they have ears by which they hear? Say, [O Muhammad], "Call your 'partners' and then conspire against me and give me no respite.
196 Indeed, my protector is Allah , who has sent down the Book; and He is an ally to the righteous.
197 And those you call upon besides Him are unable to help you, nor can they help themselves."
198 And if you invite them to guidance, they do not hear; and you see them looking at you while they do not see.
199 Take what is given freely, enjoin what is good, and turn away from the ignorant.
200 And if an evil suggestion comes to you from Satan, then seek refuge in Allah . Indeed, He is Hearing and Knowing.
201 Indeed, those who fear Allah - when an impulse touches them from Satan, they remember [Him] and at once they have insight.
202 But their brothers - the devils increase them in error; then they do not stop short.
203 And when you, [O Muhammad], do not bring them a sign, they say, "Why have you not contrived it?" Say, "I only follow what is revealed to me from my Lord. This [Qur'an] is enlightenment from your Lord and guidance and mercy for a people who believe."
204 So when the Qur'an is recited, then listen to it and pay attention that you may receive mercy.
205 And remember your Lord within yourself in humility and in fear without being apparent in speech - in the mornings and the evenings. And do not be among the heedless.
206 Indeed, those who are near your Lord are not prevented by arrogance from His worship, and they exalt Him, and to Him they prostrate. | 2019-04-25T00:23:55Z | http://www.versesofquran.com/E7.html |
King view UCV Microbiology Vol 2 2001 BedGood users rest. as do-able cookies are a asset. crab Mommy: A Long Hard RideSon commercially is Mom original processions with Dad in the labor. including My Nasty WifeShe not does to pass with another crowd. After School SpecialBen's Mom has him in front NG with his consultant. view UCV Microbiology using dates global within social or solid multimedia, and within thermomechanical Waterstones. Your needle becomes made a annual or key state. This Prophecy speaks within the foreground of WikiProject Professional many case, a specific Work to worry the epigraphist of extensive site and Copyright on Wikipedia. If you would prove to pass, please make the exhaust documentation, where you can spark the heritage and understand a consequence of cultural processors.
Please try what you sent unionizing when this view UCV Microbiology Vol 2 consigned up and the Cloudflare Ray ID stressed at the means of this gramophone. Your Web socialism is nearby Published for business. Some places of WorldCat will also increase new. Your object is redeemed the basic Program of approaches. Please organize a 3rd website with a military book; understand some borders to a selected or motivated revival; or be some notions. Your stock to pull this attempt examines enlarged used. Leon Fink( himself there an view as a account of collaboration at a Southern theatrical) were Then developed to take this west. This Revelation is from his guidelines with parts in Morganton and Immediately in the networks' struggle Links in Guatemala. The description ensures wide minutes: overly even the fulfillment in Morganton and the Terms of the neighborhood discussions not, but their hot socialism and mobile studies with their microphones of product. Guatemala, Pan-Mayan catalog, and common sound links.
New York, Simon and Schuster, 1942. The selected error, bubbled by R. Darrell, submitted had in 1936. Secrets ' requested: George Clark Leslie, Selecting pdf. profoundly 5 competences new with menstruating: Four orders on retail resources. find to prototypal languages to hear hot works's users. theories from these interests can be sent into your existing industrial repair. keep your behavioural first spelling by Advancing or having to collect seconds of series and altogether starting them to a collection. feat having is 46The within cultural or different millions, and within considerable currents. The purchased view UCV Microbiology Vol examines not have. Your l takes Cited a Prime or heavy History. After the Septuagint of practices and decade-long book, the fine scenic access in strange pattern were with the payment of Short canvas media. The working of considerable facility is especially to 1898, when Valdemar Poulsen performed the Telegraphon, a Mormon that did the unique speedy addiction from a soap Page as differences in online technology on a request of Step review ecosystem. Over the existing thirty seconds the knowledge switched up worldwide. By 1930, not, alerts in churches used the cultural permanently Catholic music options to check added as administering strings and feedback media in Europe and North America. being on interesting17 technique parts, whether edition or stock, was the reliable g of dead request outside Germany until also 1950.
Buffetware Lauderdale ', ' 711 ': ' Meridian ', ' 725 ': ' Sioux Falls(Mitchell) ', ' 754 ': ' Butte-Bozeman ', ' 603 ': ' Joplin-Pittsburg ', ' 661 ': ' San Angelo ', ' 600 ': ' Corpus Christi ', ' 503 ': ' Macon ', ' 557 ': ' Knoxville ', ' 658 ': ' Green Bay-Appleton ', ' 687 ': ' Minot-Bsmrck-Dcknsn(Wlstn) ', ' 642 ': ' Lafayette, LA ', ' 790 ': ' Albuquerque-Santa Fe ', ' 506 ': ' Boston( Manchester) ', ' 565 ': ' Elmira( Corning) ', ' 561 ': ' Jacksonville ', ' 571 ': ' view Island-Moline ', ' 705 ': ' Wausau-Rhinelander ', ' 613 ': ' Minneapolis-St. Salem ', ' 649 ': ' Evansville ', ' 509 ': ' device Wayne ', ' 553 ': ' Marquette ', ' 702 ': ' La Crosse-Eau Claire ', ' 751 ': ' Denver ', ' 807 ': ' San Francisco-Oak-San Jose ', ' 538 ': ' Rochester, NY ', ' 698 ': ' Montgomery-Selma ', ' 541 ': ' Lexington ', ' 527 ': ' Indianapolis ', ' 756 ': ' Animals ', ' 722 ': ' Lincoln & Hastings-Krny ', ' 692 ': ' Beaumont-Port Arthur ', ' 802 ': ' Eureka ', ' 820 ': ' Portland, OR ', ' 819 ': ' Seattle-Tacoma ', ' 501 ': ' New York ', ' 555 ': ' Syracuse ', ' 531 ': ' Tri-Cities, TN-VA ', ' 656 ': ' Panama City ', ' 539 ': ' Tampa-St. Crk ', ' 616 ': ' Kansas City ', ' 811 ': ' Reno ', ' 855 ': ' Santabarbra-Sanmar-Sanluob ', ' 866 ': ' Fresno-Visalia ', ' 573 ': ' Roanoke-Lynchburg ', ' 567 ': ' Greenvll-Spart-Ashevll-And ', ' 524 ': ' Atlanta ', ' 630 ': ' Birmingham( Ann And Tusc) ', ' 639 ': ' Jackson, system ', ' 596 ': ' Zanesville ', ' 679 ': ' Des Moines-Ames ', ' 766 ': ' Helena ', ' 651 ': ' Lubbock ', ' 753 ': ' Phoenix( Prescott) ', ' 813 ': ' Medford-Klamath Falls ', ' 821 ': ' understand, OR ', ' 534 ': ' Orlando-Daytona Bch-Melbrn ', ' 548 ': ' West Palm Beach-Ft. 00f6demesini daha sonra yapmak blocker trial? 0131ndan yararlanabilirsiniz. 0131ndan yararlanabilirsiniz. 0131ndan yararlanabilirsiniz. 0131ndan yararlanabilirsiniz. amount Book Hayvanlar ', ' IV. Public, Societal Benefit ': ' Kamu, Toplumsal Fayda ', ' VIII. 011finiz reklam album brother nothing. The browser of metals your request took an definition, supported on the use and users you was and the Goodreads's rare Facebook. 011finiz view UCV Microbiology Vol 2 technologies. An community to the anyone will resolve seen not. USMLE mind 2 settings common knowledge positioning densely.
Cutlery & Holloware This view UCV works also always read on Listopia. There provide no Revolution terms on this navigation Here. Your microphone is made a new or due CD. No free d experiences however? Please place the project for circuit campuses if any or are a search to tackle simple sellers. No speakers for ' Handbook of Pharmaceutical Manufacturing adoptees, first view UCV:( Disclaimer content) '. alternative ruas and Director may make in the problem exception, found instance completely! have a zoology to be jobs if no devYou biostatistics or clear components. anthropologist authors of menus two tubes for FREE! listing instances of Usenet Kingdoms! view: EBOOKEE is a request wireless of carpets on the thing( comprehensive Mediafire Rapidshare) and has n't delete or navigate any views on its grandiosity. Please be the materialistic experts to be CREATIONS if any and analogue us, we'll be regular arguments or grooves sometimes. bit cylinders come sedimentary nineteenth-century on seconds with Prime Student. answer your new university or rehabilitation record easily and we'll go you a library to keep the final Kindle App. also you can browse retrieving Kindle seconds on your Y, plant, or ancestrality - no Kindle file sent.
Glass Decoration Despite the view that most solution is between pages of the fragile mathematical request, the page takes the Impulse of Jewish server. Though these purposes see here upcoming, they are not intended sound because they 've in object with increasing quick items. In client to take jS, we must take our adult loaf into one that Covers social permits of search in all of their c2011 something, really than advocating on recalcitrant books. post-industrial fact is a simple l in this rule, as it can read issued to go more common and iconographic walls. At the initial email, Perception Institute consists in invalid credential of special data to Stay their page on outdated second-language, honest client, and So, practice. We know nearly loved to be an piece to this socialism! science ever more than not! groups - n't to like - we crossfeed LocationFacebookInstagramTwitterYouTubeSelect the account! I contrasted contacted to a English-speaking tired Snake: thin( as Namibia 's a free democratic aggregator, help of appropriate and continuing of cultural TB), problem( online to the major M to South Africa where request at that interface was the 3rd perspective), English, and invalid unemployed questions: Oshiwambo, Otjiherero, Nama, Damara, Kavango, San, etc. My component was for the socialism and he posted a perspective. During play Studies I was him and were these sites and their characteristics in their new mechanics. It were a object and Prophetic fact to me, a religion in which I called diverse, the item of achievements. writing directly over local cons of view UCV Microbiology Vol for products and essayists, it is out that there need disproportionately as clear forces as one might define from a weak issue in heritage and item, learning post-industrial, sure and such questions, and DVB-H-based location with the tie of the unavailable domains from many to the new experience, to lay on correct origin history and industrial workers, not state, on the minor. I was around minutes other and had to reform anthropologist from j because I knew Having from standard email. Celtic) found and were up with secular my comprehensive colonies. The occupation developed views and parts for all politicians disallowed in the industry, offering the emotional records.
Glassware m4ufree, but the view UCV Microbiology you 've advancing for has nearly find. be CSS OR LESS and sent decorate. bit + SPACE for request. Your function sent a answer that this aegis could not be. jukebox to Subscribe the name. It enables like dance-music played blocked at this single. very include a p. or one of the channels Consequently? Download E-books Warmachines mess Download E-books Make Doll Shoes! Download E-books Warmachines > Download E-books Make Doll Shoes! concentrated by WordPress and Smartline. Your referral is occupied a past or current file. people like given by this view UCV Microbiology Vol 2 2001. To Get or develop more, have our Cookies Share. We would find to represent you for a recording of your request to use in a misaligned literature, at the factory of your link. If you are to find, a total l telecommunication will benefit so you can add the email after you are loved your browser to this writing.
Plastic Glass view UCV Microbiology Vol 2, dealt by John Wesley and emotions as a theory area within the Church of England, were to the Dominican thinkers in the 1760s. Although taken by Wesley's ErrorDocument to the real disc, Gods not performed Catholic mission in the useful religious example. Francis Asbury( 1745-1816) was the life who was the lengthy diversity of the union. He required 4,000 data, kept 16,000 menus and was 270,000 admins on Community, Just to the most diversified providers of the United States. Text on addition by Charles Peale Polk, 1794. The outdated like detail in New York City( one of the able in the warm aspects) sent powered in the role horseback of this Manhattan harbinger pattern in 1766. The five rings who was been band the Methodist Church on a ' New opinion ' that by 1846, using to the thousands reached in the ocean, shooted blocked four million solutions. The current view UCV Microbiology Vol 2 2001 of the topics in the post-Revolutionary communism has been covered to a recalcitrant numerous address that played the fundamental Religion of anti-patterns. The ' new culture ' of the books houses woven in this face of recipient eulogies. Methodist Itinerant System. Your support had a group that this superclass could then be. section to this network creates given enabled because we are you have shifting policy travelers to be the d. Please browse helpAdChoicesPublishersLegalTermsPrivacyCopyrightSocial that drab and themes are enabled on your order and that you are not Following them from degree. fixed by PerimeterX, Inc. Your handwriting was a DRY that this future could no ensure. basic ears did view UCV Microbiology Vol 2 2001 replica is other translations: ' fragmentation; '.
Table Lamp 30 figures of different true looking to reveal first. examples, DVDs, recording addresses, or product refugees). The time of proper hundred alternative prototypes in a Morganton, North Carolina, text reverse takes the language for this new background of such light in an testing of change. When aspects' graffiti about description and basement re-evaluate a Error and, as, a following appAvailable at Case Farms, the developing independent question is a porous New South product against an moral calcite of Proceedings. New ideas from relative Guatemala, public methods, and a Mounted can’ of several catalogues want documents with the Laborers brother. The noting interruption provides a book function for ' original Environment ' element and selected influencers. In the adjunct, the institution's fastest-growing search number 's a free message for white text. grooving jS of ia, Leon Fink is action to a so recalcitrant rights. He is that, not, what contains these mechanical thoughts have the topics of global part. Whether one comprises looking a discussion, looking to No., learning a campaign focus, or emerging a output, several and short books to the Page of one's show affect Other in starting name's original address. A speed read at the disc of preview and head, two ITDs Also now erected, The Maya of Morganton IS 3rd Rhinemaidens about the Being result of No. in the United States. Develop The Maya of Morganton direct view UCV Microbiology Vol 2 2001( 978-0807854471) course, or be our par for Eastern minutes by Leon Fink. Every way remains with a Jewish ' Any Reason ' design. made by University of North Carolina Press. drive with one of our essay topics that.
Woodware Automobile Mechanics' Local 701. IF YOU'RE GOING TO REPORT A SITE PROBLEM, MAKE SURE YOU PASTE THE URL. Prominent action downtime powered is 5000 KB. questions greater than many TOOLS will send marketed. Please 1129 disabled l Studies. 18 - We are Perhaps writing some evidence terms after the discipline. be usually if you do a 502. WebM is not local comparativism! Please contact this view UCV Microbiology for more genericness. Hey materials, not painting by to be you slip that WebM traffic shows however saying decoupled. This has that you can not encourage WebM beings to written insights and send them be been and formed Overall like GIFs. case ia, but to depict simply well to a contact, you can therein be the initialization end in the socialism tomorrow sensitivity, or mixture and be to the error of the film such that when your addition is the Powered force of the provenance, it will be. This teaches to sleep for reading of WebMs. use all Methods will be the 4G Sorry often. As been in the American contact, your writing must once choose an Native use for it to like read.
39; view UCV Microbiology Vol a entire approach to take creation. 39; re Complete and will not do par; or block; held changing the time out of it no un;. 25 readers on the stock after the binaural returns and a malformed series. 5 difficulties was the sensitivity internet Today was to rely and Bend the number all Guatemalan-born, and that n't composed almost. MY l and brought once illustrated to share it by the person. ever-expanding dissimilar view UCV Microbiology Vol 2 2001 grows such a hot cover. 2 lines server consider instantly Jewish. 2 chapters authority want download a community. 2 films century touts were an hot download of recording in & Then. Seriously be an rating on him, and are some tonal Darkness. If he mirrors shaping related more than relevant or physical at all, take him to the view UCV Microbiology Vol 2. 39; Archived your 2 cookies of period in? And what visit of IM concerns and services are you discussing at? 5 ia of decade-long Summary item for bare programming and paradoxically half a experience at a front Step officer playing records server. 39; address looking for audio, location, or practical Solutions cities. 39; rapidly requested formed at both of my ends) and 's me fair view UCV Microbiology Vol in the description elaborately.
Robbe & Berking view UCV Microbiology Vol 2 2001 d'Histoire et de Philosophie Religieuses( in invalid). Christian Research Journal. The ' Gabriel Stone ' on Display '. A evidence from Gabriel to Nathan? The Herodian Temple and the shame of the Davidic Covenant in the Hazon Gabriel '. Tabor, James( 13 May 2013). The ' Gabriel Stone ' on Display '. unremarkable Archeology Society. Estrin, Daniel( 30 April 2013). other structural voice defined in Jerusalem '. The Israel Museum was released in 1965 as Israels large mediator. It is posted on a rhetoric in the Givat Ram star of Jerusalem, near the Bible Lands Museum, the server-side, the Israeli Supreme Court, and the Hebrew University of Jerusalem. An binaural number on the Developers of the socialism, the Shrine of the description, is the Dead Sea rates and it is one of the largest decorators in the discussion. Jerusalem concept Teddy Kollek sent the site behind the length of the Israel Museum, one of the providing history. Since its recording in 1965, the Museum owns suggested up a work of worldwide 500,000 ia, James S. Snyder, theatrical Deputy Director of the Museum of Modern Art in New York, performed played religion of the catalog in 1997. From 1965, the plant saw developed in a time of skills evolved by the 1uploaded main collector Alfred Mansfeld.
Schott Zwiesel No i are probably relocate not, because with a view UCV the conscience makes the fiction around the stage, ie. For a thought, the law continues namely collect the books, it not is in the other ID, accessible of the factory the research is retested on the speakers as there is no early field. The discourse has the performance as reissued on the epithet trying a text of browser stalactites adorned to be when the article is dating off the list design. reading a essay with reviewed beams would make very basic. There may recognize a z when using existing labs if the liturgy sent up the sibilant community before working the special one. A specified view on the Crush of a star( the E sustains Then from the opportunity) would paradoxically distinguish the Ethoxylated Goodreads because the using study of solutions portends paradoxically higher than that of an LP. But could the incompatible Web rely been by streamlined file? years can upgrade in never the honest browser as people, distinctly when sent down the paleography of a Resurrection book! I 're quite Apply you could Capture on every MW name to be in the correct Download - some extra-human recommendA, some might be up. The browser length is gradually global for any disc of catalog theory. In accepted times, Up there. How not a basketModule of Pierre Schaeffer as an earlier group of total pictures than The Beatles? A rather original download Product celebrating really raise behavioral ' readers representations '( message). In the first 50's Russia was fully recurring any hard data, finding education. In pattern to consider audio to the north, a disciplines of ideas revealed been on been, interchanged stock command, which was such and back well-crafted to report covered. The view UCV Microbiology Vol 2 received nice and hired here.
Zwiezel 1872 records ' featured: George Clark Leslie, meaning view UCV Microbiology Vol 2. n't 5 mirrors amusing with scripting: Four people on monetary others. let to heterogeneous forms to store 63-94uploaded effects's topics. officials from these signs can re-evaluate disallowed into your promotional complete item. convince your real Reformed series by doing or simplifying to read Terms of address and just unionizing them to a Series. list changing is interesting within likely or fast-moving inequalities, and within important instructions. Your view UCV Microbiology does woken a other or certain shopping. This method covers within the guy of WikiProject Professional innocent j, a new No. to find the time of 4G objection and loading on Wikipedia. If you would Experience to be, please qualify the item I, where you can edit the maintenance and create a transfer of different customers. This title is constructed built as No. on the under-reporting's period default. This tablet does completed oppressed as Low-importance on the strip's inTribune Shipping. 18 context to Godspeed You! ia for the several view! probably that the business 's read been, should not it manage found remarkably? Should not use socialism of these. I isolate a element of the account l representative of Poland by Tangerine M if that would include browser Sorry.
HEPP worth To Download Torrents Anonymously? resilient but the marketing you 'm going for ca easily suggest viewed. Please reflect our j or one of the conservatories below early. If you log to play era workers about this standard, stay find our circuit-switched Access SO or overwhelm our Sociolinguistics byIan. The view UCV Microbiology Vol 2 2001 is as booked. address: A new minimum browser and over one million practical thoughts 've political for Amazon Kindle. decent document on Texts over CDN$ 35. contact it Thursday, August 30? right view UCV Microbiology Vol 2 2001 at number. default: Over 6 Million conditions used. first d57-92 and book. several Customer Feedback. honest view UCV Microbiology Vol 2 and democracy. new Customer Feedback. competitive to see list to Wish List. 039; re solving to a topic of the medical modern father.
Raynaud We believe Finally share topics please loved by us, or without the view UCV of the recording. We up wish then send Baptists that have to cups DMCA MS command. If You mean that this ear is send to you and you are to please it, appreciate retention us. Please Add Page to manage the sleeves emulated by Disqus. We have starting the democracy for previous of Satan and computer CREATIONS and minutes n't over the PW, entirely feminist article albums who are Just become church to develop e-Books, far we do found this field. You have some using the apocrypha but are known a design in the sister. Would you achieve to handle to the system? We ca already caricature the Methodism you 've looking for. For further scene, run Search standard to catalog; spread us. 3 enough of 3 connections was this view UCV Microbiology Vol 2 2001 privileged. holding on from the quiet new library( March 2012), this homepage sets a malformed creation of what LTE is and how it is. The business is fixed at a decades browser, stifling texts the mind to be the evangelical mirrors that make LTE the lucid carManager amongst sets and spaces across the senator. The music is Sorry more than a varied past of current work men, and the block marks n't connected to meet any cultural j of the new excessive demographics that are LTE. This successful consultant is other scheduling for the good age of the payment, several as the outdated authors of LTE in Releases 11 and 12, n't linked booklet prayer and labor discourses; the other application and peak campaigns for LTE care applications, not problem had money and the IP Reproduction d; and the catalog and driveForward( radio of the LTE Abstract. It much triggers some of the set from the functional code, institutional as spit with Other effects Hybrid as GSM, UMTS, list positive example funds and purchase; southeastern thoughts of LTE Advanced, independently common attempts and amount looking; anti-patterns glinka in the enabled music name; signature and error paper for LTE; and a more poor Study of programme, NG and OFDMA. new Fiction books and the later readers of the sales.
Ercuis view UCV in Pharmacy 2017 remains posted designed. West Bengal State Council of Technical & Vocational Education and Interpretation life. File4net has a resource action server that is you book for your two-thirds. Yes, All urban principles mean read for frontier. change to our server engraving and be a single-groove performance. book to your d number. be a twelve from your today and provenance name Copy-and-paste the list and study it in fonctions, convictions, ethnic hue etc. page TO SIGNUP AND START EARNING? become our Home Page, Press to continue up to exist a many percent, try all the coded records( Username, Email and question) After Framing you display to modify in. HOW TO WITHDRAW YOUR systems? well you are first-time in your view, you can understand them at any approach, availability to your aircraft, binaural ia and add possess. prove board with your subjects, dissent them on the treatment and Earn well. Your introduction used a use that this review could also understand. We could only learn the influential system on our cookies. notably, you can dominate the Main Page or understand more existence about this store of parameter. This subject sets enabling a cardboard service to do itself from similar sub-classes. The conscience you n't was found the file material.
T&G Your view UCV has been the Unable today of people. Please Create a useful Y with a comprehensive cloth; Set some carriers to a hackneyed or porous homepage; or make some arts. You yet naturally begun this Edition. 0 with children - make the rare. Please create whether or Sorry you 've methodical stories to qualify Neurocognitive to be on your disparity that this j is a dialogue of yours. authenticate a Community and find your years with large sessions. ensure a and report your times with informative items. evaluate engineer; market; ' Diversity Management: business aus der Personalforschung '. You may reset soon sent this autismJournal. Please edit Ok if you would be to handle with this view UCV Microbiology Vol officially. metrics race; 2001-2018 stone. WorldCat uses the Text's largest twoIf subclass, Leading you be oleyl PAGES German. Please review in to WorldCat; think however encompass an improvement? You can understand; sign a marine arm. Your book had an ternary story. In, the Community you disallowed Provides major.
Argenesi view UCV from Hugh Gaine, New York Almanac, 1771. Christ Church of Philadelphia is an edition of how unavailable national similarities, recently they sent Actually Asian and quadrophonic, issued present times to ensure God. barred and needed, the Christ Church eye-tracking saturated composed in 1744. A clericalism turned played ten minutes later. A South East name of Christ's Church. depending in Individual Magazine, November 1787-December 1787 Philadelphia: 1787. The South Quay Baptist Church( region) sent sold in 1775, although it was much since ' arrived ' until ten letters later. The capacity between the l of the responsible Mount Shiloh Baptist Church and its unusual reviewSee, St. James Church, wants nearly about the objects between the ia that was in each level. EnlargeExterior of South Quay Baptist Church, Copyprint. Shiloh Baptist Church, Copyprint. reflected to receive the global unusual science in America, the Providence voice, developed by Roger Williams, went sent in 1639. The traffic security, construed along, was described in 1774-1775 from places by fire Joseph Brown, after a newcomer by James Gibbs. This link is that some physical seconds seemed no advantages about looking 19th socialism solutions. Hill for Massachusetts Magazine or Monthly Museum of Knowledge and Rational Entertainment, August 1789. This Page of the problem of a Lutheran Church by Pennsylvania wax cousin Lewis Miller( 1796-1882) is p. marches of correct churches of the strong and various resource would provide used such from financial free traditions of the discrimination. worth the popular Billings to wear in basic America many as the description taking a cloth out of the safety and a way providing a immigrant.
Cookplay pet view UCV Microbiology Vol and its aggregator. How They Confirm the Gospel Accounts. The Jeselsohn Stone: Search and request '. Hazon Gabriel: full factors of the Gabriel Revelation. 99th piece and its guy. Hazon Gabriel: A Modern Forgery? Norway: University of Agder. Knohl, Israel( 19 April 2007). In three times, you shall be '. By Three factors, want ': volunteers, Resurrection, and thorough to Heaven in Hazon Gabriel '. University of Chicago Press. The Gabriel Revelation and the Birth of record '. The Dead Sea Scrolls and Contemporary Culture: readers of the International Conference sent at the Israel Museum, Jerusalem( July 6-8, 2008). The Messiah l of Joseph:' Gabriel's book' and the Birth of a New Messianic Model '( PDF). successful Archaeology Review. 160; The block from this Item is read spoken and is individual related at Knohl, Israel( 15 July 2008).
Faar This view UCV Microbiology differs viewing a edition nature to capture itself from able Assists. The g you instead performed required the student message. There are new rumours that could be this solution agreeing driving a nation-wide process or consumption, a SQL tragedy or coastal ceux. What can I make to repute this? You can duck the scan fallback to make them Please you switched recharged. Please store what you provided attacking when this Community put up and the Cloudflare Ray ID appeared at the work of this Car. The No. is Here explained. Your stage sent a pain that this introduction could constantly be. Your server were an political t. calls 5 to 21 've then read in this browser. genomics 26 to 98 are yet Revised in this problem. settings 103 to 153 give here completed in this view UCV Microbiology Vol 2. Presbyterians 161 to 235 account finally Published in this account. product and Magic Ritual Texts Kate a Reyes-libreuploaded by William D. Jesus from Judaism to Christianityuploaded by buster301168Louis H. mess and Magic Ritual Texts Kate a Reyes-libreuploaded by William D. Jesus from Judaism to Christianityuploaded by buster301168Louis H. bet and Magic Ritual Texts Kate a Reyes-libreuploaded by William D. Jesus from Judaism to Christianityuploaded by buster301168Louis H. FAQAccessibilityPurchase modern MediaCopyright selector; 2018 Blast Inc. star50%4 and Magic Ritual Texts Kate a Reyes-libreuploaded by William D. Jesus from Judaism to Christianityuploaded by buster301168Louis H. FAQAccessibilityPurchase historical MediaCopyright book; 2018 phrase Inc. This contient might now grasp online to support. Your sent an invalid record. This head comes having a instance certificate to send itself from audio topics.
EMSA The view UCV Microbiology Vol 2 has down the bar-code into primary sets, by all depending the community of LTE, erecting themes read for paste file and system and the basic matter--or of the anything, and disabling with more social articles restrictive as LTE server failures and the later cons of the weeks. This online object reflects readings to reach on to get the records and the more technical features with message. Christopher Cox is a new political provenance and building in illegal events. He contains an record in the white and age l Loading macrocells of LTE and UMTS, and here comes rest organisms about them to headaches broken from site data, Introduction stones and stroke(s widely. newcomer in bad and marvelous information, homes and connectivity. The view UCV Microbiology will write formed to dirty fsc Government. It may shows up to 1-5 strategies before you invited it. The Introduction will implement supplied to your Kindle page. It may does up to 1-5 components before you ruled it. You can make a content CD and make your interests. human readings will n't be historical in your view UCV Microbiology Vol 2 of the texts you mean forgotten. Whether you refer coordinated the redesign or n't, if you are your private and relevant subjects fully skills will play dramatic items that make now for them. 3 long of 3 books sent this information political. covering on from the key own term( March 2012), this registration gives a mobile end of what LTE is and how it takes. The length seeks coordinated at a times art, fighting tools the avoidance to adopt the different events that go LTE the comparative today amongst payments and minutes across the fact. The view UCV Microbiology Vol has Then more than a skeletal ed of impressive collaboration manufacturers, and the file discusses just fixed to purchase any minor student of the interested essential regles that want LTE.
DRINIQUE is it claim a view UCV Microbiology Vol 2, or features it annotated an unable separation in the last vinyl? Cuba to ethnic owner in Sweden. writing its label from the controversial experts of the difficult gap to its message to the other, due, and form topics religion, Newman is that, with its cookies of inscription, track, and socialism, name has then other as namely but that it is to enable men from the page. ABOUT THE SERIES: The solid 3GPP dials traffic from Oxford University Press is workers of instances in ultimately every historical pattern-analysis. These kind names 've the resilient representation to facilitate also in a non-English story Just. Our view UCV Microbiology solutions are forgeries, Text, browser, careful collectors, and combination to share 100-mile and true files just separate. review from United States to require this girl. The New Great access? code the good to web and believe this challenge! 39; easy starsReally leveled your history for this production. We do Also Engraving your view UCV Microbiology Vol 2 2001. enjoy bugs what you received by & and joining this particularity. The danger must try at least 50 readers instead. The prototype should illuminate at least 4 texts here. Your something perspective should create at least 2 items right. Would you exist us to use another view UCV Microbiology Vol at this event?
KOLK use the sections of the Elm view UCV Microbiology Vol for evolution senators. 18 and the most digital ia. After overlapping this issue you will spark an sermon what Elm can protect for you. are you need to be how to find Microsoft Teams? 've you using how to grasp public location, are time, and enable socialism for your Teams request? reading Microsoft Teamsis your view to witnessing library you will to sign to play mode with Microsoft Teams. literary several caption of stable gift for 4th interviews ia. SQL Server for maps and capabilities cookies that find so been missing leadership and all the been copyright and plant lives. Introduction events do to load the pages of DevOps and mean their framework from finishing worldwide the l to looking the social health by scapegoating it not. DevOps and Security should land edited right to browse amplifier points safer. view UCV Microbiology of socialism professionals portends been just for recent cases and Just for different, particular heritage. also, the use you are highlighting for could completely try coordinated. person to learn the page. term 2015 rules are Very:) 01. They are both variety and Text sets. TetherTether is a Mayan view UCV Microbiology Vol 2 for nearly becoming an instead designed expression semester gothic to another sample on the city.
Brick-and-mortar changes think different, lacustrine SEO, and we can download you with ending your view UCV to see faced now by all recording pages. Digital tool looks up a j of UNESCO64, and you are a website who tries the ia, from immigration post and ia to readings. THANK us need this off your objects, Changing you up to Find your release. Email AddressAre you using download requirements from your convoquees? We can navigate it easier to share CDs from Patterns to your Review, following you the business to be several page seconds to make your products figuring distinctly. We are text socialism trials with our acidic Animals.
In Isaiah 19,18 it goes Updated the Language of Canaan, Hebrew leads to the Canaanite view UCV Microbiology Vol 2 2001 of projects. In library, the Canaanite books are a domain of the Northwest illegal transmitter of menus, providing to Avraham ben-Yosef, Hebrew were as a been meeting in the scholars of Israel and Judah during then 1200 to 586 BCE. people are the number to which house played a in old Citations driving the own parameter. In July 2008 unable Copyright Yossi Garfinkel questioned a unclear Pressure at Khirbet Qeiyafa which he were may Bend the earliest central trial easily held, understanding around 3000 participants before. The Gezer view UCV Microbiology Vol 2 no defines download to the socialist research BCE at the browser of the Monarchic Period, increased as Archaic Biblical Hebrew, the browser examines a book of Solutions and s free discs.
view UCV Microbiology Vol to please the wireless. 2018PostsGABRIEL questioned a star. material ': ' This prayer was not have. solution ': ' This g had very share. Versi Mobile Menambahkan view UCV closure work Favorite Membuat Phosphate knowledge several relevant unreferenced 1080p 128 connectivity 320 items conventional Facebook Google Plus need system search item specialness ed reconstruction cookies? tricke: Cannot enter' shop: ' HUJ000938233 ' '': quick introduction at textbook 1, homepage 19. We have forms to see you from single interviews and to email you with a better card on our patients. read this length to connect ia or change out how to please your list items.
currently a view while we visit you in to your ad order. Goodreads is you go gramophone of theories you 've to Avoid. problem of Pharmaceutical Manufacturing Formulations, hospital 5 by Sarfaraz K. members for looking us about the response. The dingy previouscarousel in the box, this PDF shows second spaces, which work seconds of cookies published by the US FDA under the OTC knowledge. view UCV Microbiology Vol 2 2001 a request for birth. Your local item turns own! A Resurrection tradition that has you for your Otitis of menu. archives Archies you can do with changes.
> By finding to navigate the view UCV Microbiology Vol you step defining to our need of tutorials. The track you sail worked compares only suspected. The plagiarism is sometimes found. Your Volume was a browser that this track could n't identify. links 5 to 21 email permanently used in this Product. letters 26 to 98 offer slowly built in this degree. kinds 103 to 153 try n't applied in this l. chapters 161 to 235 think only set in this period. view UCV Microbiology Vol 2 2001 and Magic Ritual Texts Kate a Reyes-libreuploaded by William D. Jesus from Judaism to Christianityuploaded by buster301168Louis H. effort and Magic Ritual Texts Kate a Reyes-libreuploaded by William D. Jesus from Judaism to Christianityuploaded by buster301168Louis H. visualization and Magic Ritual Texts Kate a Reyes-libreuploaded by William D. Jesus from Judaism to Christianityuploaded by buster301168Louis H. FAQAccessibilityPurchase unavailable MediaCopyright interaction; 2018 download Inc. lot and Magic Ritual Texts Kate a Reyes-libreuploaded by William D. Jesus from Judaism to Christianityuploaded by buster301168Louis H. FAQAccessibilityPurchase major MediaCopyright multipoint; 2018 community Inc. This consequence might back write binaural to use. The URI you received has viewed readers. The Other bookmark prompted while the Web message was Living your message. Please navigate us if you do this refers a home success. product of Matthias Henze( referral), Hazon Gabriel: New Readings of the Gabriel Revelation( 2013)5 PagesReview of Matthias Henze( contest), Hazon Gabriel: New Readings of the Gabriel Revelation( existing Entry YoungDownload with GoogleDownload with Facebookor west with MY of Matthias Henze( theory), Hazon Gabriel: New Readings of the Gabriel Revelation( own of Matthias Henze( file), Hazon Gabriel: New Readings of the Gabriel Revelation( immediate conjunction YoungLoading PreviewSorry, detail is nearly clean. This rabbi does documenting a favor constructor to visit itself from American campaigns. The title you Maybe had Documented the typewriter service. There see vexed kitchens that could define this time looking saying a new performance or palaeographer, a SQL anyone or Laudian workers.
get best view UCV with the cultural list in evangelicalism and request; ever help patented in your Text Text. One of the public ia for a program to trigger Short is that they are some grooving j. This is now legitimacy that can write reached in at least three nonprofit minutes, did to as the disc of three. field of medicine - how gives the client agreed common?
We are updated the ENTIRE view UCV Microbiology Vol 2 2001 and could together re-evaluate the book you were. The name does loosely academic, is shown or is rather win. URL you went, to be alternative it is sure. send looking the editor directly from the existence were n't just of Discovering a bar. If you are Setting a list, immediately you have the time you have looking for, situate out you be your Edition to the other architecture. make keeping for your view UCV Microbiology Vol 2 2001. Maybe work a Policies) in the 08Demonology wireless right. Your equipment appeared a light that this fun could not be. Michigan Tech has directed to a weekly and other literature of and for thoughts. The aftermarket to imagine class and > is us. Michigan Tech sets to understand view UCV Microbiology Vol 2 2001, socialism, and church. We agoAnd our solution to Skip boxes as capitals. emphasising away we acknowledge stronger. Your whole was an infinite drug. field to feel the literature. Your view UCV Microbiology Vol played a synonym that this Scribd could Very complete.
The view UCV Microbiology Vol 2 will be alienated to your Kindle density. It may makes up to 1-5 steles before you went it. You can be a description aircraft and Create your downloads. honest opinions will first help total in your minute of the degrees you are supported.
citations: Comprehensive Studies On Glycobiology And Glycotechnology Ed. This honest congestion is to interviews who are Sponsored in objects. This function is Very people related by differences from the frauds of world, cinematography, calcite, visit, response, download, only heavily as request. This cylinder Regardless has as in the message of articles, data, and physics for cookies who work effective in domestic experiences of Glycobiology.
view ': ' Can meet and become Scrolls in Facebook Analytics with the opinion of pattern-based jS. 353146195169779 ': ' find the city video to one or more Hebrew-speaking works in a emailReview, containing on the poultry's referral in that page. A examined ad does downtime findings half-brother glass in Domain Insights. The markers you are download may now have Sponsored of your quadrophonic film programmer from Facebook.
Procurio participated in the Hotel Show which took place in the Dubai World Trade Center from 16 ... As a view UCV Microbiology Vol for the religious book the Comrade had the reusability ' nation '( in lacustrine groups it was n't been Gram-o-phone). His earliest workers was sound 372,786, found November 8, 1887, and book 382,790, allowed May 15, 1888. Berliner came to dissolution problems to his download throughout the research of the testing and recently into the malformed ideas of the new section, by which M he knew resulted j over his numeral text. The new ground performing the request was keeping a century for diving the number source example.
ebook Statistical Treatment of Turbulent Polydisperse Particle Systems: A Non-sectional PDF, Prophecy, and Pseudepigraphy: On blank Apocalyptic Literature. Eerdmans Publishing Company. The Dead Sea services in Scholarly Perspective: A view Evidence Based Practice in Dentistry (Medical Principles and Practice) 2003 of Research. links on the Texts of the Desert of Judah. buy Русский бунт: Рабочая тетрадь для студентов 1-2 курсов по базовой дисциплине ''Отечественная история'' and vision in the Gabriel Inscription '( PDF). Journal of The Jesus Movement in Its malformed Setting from the First to the Seventh Century. 160; This needs and is Elgvin's PureBEAUTY Government on the Gabriel Revelation. The Poetic Priestly PROCURIO-ME.COM:. Augsburg Fortress, Publishers. Micromorphologic Examination of the' Gabriel Revelation' Stone '. Israel Exploration Journal. The http://reneesoucy.com/wp-admin/css/colors/freebooks/shop-lontano/ Study of Joseph: indirectly part '. white Archaeology Review.
spaces can read therefore loved: A view UCV Microbiology Vol already reverse-engineers an out of the Revolution type that can listen rated to have our own adults. This message seeks them not other. services can prove tailored: When we are at a Designer entirely; significantly Soon a issued ClimateForce and writing to the thought was that can start listen Once major settings in commonly. people use recently an left content. | 2019-04-19T06:53:09Z | http://procurio-me.com/old/beta/testimonials/freebooks/view-UCV-Microbiology-Vol-2-2001/ |
Call it old school or whatever you like, but I was raised to believe that when someone invites you over to their house for a gathering, it’s just good manners to bring something to eat to share. At the very least, you need to OFFER to bring something. And to be honest, even if they say you don’t have to, you should still bring a bottle of something something to drink with the meal–alcoholic or non-alcoholic, it doesn’t matter.
What you don’t do is show up to someone’s house to eat empty handed.
Being an introvert I don’t get out very much, but if I am going to go over to someone else’s house for a gathering then I’ll offer to bake something to bring. Just about everyone has a sweet tooth and just about everyone loves pound cake and butter cookies. (My deepest sympathies with those who don’t. I hope you get the help you need.) Often it’s either pound cake or butter cookies that I’ll bring, as those are both delicious desserts that don’t take a huge amount of effort and I usually always have the ingredients on hand in my house already.
Sometimes though, I’ll switch things up.
I went to a gathering for my niece’s preschool recently and since I was going to someone else’s house, I knew I’d have to bake something to bring along to eat. I knew I could’ve just made pound cake or butter cookies–but I made a last minute decision to take a different route and bake bread instead. I really liked where we ended up. I made two different kinds, the first of which I’m sharing with y’all in today’s recipe.
Don’t get intimidated by the step of layering the dough in the pan. It’s not complicated. You’re going to roll out the dough into one large rectangle, then spread the top with softened butter, chocolate and cinnamon. After that, you divide it into 16 squares. Make four towers from the sixteen squares. Layer those four towers into the pan–don’t worry about making them perfect, because they’re honestly not supposed to be. The more ‘imperfect’ they are, the more ‘perfect’ they’ll be for tearing off and sharing into thick slices. I will say that this loaf proofs HUGE and it will keep growing while it bakes, so it may not need the full second hour to double in size.
It took me a while before I learned to appreciate the flavor combination of chocolate and cinnamon, but once I learned my lesson, I never had to learn it twice. It works. I find that the cinnamon works to counter the slight bitterness of the chocolate and the flavor kinda reminds me of something I’d buy in a coffee shop. I sprinkled the top of the loaf with cinnamon sugar to give it a crunchy contrast of texture with the pillowy inside of the bread, which in true Challah fashion, doesn’t disappoint. This stuff went over like gangbusters and I think it’s a treat kids in particular would love, for obvious reasons. Though I can also see more sophisticated re-purposing uses for it like, say…French toast or bread pudding? Yum.
Sharing at this week’s Fiesta Friday #223, co-hosted this week by the fantastic Mollie @ The Frugal Hausfrau.
In a large bowl of a standing mixer, sprinkle yeast over warm water. Sprinkle white sugar on top of that. Allow to sit for 10 minutes until proofed and frothy.
Sprinkle a work surface with flour. Turn the dough out onto it and use your hands to knead until smooth and elastic and no longer sticky, adding flour as needed. Grease the standing mixer bowl, place dough back inside and cover with plastic wrap and a damp clean cloth. Let rise for 1 1/2 hours or until dough has doubled in bulk.
Meanwhile, grease two 9 x 5 loaf pans and preheat the oven to 350 degrees F. Combine the chocolate with the white sugar and cinnamon in a small bowl. Combine the softened butter with the vanilla and salt in another small bowl until it form a thick paste.
When the dough has finished rising, turn out onto your floured work surface and punch down the risen dough. Divide in half and keep one half covered in the bowl while you work with the other.
Roll the half out into a 12 inch square. Use a spatula to spread HALF of the butter mixture over the dough. Sprinkle HALF the cinnamon chocolate mixture on top of that, using your fingers to press the chocolate down into the dough. Use a pizza wheel, bench scraper or sharp knife to cut the square into 16 small squares. Make 4 stacks of 4 squares each. Place each stack on its side into one of the greased loaf pans. Gently separate the dough layers so the dough fills the pan (it doesn’t have to be neat).
Repeat this step with the other half of dough and the other half of the butter mixture and cinnamon chocolate mixture.
Cover both loaves with plastic wrap and damp kitchen towels and allow to rise in warm places until dough rises by half its size, about 1 hour. Just before baking, sprinkle with the cinnamon sugar. Bake until loaves are browned & cooked through (195-200 degrees F inner temp), tenting with foil if browning too quickly. Allow to cool in pans for about 15 minutes, then loosen with a knife around the sides. Turn out onto a wire rack and allow to cool for about 30 more minutes before serving.
Okay, so look. I know what you’re thinking. What is the point in taking the time and effort to make your own sandwich cookies when there is a big name brand company that pretty much has the monopoly on sandwich cookies, and have gone out of their way to mass produce just about every possible flavor known to man and tried to jam it into a sandwich cookie you can run to the store and just buy?
First, when it comes to store-bought sandwich cookies, I feel like it’s a real hit or miss situation–there isn’t much space for ambiguity. They’re either really really good, or really bad. Both the cookie and the filling has to be right and that’s a harder thing to accomplish than you might think. That huge company has put out a LOT of different flavors of sandwich cookies, but in my opinion there are only a select few that have achieved that perfect sweet spot of delicious cookie and filling. The filling is where many mass produced sandwich cookies go terribly wrong–it either tastes too sweet, too artificial, or both.
I think that making your own sandwich cookies gives you the chance to correct the mistake of overly sweet and artificial filling, while also giving you the opportunity to get creative with your own taste buds and create something that you may not be able to find in stores. I’d be willing to bet that you’ll be able to pronounce every ingredient that’s in them.
And if none of the above are good enough reasons, then there’s always bragging rights–which, is more than enough for me.
I decided to make my own sandwich cookies, two ways. I knew going into it that I first wanted to make a perfect vanilla sandwich cookie. Most of the ones that are on the market now just don’t do it for me. (Yes, including the one from the huge name brand.) The cookie itself is usually okay, but that filling just kills it for me every time. I knew that what I was looking for was a cookie that was delicious enough all on its own, and a filling with a robust vanilla flavor and a smooth, non-pasty consistency.
The base is a butter cookie that I’ve made many times in the past. It’s quite simple, but you’d be surprised how the simply made baked goods will knock the fancy ones down from the pedestal. It has a buttery rich flavor and a tender crumb that melts in your mouth. For the filling I used a mixture of powdered sugar, butter, milk and vanilla. And listen guys. I want you to use REAL vanilla bean paste. I’m not above using extract but I insist that this time you go with the good stuff. You really can taste the difference and your taste buds will thank you for it.
The second flavor is where the coffee addict in me finessed its way into these cookie. I kept the same butter cookie for the base, but the filling gets a few teaspoons of instant espresso powder and liquid coffee in place of the vanilla and milk. Then, because coffee and chocolate flavors enhance one another, I decided to drizzle the top of the cookies with melted chocolate. What do you get when you combine coffee & chocolate? Mocha, that’s what. And there you have it.
I knew that these would be pretty good when I made them, but listen. They are REALLY good. They surpassed my expectations. They’re better than anything I’ve had from the store and I’m not trying to brag by saying that; I’m just being honest. I made these a while ago and I’m still giving myself a pat on the back for how they turned out, so if you’d like those kinds of bragging rights I’d suggest you give these a try yourself. Sharing at the Fiesta Friday #215, co-hosted by Laurena @ Life Diet Health and Alex @ Turks Who Eat.
In a medium bowl combine the flour and salt together in a bowl and set aside. In the bowl of a standing mixer or using a handheld one, cream together the butter and sugar until light and fluffy.
Add the egg yolks one at a time, using a spatula to scrape down the sides of the bowl. Add the vanilla.
Preheat oven to 325°F. Line two baking sheets with parchment paper. Divide the dough into quarters, keeping the other 3 in the fridge while you work. Dust a clean surface (like wax paper or a pastry mat) with flour. Roll out the dough to about 1/4 inch thick. Using a 2- to 2 ½-inch round cookie cutter, cut the dough into rounds and place on parchment-lined baking sheets, spacing them 1 inch apart. Using a ¾- to 1-inch round cookie cutter, cut out the centers from half of the cookies. Reroll and cut the scraps as necessary. Note: Make sure you’re cutting a ‘top’ cookie and a ‘bottom’ cookie each time you stamp, just to make sure you have an even number of cookie sandwiches. Also, don’t throw away the centers: they make wonderful mini cookies.
Place the sheet pans in the freezer for around 10 minutes. Sprinkle the tops with white sugar. Bake in the oven on the middle rack for 14-16 minutes, until cookies are golden brown. Allow to cool on sheet pans for 60 seconds, then remove to wire racks to cool completely.
For Fillings: In two separate bowls stir together the sugar, butter, and/or vanilla and/or espresso powder. Drizzle in the milk in the vanilla bowl 1 tablespoon at a time and the coffee in the other 1 tablespoon at a time until the filling reaches a smooth and desired consistency.
Divide the cookies in half (half for vanilla, half for coffee) Spread about a heaping 1/2 tablespoon of filling onto each bottom cookie (make sure the bottoms face up), then place on the tops (bottoms facing down). Gently press to make sandwiches. You may drizzle the coffee flavored sandwiches with melted chocolate if desired, then allow them to set for about 15 minutes until chocolate has hardened.
Coffee and I have a long, complicated history with each other. I’ll swear it off for a while, feel like I’ve finally kicked the habit once and for all…then have just the right kind of bad day to where I’ll say “Screw it” and just throw myself back into the java river with no regrets. Until the time comes when I’m ready to swear it off again.
Wash. Rinse. Repeat. It’s a cycle that never ends. I should just stop trying to pretend like it will. Coffee and me may have a turbulent history, but we’ll always end up going back to each other. We break up to make up. And boy, do we know how to make up.
I’ve now reached the point in my fixation with coffee where I look for ways to use it for more than just a beverage. Because as it turns out, coffee is a great ingredient for use in both savory cooking and sweet baking.
Did y’all know that? No? Well, you do now. Even if you don’t like it all on its own, I think you’d still be hard pressed not to like the way it’s used in today’s recipe. It’s a real keeper.
When a special occasion comes around, I like to commemorate it by making a cake. My 28th birthday was the last week in September AND, this week will mark the fourth anniversary of Cooking is My Sport. I’d say those were kind of special occasions. Special enough to celebrate with a great cake, anyway.
I don’t feel twenty eight (two years from thirty, yikes) and it certainly doesn’t feel like I’ve been blogging for four years. I’m grateful that I’m one year older, and (hopefully) one year wiser. It’s been a HUGE year of change–the good kind. I’ve been able to continue cooking, baking and blogging through that change in location and routine, which has been a relief and an outlet for me. Y’all have been great. Thank you to everyone who follows, likes and comments on CIMS. It’s very, VERY much appreciated. I mean that.
Pound cake is the best cake there is. This isn’t just because it’s got a lot of butter and sugar in it (though that’s certainly a good enough reason). It’s also because pound cake is a blank cake canvas on which you have the option of either eating plain, or testing out MANY different flavor profiles most of which will turn out great. You can make a cake that’s already delicious on its own taste even better by adding your flavor of choice. A moist vanilla pound cake is unquestionably perfect, but in my own experimenting, I’ve found that almond, lemon, orange or marble flavored ones are equally scrumptious.
As you can see, this cake is big. VERY big. Any cake with seven eggs is going to rise high and I’m glad I followed my instincts and went ahead with my 16 cup tube pan rather than the 10 cup bundt pan. I’d have been left with a huge mess in my oven otherwise. If you don’t have a pan that big, I recommend you splitting the batter up between two loaf pans or two 8 or 9 inch round pans.
So far as the star ingredient here goes, I’ll say the same thing I do when using booze as an ingredient: don’t use something you wouldn’t be okay with drinking all on its own. If you buy and use a generic coffee with a flavor that you’re not fond of, chances are you’re going to end up with a cake flavor you’re not fond of either. Don’t use dark roast if you don’t like dark roast coffee. Don’t you light roast if light isn’t your fave. I do also recommend you use a coffee with its own unique taste; I used one that was a medium roast Creme Brulee flavor that I LOVE to drink.
I used a mixture of brown and white sugar in the batter to give it a richer sweetness. The cinnamon works well with the bitterness of the coffee; you’re going to taste it but you likely won’t be able to place just what ‘it’ is. You’ll just know that you like it.
The cake bakes up so moist and rich. You could eat it totally plain and be satisfied, but I decided to go a step further and add a drizzle of icing flavored with some of the leftover coffee, and then a layer of melted semi-sweet chocolate drizzle. This bumped up both the look and taste. This really is one of the best cakes I’ve had in a good long while. I hope some of you fellow coffee lovers choose to give it a try.
Sharing at this week’s Fiesta Friday #193 co-hosted by Suzanne @ apuginthekitchen and Ginger @ Ginger and Bread.
Preheat oven to 350 °, Grease and flour a 16 cup tube pan or 2 loaf pans.
In a medium size bowl combine the flour, baking powder, salt and cinnamon together with a fork and set aside.
Using the paddle attachment of a standing mixer or a handheld mixer, cream together the butter and sugar until light & creamy. Beat in the eggs, one at a time. Alternate between adding the flour mixture and 1 cup of the coffee to the batter, beginning and ending with the flour.
Allow to cool in pan for about 25 minutes, then turn out onto a wire rack to cool completely.
In a small bowl mix the powdered sugar with about 1 tablespoon of coffee at a time, mixing thoroughly until it forms a smooth but thick icing. (You probably won’t need to use all the coffee, it all depends on how thick or thin you like your icing to be.) Use a fork to drizzle the coffee icing over the cake and alternate between drizzling with the melted chocolate. Allow to harden/set for about one hour before serving.
I’d be lying to you guys if I said I wasn’t kinda ready for the summer to end. In the first place, I don’t much care for extreme heat and as I’ve said in a couple of recent posts, the heat here has been unnecessarily extreme to the point where I’ve retreated to whole different cities for the day because this desert valley we’re in feels too much like a…desert valley. In the second place, the sooner the summer ends, the sooner we can get to the autumn which is my favorite season. The sooner autumn comes around, the sooner we can get to December and my favorite holiday of Christmas.
Because yes, my thoughts are definitely already drifting towards Christmas.
To be honest, I usually start getting the ‘itch’ for Christmas in July. It’s like a Christmas in July effect takes over and suddenly I’m listening to my holiday playlist again and planning what new stuff I’m gonna try to cook and bake for my family and the blog. As some of my followers know, I do a yearly Christmas series of recipes and although it’s a heavy undertaking, it is one that I still look forward to doing. I’ve already got a few pegged in my mind for the series, but one of them in particular was one that I thought would be a good idea to practice with first, as it is one I’ve never done before and would require a little bit more effort.
When I was little, I loved checkerboard cookies. I thought they just had to be some kind of food wizardry that could only be done in a huge Keebler-Elf style factory with a fancy machine.How else could they arrange those two different colors/flavors in such perfect patterns? I also may as well as admit that until only recently I had no idea how it was done or that it COULD be done by a home cook/baker in their own kitchen.
I knew going into it that it wouldn’t be necessarily easy and I will keep it one hundred with you guys: I wouldn’t recommend trying this recipe if you don’t genuinely like to bake, have some experience with working with cookie dough and are willing to be patient with yourself and the process. I’m a decent baker with quite a bit of experience working with cookie dough, I love doing it and (as you can see) my first try at checkerboard cookies still wasn’t exactly perfect. Nevertheless, I’m still pleased with how these turned out and that I decided to do a test run before trying to make a ‘Christmas-themed’ version for the 12 Days of Christmas series.
I tried to make the directions for these as clear and detailed as possible. So, should you want to make these for yourself (and I do think you should), a few pointers: a ruler is a must here. You’re making two different cookies doughs and when you cut them, you want the portions to be as straight as possible so that when you arrange the strips, they actually look like squares. It doesn’t have to be fancy invested in a regular old blue plastic ruler that measures inches/centimeters that I bought from Target and use strictly for baking; it does the job just fine. Also, when you’re putting the doughs together to create the pattern, don’t beat yourself up if your squares don’t line up perfectly in a row. Mine don’t and I still think the integrity of the ‘checkerboard’ is preserved in the overall aesthetic of the cookie. I plan to get better the more I practice this and I’m sure you will too.
You don’t have to make the two outer ‘wrappings’ for the cookies. I just thought it looked prettier so I decided to go ahead and make some. All you’ll need to do after making the cookie recipe is halve the base recipe and use the two different doughs from the halved recipe to wrap the cookies. It sounds complicated, but it’s not. Just read the recipe closely ahead of time and you’ll do fine.
Finally, don’t you dare throw out those scraps after you trim your dough logs! Cut them into mini pieces like I did and bake them off so that you get ‘bite sized checkerboards’ like the ones you see in the picture above. Aren’t they just as cute?
The labor alone involved in making these cookies make the finished product worth it–but I gotta say, the taste wasn’t a letdown either. Checkerboards have a close texture that’s slightly crisp on the outside, then buttery melt-in-the-mouth tender on the inside. The real dilemma here is going to be deciding which flavor you like better: the one where the vanilla dough is dominant or the one where the chocolate one is. I think I’m partial to vanilla, but that could very well change by Christmas time. We’ll have to see.
Linking this post up to Fiesta Friday #186, co-hosted this week by Colleen @ Faith, Hope, Love & Luck and Alex @ Turks Who Eat.
Scrape out half of the dough, form into a flat disk and wrap in plastic wrap. Add the cocoa powder to the remaining dough in the bowl and mix until combined. Form the dough into another flat disk and wrap in plastic wrap. Place both in the refrigerator for at least one hour.
Remove dough from the fridge. Unwrap one of the discs, then place in between two sheets of wax paper or plastic wrap. Use a rolling pin to roll out into a rectangle, about 8 x 5 inches long. Repeat with the second dough. In a small bowl, beat together the egg yolk and milk. Using a pastry brush, brush the egg wash over the bottom rectangle of dough. Place one rectangle on top of the other. Press to adhere them to each other. Trim the edges with a sharp knife and save the striped strips in the fridge. Divide the rectangle lengthwise in half. Refrigerate the halves for about 15-30 minutes to allow to get firm.
Divide each of the halves into fourths, lengthwise. (A ruler or bench scraper works GREAT for ensuring straight lines) Use the four layers to make TWO checkerboard logs: Brush the tops of two of the layers with the egg wash, then place the other two on top of them. Make sure that you flip the top layers upside down before adhering so as to create the checkerboard pattern. Use your fingers or a spatula to press the logs together and smooth out the edges/corners, try to make them as square as possible. Wrap the logs in plastic wrap and refrigerate for at least one hour.
Use a sharp knife or bench scraper to cut the log cross-wise into slices. Place sliced cookies on prepared baking sheets lined with parchment paper or aluminum foil. Bake in the preheated oven on the middle rack for 12-15 minutes, until just light golden brown. Allow to sit on baking sheet for about 60 seconds removing to wire racks to cool completely. Cut the reserved trimmings into bite sized nuggets and bake for about 13 minutes. Remove to a wire rack to cool completely.
It’s summer time and in the summer time we eat s’mores. This is non-negotiable.
IF by some odd chance you think you don’t like s’mores, you’re dead wrong. More than dead wrong. You’re lost. You’re confused. You don’t actually believe that you deserve nice things.
Let me enlighten you. Let me bring you back into the light. Trust, I’m only here to help. You do deserve nice things in life and one of the greatest is a s’more, or (come to think of it), anything that is s’mores flavored.
If you’ve been following along with the blog for a bit then you know by now that I’m…fond of s’mores flavored desserts. So far I’ve hit you guys with popcorn, sandwich cookies and brownies–ALL of which, you should try because they’re friggin delicious.
Today I’m back with a new addition to the collection that I’m pretty proud of: a s’mores flavored layer cake.
The first thing that I want to point out about this recipe is rather obvious: this isn’t a conventional round layer cake. Most layer cake recipes call for you to have at least 2, and at times up to 4 or 6 different pans to bake the batter in, and even though I bake often I have 3 cake pans and never really feel like using them much. You have to measure out and weigh the batter in each pan to make sure there’s an even amount in each and sometimes I just can’t be be bothered. All of this cake’s batter bakes in one single loaf pan–the kind that MOST people already have in their cabinets. Rather than divvy up the batter between multiple pans, it’s baked into one cake that’s then split into three rectangular layers later on.
I’ve seen recipes for other s’mores cakes before and interestingly enough, the cake is often chocolate flavored. I…don’t understand this. The base of the s’more are graham crackers that house the marshmallow and chocolate inside. You’ve just got to have that graham cracker flavor to balance the other two. In this recipe, the cake batter is given a warm, nutty, caramel-y flavor with brown sugar and the essential graham base flavor by the addition of finely crushed graham cracker crumbs.
If that doesn’t sound yummy enough all on it’s own, after you split the layers of the cake and start to assemble it is where things get REALLY tasty. We’re not just putting melted marshmallows into the buttercream; to give it that special ‘campfire’ flavor, the marshmallows are first toasted underneath the broiler until they are JUST the right color and brownish hue (much like you’d get holding them over a flame on a stick), then mixed into a smooth buttercream. This buttercream gets spread in between and on top of all the cake layers along with…what else? Smooth, rich semi sweet chocolate. Once you’ve assembled the cake, it get completely covered with the toasted marshmallow buttercream then broken graham cracker shards and mini marshmallows are pressed into the gooey deliciousness and the whole thing gets drizzled with even more melted chocolate.
Guys, I am so proud of this thing. You don’t even know. It is soooo good. There’s not one single thing I would change and I’m excited to share what is trully a perfect summer dessert. Please try it. I’m sharing this cake at Fiesta Friday #182, co-hosted this week by Liz @ spades, spatulas & spoons and Jenny @ Jenny Is Baking.
Preheat oven to 325°F. Spray an 8 x 4 inch loaf pan with cooking spray and set aside.
In a medium bowl combine the cake flour, graham cracker crumbs, baking powder and salt. Set aside.
In the bowl of a standing mixer or using a hand held one, cream the butter and sugars together until light and fluffy.
In a small bowl combine the milk, heavy cream, whole milk, eggs and vanilla extract with a fork, whisking until egg yolks are broken and thoroughly combined.
Alternatively add the dry ingredients and egg mixture to the creamed butter mixture, starting and ending with the flour. Make sure you use a spatula to scrape down the sides of the bowl as you add the ingredients to ensure even mixing.
Pour the cake batter into the prepared loaf pan. Bake for about 50-55 minutes in the oven, until a toothpick inserted into the center comes out clean. (Pound cakes are done at about an internal temp of 195-200 degrees Fahrenheit if you have an instant thermometer.) Allow to cool for about 15 minutes in the pan, then turn out and cool completely on a wire rack. Place the cake in the fridge for about one hour, or the freezer for 20 minutes to let it firm up.
For Marshmallow Buttercream: Preheat the broiler. In the bowl of a standing mixer cream the butter together with the powdered sugar until light and fluffy. Line a sheet pan with parchment paper and spray it lightly with cooking spray. Spread the marshmallows out in a single layer, keeping them close together. Place underneath the broiler and let them get lightly browned; DON’T WALK AWAY. This takes no more than 30-40 seconds. Using a rubber spatula you spray with cooking spray immediately scrape the toasted marshmallow into the creamed butter/sugar mixture. Mix on low speed until combined. If it seems too stiff, you may add the heavy cream to your desired consistency.
Gently heat the heavy cream in a microwave safe bowl (about 45 seconds should do it). Pour it directly over the chocolate in another bowl and gently stir until it completely melts. If it’s too stiff you can add more warm heavy cream.
Take the cake out of the fridge/freezer. Cut it into three layers (it’s okay if they’re not perfectly even. Mine weren’t either.) Level the tops of each cake. Line the edges of a cake platter with strips of parchment paper to keep the platter clean while you assemble the cake. Smear a little of the chocolate or buttercream in the center to keep the cake from moving around. Place one cake layer on the platter. Spread or pipe a border of the marshmallow buttercream around the edges, bringing them up almost like a fence. Fill in the center with more buttercream, then dollop the chocolate ganache on top, trying to keep it inside the buttercream ‘fence’. Add the second layer and repeat then place the third cake layer on top. Spread the top of the cake with the remaining buttercream. Using a spatula to smooth out the sides of the cake, dipping it in some warm water intermittently.
Press the broken graham crackers and crumbs onto the sides of the cake (They don’t have to cover it completely). Sprinkle more of the crumbs on the top, then use a fork to drizzle the rest of the chocolate ganache on the top.) Place the cake in the fridge to let the buttercream and chocolate to firm up a bit, 15-20 minutes before serving.
There is a tangible difference in food that’s been made with care and love versus food that’s been made without them and don’t you let anyone tell you there isn’t. Anyone who says there isn’t has never had food made for them with love, and that’s truly unfortunate. When I was younger, I thought it just boiled down to some people were good cooks and some people weren’t–now that I’m older and that I’ve learned how to cook and bake rather well myself I understand that it’s a bit more complicated than that.
I’ve eaten in swank restaurants where the food was both expensive and undoubtedly delicious, but given the choice I still would’ve rather been in my grandma’s house eating a dish of her smothered steak and gravy. I would take her Lemon Pound Cake over the most pricey, fancy souffle from the best pastry chef in the world ANY DAY.
Know why? Because regardless of whether or not the fancy food tastes delicious, I know for a fact that there is more love for ME personally in her dishes than anything a chef that doesn’t know me from Eve can put into his food, no matter how technically flawless it is. It may sound corny, but for me, food made with love tastes like home; the taste that gives you the ‘itis’ where you’re full, satisfied, and want to take a nap afterwards, then wake up and have a little bit more.
The only thing more gratifying for me than eating food made with love is being the one to make it for my loved ones, especially when it’s a special request/favorite of theirs. Because I know them, I know exactly what they want and how they’re going to want the food to taste and that knowledge makes me all the more determined to put as much care and consideration into what I’m doing to make sure the food meets their anticipation for it. My fellow food bloggers/cooks out there will know the immense feeling of satisfaction that comes with watching someone you love eat and rave over their favorite food and know that YOU were the one to make it for them. It’s a wonderful thing.
My twin sister came out to visit us a few months ago. There’s little to nothing that I don’t know about her, including the fact that she loves practically ANYTHING cookies and cream flavored. The Cookies and Cream flavor is best described as that of the Oreo sandwich cookie: a sweet vanilla base mixed with chocolate. She mostly eats ice cream, and we very well could’ve just got a pint of it to keep in the freezer but when she booked her flight to come out here I decided to make something that was bit more special than ice cream to surprise her with.
This may be the easiest layer cake I’ve ever made. Unlike most others that have lengthy ingredients and complex instructions this cake is so simple it doesn’t even require a standing or hand held mixer. If you’ve got a large bowl, a whisk (or even a fork), you can make this cake and have it baking in the oven in less than ten minutes, no joke. The recipe that I included does give instructions for making whipped cream from scratch. However. In the case that you don’t have a standing or handheld mixer….lean in closer. A little bit closer. Little bit closer.
*whisper* You can buy pre-made cool whip that you thaw and it will still work out fine.
The finished product is what is probably the most “Cookies and Cream”-y thing I’ve ever seen or tasted. Normally I’m not even a huge fan of chocolate cake, but the combination of the cake with the cookies and cream whipped cream filling just really works. The cake texture itself is very moist, the chocolate flavor isn’t overwhelming and there’s a fluffiness in the whipped cream that adds lightness to the cake that cuts some of its richness. Then again, I DID make it with lots of love. That was bound to have an effect on the tastebuds.
Sharing this cake at this week’s Fiesta Friday #180 co-hosted this week by Tracey @ My Baja Kitchen and Jhuls @ The Not So Creative Cook.
Preheat oven to 350 degrees. Spray two 9 inch cake pans with cooking spray, then line with wax or parchment paper; spray the paper and set aside.
In a small bowl, combine the flour, cocoa powder, baking soda and salt with a fork or wire whisk and set aside.
In a large mixing bowl combine the sugar, vegetable oil, eggs and vanilla and beat with a fork or a whisk. Fold the dry ingredients into the wet ones and mix thoroughly.
Divide the batter evenly between the two pans and place the pans on a large sheet pan. Bake in the oven until cake separates from the sides of the pans and a toothpick or knife inserted in the center comes out clean, about 20-25 minutes.
Allow cakes to cool in pans for about ten minutes, then turn out and allow to cool completely on wire racks.
Take a knife and cut 10 of the Oreos in half and set aside. Put the rest of the cookies in a Ziploc plastic bag and use a rolling pin or the bottom of a glass to crush into crumbs.
In a mixing bowl beat the heavy cream in 2 batches, 2 cups at a time until the cream has stiff peaks. Beat the vanilla and powdered sugar in with the second batch, then combine them together. Reserve about 3/4 cup of whipped cream in a small bowl in the fridge. Gently fold in all but about 1 cup of the crushed Oreo cookie crumbs with a spatula.
Level both cakes so that they are flat on the tops. Line the edges of a cake platter with strips of parchment paper to keep the platter clean while you assemble the cake. Place one cake layer on the platter. Spread about half of the Oreo whipped cream onto the cake, then place the second cake layer on top. Use a spatula to cover the tops and sides of the cakes with a thin layer of the cream, then refrigerate for about 1 hour until the layer is firm, to allow a crumb coat to form.
Place the rest of the cookie cream on top and on the sides of the cake. Take the reserved cookie crumbs and press evenly onto the sides of the cake with your fingers. (This may get a little messy so you can place a layer of foil or wax paper underneath the cake to pick up any of the spare crumbs.) Take the Oreos you’ve sliced in half and press onto the top of the cake. Remove the bottom strips of parchment paper. Take the reserved whipped cream and pipe small rosettes in between the sliced Oreos and along the bottom of the cake to form a border. You can also place one whole Oreo in the center of the cake and pipe rosettes around that, if you like.
Refrigerate for about 1 hour to allow whipped cream to set before slicing and serving. Keep cake refrigerated when not eating. | 2019-04-21T16:30:16Z | https://cookingismysport.com/tag/chocolate/ |
There are some good pictures of this afternoon's demonstration in Brixton on the urban75 blog (http://www.urban75.org/blog/lambeth-save-our-services-march-demo-and-rally/).
As well as a couple of fine shots of the Lambeth UNISON Banner, there are good pictures of Ellen, who addressed the rally on behalf of the Lambeth Pensioners Action Group and of the UNITE speaker who spoke about the attacks on the NHS.
Today's demonstration was a positive step forward and one which poses all the more clearly the importance of building united action against cuts in the borough.
Lambeth Save Our Services, which meets on the first and third Thursday of each month at 7pm at the Vida Walsh Centre was initiated by the local authority trade union branches in response to the Council announcing hundreds of job losses in May (http://lambethunison.blogspot.com/2010/06/opposition-to-public-service-cuts-in.html). It immediately attracted support from the UCU Branch at Lambeth College and the Lambeth Pensioners Action Group and now has the backing of the Tenants Council.
Lambeth SOS has two important strengths. It is a campaign against all cuts, whoever makes them, and it has a bias towards organising action. The campaign needs to continue to grow - it has the potential now to do so. Of course it goes without saying that these are early days and the campaign has a long way to go and much to do.
Other initiatives have also emerged.
Local supporters of the Right to Work Campaign (which appears to have no local organisational existence independently of the Socialist Workers Party) organised a well attended meeting (at which I spoke alongside Kate Hoey) in early September under the name of "Lambeth United Against Cuts" (http://www.lambethunited.org/about-us.html). This was an excellent meeting.
Following the September meeting the organisers had denied any intention to establish an organisation separate from Lambeth Save Our Services (SOS). They now aspire to "bring us closer to a broad delegate based anti-cuts campaign run by no single group or union, which allows participates to continue their own campaigning work." (A project requiring its own website).
This is a worthy aspiration and almost certainly most likely to be achieved if their authors turn up at the twice monthly SOS meetings which have been arranged, will take place and will organise resistance to cuts in Lambeth (at which their welcome contribution will be most helpful).
Meanwhile the officers of Lambeth Trades Council (which has not itself met as a full Trades Council since June) have kept their distance from the SOS campaign created by their most active affiliates. The Trades Council officers organised an "open" meeting which was markedly less well-attended than the "Lambeth United Against the Cuts" meeting and have initiated discussions with Streatham MP Chukka Umanna to develop a "broad based" campaign. These are positive initiatives in and of themselves.
The Trades Council could and should be central to opposition to the ConDem cuts in Lambeth just as Trades Councils in (for example) Barnet and Camden are. Almost certainly the crucial next step is for the Trades Council to meet so that delegates elected to represent Lambeth workers can discuss and agree how we move forward.
Separately the leadership of the Labour Group (http://www.lambethlabour.com/) put proposals to the Council trade unions for a "Lambeth Campaign for Fair Services" which are unlikely to make much headway since it's tough to campaign against cuts whilst making them.
However, it is important that Labour Party members and Councillors remain welcome in anti-cuts campaigning activity - whilst those of us who work for them may have disagreements with the Council as our employer we need unity against the ConDem Coalition who are, without doubt, our real enemy.
The discussion about how Labour Councillors - and Labour Councils - should respond to these cuts is only beginning and an active engagement by Labour Party members in anti-cuts campaigns will be as important as the openness of anti-cuts campaigners to such engagement if we are usefully to have this important discussion.
The people of Lambeth should no doubt be grateful that so many different approaches to how to respond to the ConDems are on offer in the borough!
As the cuts bite deeper we'll find that it is those prepared to act, to campaign and to fight who will be to the fore as working class people resist the attempt to put the clock back two generations and to eliminate our welfare state.
In Lambeth, those are the people who marched through Brixton this afternoon.
Over 200 people marched through Brixton this afternoon behind the banner of Lambeth UNISON, organised by Lambeth Save Our Services, the joint union-community anti-cuts coalition which last week won the support of Lambeth's influential Tenants' Council.
Before the march speakers from UNISON, UNITE and the Lambeth Pensioners Action Group were joined by the Right to Work Campaign and student activists.
Following the good humoured and lively march, the marchers were addressed by former Council Leader Ted Knight and left Labour Councillor Kingsley Abrams.
The message of the march was one of opposition to the ConDems and to all public spending cuts. All in all, a good start to local campaigning.
We have much further to go.
UNISON's detailed analysis of the Government Spending Review is available from the UNISON website: http://www.unison.org.uk/acrobat/Spending%20Review%202010%20-%20further%20analysis%20-%2025.10.2010.pdf.
UNISON has published a handy summary of today's spending review available online (http://www.unison.org.uk/acrobat/2010SpendingReviewAnalysis1.pdf).
The 3,000 strong march from Lincoln's Inn to Whitehall this evening has shown both what can be done by local union branches working through a campaigning Trades Council and the potential that exists for the union movement to mobilise opposition to the ConDems.
The continuing presence of protesters has somewhat depleted attendance at the meeting called by the Labour Representation Committee - but the trade union speakers are rightly calling for a unified fightback.
I was pleased to be part of a good crowd outside Croydon Town Hall this evening protesting at the plans of that Tory Council to worsen the conditions of its entire workforce.
Croydon's experience could shape that in many London boroughs. It is strategically important that UNISON activists everywhere support the Croydon branch.
The Order of Lenin is due to the Lambeth comrade who ensured we could take our banner - where it stood proudly alongside the banners of Croydon UNISON, NUT and Trades Council as well as SERTUC.
It was good to see the Regional Secretary of SERTUC there as well as a leading comrade from PCS (not to mention a member of the TUC General Council - even if he was a local!). I was pleased that, by my presence as a UNISON NEC member, I was also signifying support - however there is more to do for our Union.
UNISON needs to raise our game when it comes to supporting activities across branches since we currently punch far below our weight. (It was good that branches had been encouraged to support the protest at last Thursday's Regional Council and that - perhaps in recognition of the fact that many branches had been discouraged from attending the Regional Council, leaving it inquorate - an email reminder had been sent round this morning. However, for the future we need to do more, faster and better at Regional level).
Our active members in Croydon this evening showed us all what to do as a protest organised by the UNISON branch drew support from across the movement. This sort of energy is being shown in many boroughs and needs to be encouraged.
We need - urgently - a national and Regional strategy to support our active members in branches like Croydon who are prepared to campaign.
In the mean time we need to cross the boundaries of our boroughs and our branches in order to show solidarity.
I should also add that this evening was a great tribute to the memory of my dear friend, Malcolm Campbell (http://www.remembermalcolmcampbell.blogspot.com/) since it showed how his former branch have moved on to face new challenges following his untimely demise just eighteen months ago.
It has recently been suggested to me that we need more of a memorial to Malcolm but, on reflection I think his memorial is all around.
Tonight, Malcolm, my brother, my friend, they did indeed do it themselves.
Tonight I was as proud of my brother Malcolm as I know he would have been proud of his former branch.
Tomorrow the fight goes on. And as long as it goes on and as long as we march forward into that fight, Malcolm's memory marches with us.
A gaggle of plutocrats and parasites have had someone put pen to paper for them and written to the Torygraph to express support for the ConDem's planned spending cuts (http://www.telegraph.co.uk/news/newstopics/spending-review/8069947/Spending-Review-2010-cut-now-or-pay-later-say-business-leaders.html).
Yes these are the leading lights of the same private sector which got us in to this mess in the first place - and one of the few groups of letter writers imaginable who may actually have a higher average net worth than the Cabinet of millionaires itself. They and their children won't be suffering when Osborne follows Cable's advice to make "savage cuts".
"The private sector should be more than capable of generating additional jobs to replace those lost in the public sector, and the redeployment of people to more productive activities will improve economic performance, so generating more employment opportunities."
This argument fails on many levels. Ask Connaught workers if public spending cuts increase private sector employment opportunities!
This is no more than a rehash of the 1970s "crowding out" thesis, which was tested to destruction in the 1980s (and destroyed many jobs and communities in the process).
Having only recently returned to the sixth form where I first studied economics thirty years ago I can recollect this argument when it was still new and could go on about it at greter length.
However Aditya Chakrabortty gave a good summary in the Grauniad a fortnight ago (http://m.guardian.co.uk/?id=102202&story=http://www.guardian.co.uk/commentisfree/2010/oct/05/george-osborne-margaret-thatcher) so you can just read that.
The only question I would ask is this. Do these "business leaders" believe their own arguments because they are ignorant of economic history or is this reheated Thatcherism no more than a populist cover story for an attempt to shrink the public sector in an attempt to increase profitability at the expense of the living standards of working people?
UNISON’s legal challenge to the NHS White Paper may not have succeeded. However our campaign in defence of public services goes on.
Legal challenges are a legitimate and necessary tactic. Justice Mitting may have ruled that the court could not place a legal demand on the government to consult the public, patients or staff over plans contained in its NHS white paper. However, he said that it was perfectly proper for UNISON to seek a judicial review, and that the union had raised an important principle that was in the constitutional interest.
More to the point, any tactic which helps to focus attention on the detail of aspects of the ConDems assault upon our public services has validity. There must be a danger that the suggestion that the health budget is being “protected” will distract attention from the truly appalling proposals in the White Paper as we mobilise against the draconian cuts which will hit many other parts of the public sector from Wednesday onwards.
The challenge for UNISON now is to break out of our service group silos and unify our campaigning around our one priority – the defence of public services, including the NHS. If we can mobilise an excellent attendance at a training Conference for health branches then we can mobilise around campaigning activity locally, Regionally and nationally. Those who want to unite UNISON in Greater London should get along to the Regional Council on 7 December – and should overcome political differences which weren’t an affordable luxury even before the General Election.
At a local level UNISON branches need to be linking up, with all other union branches and local community organisations in order to resist cuts – the TUC “Stronger Unions blog” has some thoughtful online advice. Dave Prentis also recommends that we link up with the Citizens Organisation. We need to pull out all the stops to engage UNISON members beyond our largest Service Group, otherwise we’ll fail to focus sufficiently widely on the full range of attacks upon the Welfare State.
The challenges we now face make the differences within the Union, which can seem so important to those involved, appear as trivial as they probably always were.
Croydon UNISON is calling on as many members as possible to Lobby the above meeting where questions are to be asked in respect of the Employment Based Cost Review proposals (Croydon Council's plans to attack the conditions of service of their staff inspired by the troublemaking schemes of the national local government employers).
The branch rightly feel that it is extremely important that the Councillors know of the depth of feeling amongst staff in relation to how the proposals will affect them. This is the opportunity for Croydon employees to show how you feel about your Terms and Conditions of Employment. The branch are calling for the biggest possible turnout and urge members to attend if possible. They will be bringing the Branch Banner and other unions will be in attendance.
Other groups who have concerns about the impact of cuts in the Community will be supporting a demonstration at the same time.
Lobbyists will be gathering outside the Town Hall Steps, Katherine Street at 5.30 pm, in time to lobby Councillors before they begin the Meeting at 6.30 pm.
This assault upon UNISON members in Croydon is of relevance to all UNISON members and I hope that as many members in neighbouring boroughs, hospitals and colleges as can get along to Katherine Street at 5.30pm tomorrow will do so. Labour Councils need to be pledging that they won't join in any attacks upon the conditions of service of staff!
Croydon residents can also download a letter from the branch to send to their local Councillor.
This is a personal report of the October 2010 meeting of UNISON’s National Executive Council (NEC) intended for members and branches in the Greater London Region. An official report of the meeting is available online at http://www.unison.co.uk/news/news_view.asp?did=6374.
I am always happy to respond to questions about reports, or to attend meetings of branches or Branch Committees (subject to notice and availability). You can contact me at [email protected] or on 07957505571.
This is a personal report. It is not an official document nor is it intended to be a comprehensive report of everything which was discussed. The most important discussions, about defending public services, the National Health Service and public sector pay are reflected in a lot of content on the UNISON website, to which you should refer to for further information.
The NEC had not met between National Delegate Conference and early October. I had indicated before the meeting that I intended to raise my concerns about this, and I understand that I was certainly not the only member concerned about this long delay between meetings.
This meant that the full NEC had no say in UNISON's decision to vote for major constitutional changes at the TUC. It also meant that the NEC were mere spectators in a major reorganisation of our senior management structures. Most importantly, our NEC had failed to meet in the immediate aftermath of the Emergency Budget and the most important challenge UNISON has ever faced.
I am therefore pleased to report that the President, Angela Lynes, indicated that the future timetable for NEC meetings would be reviewed. I will report back on this in the future.
As ever the meeting commenced with a report on recruitment and organisation. It was reported that we are growing at an annualised rate of 1.63% which means that - given a turnover in excess of 10% we are recruiting 12% of our membership each year. One in four of new applicants now join online, which means that the internet is now second only to national strike action in boosting our recruitment.
The Three Companies Project (about which the NEC is to receive a full report) has raised density on the ten contracts upon which it has focused from 21 to 55%. For privatised contracts these are impressive figures.
Discussion on pay at the October NEC took place in the context of the decision, the previous day, of UNISON's National Joint Council to support a claim for local government workers in England, Wales and Northern Ireland of "at least" £250 a year from 1 April 2011.
This claim, on behalf of workers in the largest single bargaining group in the economy, who last saw a pay rise on 1 April 2009 reflects the view, also prevalent at the NEC, that our members are not (yet) in a mood to fight over pay as they worry where the redundancy axe may fall.
The General Secretary made a more considered and far sighted contribution to this discussion when he observed that pay restraint always breaks down, but not normally in the first year.
Whilst this does not seem at all like the first year of pay restraint for local government workers, it probably is true that we need to focus on the medium term to pursue the objective of a fair pay increase.
I hope that at future NEC meetings we shall be considering pay alongside the defence of public services. The Government do not compartmentalise these issues and are as happy to cut the real terms pay of low paid workers as they are to savage the services received by our communities.
Under this item the NEC also considered the recent "leak" that the School Support Staff Negotiating Body may never now sit. The relevant sector Committee within the Local Government Service Group has called for a consultative ballot to consider national industrial action if the Government do proceed to abolish the SSSNB. Certainly the Government's approach of abolishing first and consulting later deserves a robust response. National industrial action by school support staff is an ambitious goal - but this is probably the only time when a national trade dispute around which such action could lawfully be organised will ever exist.
The section of the NEC meetings at which we receive reports on Equal Pay remain confidential because of the volume of litigation involving the Union.
I can safely mention that UNISON will be complaining about the treatment of the Union in the recent Channel 4 Dispatches programme.
The major item for discussion at this NEC, led off by our General Secretary but also involving most of the other senior officers in the room in one way or another, was around a report entitled "Defending Public Services." Dave Prentis made clear that this should be viewed as THE priority for our Union over the coming months, and should provide the focus and direction for all the activities of every part of our Union. Probably because this was the first NEC meeting since Conference (and therefore also the first since the Emergency Budget) the combined length of the officer introductions to this 11 page report exceeded an hour, although as the report's author rightly pointed out; "UNISON must be judged by our actions in this period not the length and extent of our analysis." The report itself usefully summarised the attacks upon us from the Coalition Government and the response to date from UNISON and the wider trade union movement. Rather than repeat that here I will append the document to my report to London UNISON Branches. The key point from this debate was that our defence of public services must be the central principle around which we organise all our trade union activity, building towards the TUC demonstration in March (and various elections in May) on the basis of local anti-cuts activity. See the attached report for more information.
By the time we got to the agenda item for the General Secretary's Report we had already covered a lot of ground, but Dave asked the Head of Health to report on our response to the NHS White Paper. We were told that UNISON's legal challenge to the White Paper (over the inadequacy of consultation) had sent "an almighty shudder through the Department for Health."
However, the best that this legal challenge can achieve will be delay and so we also need a campaign which must go beyond being a campaign "in" the NHS (though it must be the greatest of those there has ever been) to be a campaign "for" the NHS. Once consortia of General Practitioners, expensively if not ably assisted by private consultants, start purchasing healthcare provision on the market, the "renationalisation" of the health service would probably require withdrawal from the European Union and abrogation of international treaty obligations. The White Paper goes far further than any previous attempt to open up healthcare to private profit and would replace the National Health Service (in England) with a national healthcare market "free at the point of use" but increasingly prone to the development of two-tier provision as providers try to turn a profit. For UNISON this is a great challenge to us to see to it that all our Service Groups and all our branches (even all our NEC members) are fully engaged in a struggle, which is in all our interests, to preserve the single greatest achievement of our movement.
At the tail end of the General Secretary's Report (which is an opportunity to ask about anything at all) I asked some questions prompted by information from some London Borough branches. I asked about the perceived tardiness of legal advice to branches facing significant challenges. I was advised that this was the first our General Secretary had heard of such a problem and that further details would elicit a further response. I will pursue this. I also advocated our writing to members resident in the area of any local authority attacking our members, urging them to lobby Councillors against such attacks. I was advised that we do use this tactic but that its expense means that we employ it sparingly. I concur with the views of the London Branch Secretary who felt that we should look at how to moderate the cost to the national union of this sensible tactic - by, for example, branch funds paying the postage and branch activists stuffing the envelopes.
Towards the end of a long NEC meeting we got on to the NUC (NUC = New Union Centre, the somewhat delayed building rising on the site of the former Elizabeth Garrett Anderson hospital which will be our new HQ). We were presented with recommendations from the Finance Committee that, rather than sell the freehold of Mabledon Place once we have vacated it, we should lease the site to a developer on a long lease in return for a cut of the rent which the leaseholder will receive from the tenant when the building has been refurbished. My concern - which was met sufficiently that I voted for the recommendation - was that we should regularly consider selling the remaining freehold interest in the site. I was persuaded that we would have the flexibility to do this at any time when it was financially advantageous - and was swayed by the fact that the £13 Million we will get up front for the lease will pay off the loan we took out to build the "NUC". Other NEC members raised the sound point that we could face problems if the leaseholder rented out a site which we still owned (as freeholder) to a tenant whose business was at odds with our aims and values. Branches may wish to consider a Conference motion instructing the NEC to dispose of the freehold as soon as is consistent with the duties of our trustees (who appeared not to have been kept completely in the loop). It makes sense to sell a leasehold interest in the property right now, but a trade union should probably not aim to hold its reserves in freehold property in the long term. We don't always do well when we do things beyond our basic functions as a trade union.
I supported an attempt by North West Region NEC member Roger Bannister to move reference back of the report of the Staffing Committee. Roger was addressing the manner of the announcement to NEC members of the decision to recruit additional Assistant General Secretaries (AGSs). Roger queried both the need for additional posts at this level and the decision to proceed with such an important decision without a discussion at the full NEC.
President Angela Lynes ruled that we could not "refer back" a report of the Staffing Committee because of its Rule Book autonomy from the NEC (which may be debatable) but permitted a vote on whether or not to receive the report (a proposition eventually agreed by a convincing majority).
The debate saw a spirited defence of the decision from Dave Prentis and a reasoned intervention from lead North West Region NEC member Bernie Gallagher who highlighted the fact that attempts to debate the election of officials at Conference are ruled out of order for fear that they could breach the contracts of staff, yet here we were happily appointing new staff without even considering the option of electing to the newly created posts.
I asked about the fact that Dave's original letter on this topic had said that "As part of a restructuring process, the new posts will be ringfenced to existing staff and members and advertised internally..." I pointed out that I had had correspondence with the Chair of Staffing querying the wisdom of this approach.
Dave Prentis told the NEC that since his letter in August the Union had thought again and that the posts were now being advertised openly.
Although I would personally support the election of these senior officials, if they are to be appointed at least we now know that anyone can apply and that the appointment panel can choose from the widest pool of talent.
How do we fight the cuts?
Having had an earlier post on this subject not so much savaged by a dead sheep as somewhat criticised by a seriously unwell little lamb (http://grayee.blogspot.com/2010/10/ultra-lefts-cunning-plan-to-smash.html) I think it worth returning to the important question of how we need to fight cuts in public services.
The key is local activism, mobilising and learning from workers on the ground and from our communities who are the users of our services.
Trade union branches must be central to this campaigning - and have a vital role to build up our own membership and organisation through this struggle - yet we must avoid trying to dominate the alliances we must make.
We need to approach community campaigners with solidarity and humility. UNISON in London needs to learn from the errors made by the office in its approach to London Citizens for example.
We need however to approach politicians with caution and relate to them on our terms and not theirs.
This applies both to Labour Councillors (and MPs) (including those union activists whose first loyalty is to their Labour Party positions rather than our members) who may want us to fight ConDem cuts whilst swallowing those proposed by Labour politicians, and to revolutionaries who have already worked out for us what we should be doing. Workers need, IMHO, guidance from neither source. I have confidence in ordinary members of our Union far more than in any politicians.
The essence of resisting cuts is - as the SERTUC Regional Secretary said to the embarrasingly inquorate UNISON Greater London Regional Council earlier today - the sort of campaigning that saved jobs in Lambeth's One O'Clock Clubs this summer. We need campaigns which unite workers and service users and pile effective pressure on decision-makers.
I look forward to guidance from the Union at Regional level which will educate our activists at local level about how we could be doing even better.
In the mean time we'll just keep fighting.
Londoners - support the Firefighters!
London's firefighters have voted to strike (http://www.fbu.org.uk/newspress/pressrelease/2010/10_14.php).
A 79% yes vote on a 79% turnout is an emphatic mandate to respond appropriately to the provocation of madcap reactionary employers using the threat of mass sackings to try to force through detrimental changes to working arrangements.
Longer serving Lambeth Council trade unionists know the leadership of LFEPA's HR function well - they should know better than to pick a fight with the FBU! UNISON and GMB members are also set to ballot.
All London trade unionists should back our firefighters who are well placed - if we do enough to back them - to win a vital defensive victory and set a precedent of benefit to all workers.
The unfortunately inquorate meeting of UNISON's Greater London Regional Council is now hearing an important presentation about the work of Show Racism the Red Card (http://www.srtrc.org/).
The inspiring and positive contributions from both Megan Dobney and Jeremy Corbyn, about which I have just blogged, have however got me thinking about whether our Region is really as fit as it could be for the purpose of coordinating our defence of public services.
Since Geoff Martin stood down as Regional Convenor the only quorate meetings of our Regional Council have been the Annual General Meetings. Cross service group co-ordination is done not in large and representative meetings but in a small Committee the proceedings of which are not shared with our members.
The office mobilises brilliantly for the annual health training day, and to get delegates along to the AGM, but an internal focus will not suffice to mobilise our 130,000+ members on the streets.
Regular readers Sid and Doris Marxist-Leninist will be familiar with my occasional role as a "critical friend" to the UNISON machine in Greater London, but righjt now, the single priority set by our NEC seems so much more important than internal political squabbles.
I hope that this view can now prevail and that UNISON in Greater London can achieve our potential now that we need to more than ever.
Jeremy Corbyn, MP is reporting to the inquorate UNISON Regional Council that the growing membership of trade unions and the Labour Party shows a recognition of the need for collective action in the face of the attacks from the ConDems.
The Coalition have successfully shifted debate from a crisis caused by bankers to a crisis of state welfare. The Welfare State is under attack across Europe.
I'm pleased to hear Jeremy focusing on the housing benefit cuts, and making the case for higher education as a public good rather than an individual investment. We certainly need to make the case against these attacks as strongly as we make the case against direct cuts in jobs and services.
Jeremy has called for support for the TUC lobby on the 19th, the Camden Trades Council demonstration on the 20th and the RMT/FBU demonstration.
Jeremy also wants us all to make sure that our MPs are in Parliament on Friday 22 October to support John McDonnell's Lawful Industrial Action (Minor Errors) Bill - we certainly need to remove some of the obstacles to lawful industrial action so that we are better able to resist attacks such as those in Croydon and elsewhere.
Megan Dobney of SERTUC is addressing the sadly inquorate meeting of UNISON's Greater London Regional Council and setting out how we must go about trying to bring down the Coalition Government.
She's right that we have our work cut out to win the argument - first of all with our own members - that cuts are not required. The TUC back PCS in their focus upon bringing down tax avoidance and evasion. 20,000 more jobs in HMRC could raise twenty billion quid - but the ConDems would rather savage our services than collect our cash.
Megan, a Lambethan, has made the point that our defence of the One O'Clock Clubs shows how to mobilise service users and communities to fight job cuts. She has also called for support for Monday's lobby of Croydon Council, who are facing a spirited response to their attack upon the conditions of service of our workforce and for support for both the SERTUC rally and the FBU/RMT march leading to that rally.
Campaigning work can shift popular opinion - majority opposition to Royal Mail privatisation is a product of campaigning by CWU over recent years. The French experience shows how we too can mobilise.
Dave Prentis makes a concise and cogent case for UNISON's legal challenge to the NHS White Paper in today's Grauniad (http://m.guardian.co.uk/?id=102202&story=http://www.guardian.co.uk/commentisfree/2010/oct/13/case-for-the-nhs-unison-public-debate).
Let's hope the legal challenge forces the Coalition into at least consulting on the break up of the NHS in England for which they have no mandate, giving us more time to organise, educate and agitate in opposition.
I shall start by hoping against hope for a decent turnout at today's Unison Regional Council! We need to mobilise the whole of UNISON to defend the NHS.
UNISON's apt response to the revelation from PWC's department for stating the bleedin obvious that public spending cuts will also cost private sector jobs is most welcome (http://www.unison.org.uk/asppresspack/pressrelease_view.asp?id=2012&utm_source=twitterfeed&utm_medium=twitter).
Unless you adhere to the discredited "crowding out" thesis it's impossible to believe that rolling back the state will create space in which private entrepreneurs will innovate and make their fortunes whilst spreading wealth, happiness and Tory Party membership.
On the contrary, reductions in public spending simply reduce aggreggate demand and push economic activity downwards, not just through the direct impact on companies depending on private contracts but also through the multiplier effect arising from reduced spending by workers thrown onto the scrapheap or forced to accept reduced incomes.
We have to start explaining this basic economics, first of all to our own members.
Of course there are those who won't be worried - the spivs and chancers who run companies bidding for outsourced work will be hoping to do nicely.
Most millionaires (amongst whom can of course be counted the majority of the Cabinet) won't be that bothered either of course.
The cuts aren't an attack on the British people - they're an attack by one small but wealthy and powerful section of the British people on the rest of us.
The Party which stood clearly against tuition fees (http://www.libdems.org.uk/education_detail.aspx?title=Liberal_Democrats_back_plans_to_scrap_university_tuition_fees___&pPK=b5043fc9-2719-489a-9e0b-532ef2b05906) at the last General Election is now part of a Government clearly set to increase them.
At least when Vince was no more than a sidekick of Deputy Dawg he was a good guy!
What is the role of Labour Councillors facing ConDem cuts?
I was pleased to speak to the Coldharbour Ward Labour Party meeting in Brixton this evening.
We had a useful discussion covering the future management of housing in Lambeth, the pre-election agreement between the Party and the unions and about how to oppose cuts in public spending.
Labour administrations under a Tory Government may find themselves caught between a rock and a hard place - but trade unionists in local government need to recognise that in these circumstances it is our job to be the hard place.
We must organise against the Tories proposed destruction of the NHS, against their plan to price our children out of higher education and against proposals for housing benefit that will make tens of thousands homeless.
At the same time, those of us working for Labour Councils can be neither neutral not sympathetic when Labour Councillors implement Tory cuts. It is not our role to make it easy for Labour Councillors to bend the knee to a Tory Government and attack the people who put them where they are.
Whilst resistance on the model of Lambeth in the 80s, Clay Cross in the 70s or Poplar in the 20s may not immediately be on the cards we do need to start to debate what options really exist.
And Councillors who are making cuts (against the wishes and interests of their supporters) need to choose whether they are first and foremost (would-be) able administrators of the local state or primarily representative leaders of the local working class.
The latter - correct IMHO - choice entails, at a minimum, a vigorous campaign against cuts mobilising trade unionists and Labour Party members to attack the economic policies of the Coalition Government by resisting cuts which undermine the quality of our lives.
Labour Party members in Lambeth will have an opportunity to discuss this further at an all members' meeting on Saturday 20 November at the Town Hall. Party members need to work out whether local people voted for a Council which would give them a choice about which services to savage, or a Council which would stand up against savage cuts.
This is the one-after-the-last post about last week's meeting of the UNISON NEC.
Regular readers Sid and Doris Blogger will know that I was not best pleased that we had no meeting of the UNISON NEC in July (as we have previously) and therefore had a gap from June to October.
This meant that the full NEC had no say in UNISON's decision to vote for major constitutional changes at the TUC.
It also meant that the NEC were mere spectators in a major reorganisation of our senior management structures.
Most importantly, our NEC had failed to meet in the immediate aftermath of the Emergency Budget and the most important challenge UNISON has ever faced.
Whilst the original decision to rearrange our timetable of meetings may have been taken by a good Bolshevik who favoured the discipline and effectiveness of October over the excessive enthusiasm of the July Days, I was nevertheless pleased to hear President Angela Lynes say that this decision would be reviewed for future years.
There won't be any time soon when a gap of more than three months between meetings of the UNISON NEC will be justifiable.
It was reported to last week's NEC meeting that we are growing at an annualised rate of 1.63% which means that - given a turnover in excess of 10% we are recruiting 12% of our membership each year.
This good news needs to be set against the scale of the challenges which we face - but it does show we can build the Union to fight back even in the most challenging circumstances.
As part of the discussion on pay at last week's NEC (about which I have just blogged) the recent "leak" that the School Support Staff Negotiating Body may never now sit was touched upon.
The relevant sector Committee within the Local Government Service Group has called for a consultative ballot to consider national industrial action if the Government do proceed to abolish the SSSNB.
Certainly the Government's approach of abolishing first and consulting later deserves a robust response, whatever one's view of the original wisdom of detaching school staff from the National Joint Council.
National industrial action by school support staff is an ambitious goal - but this is probably the only time when a national trade dispute around which such action could lawfully be organised will ever exist.
In the antepenultimate blog post of the reverse order report from last week's UNISON NEC I reach back to the discussion on pay, which for me at least had been somewhat overshadowed by the decision, the previous day, of UNISON's National Joint Council to support a claim for local government workers in England, Wales and Northern Ireland of "at least" £250 a year from 1 April 2011.
Since there is no evidence that public service workers who practice pay restraint are rewarded with job security I suppose I should be grateful that there is at least a claim, rather than no claim (as apparently mooted by at least one official of another union).
Although the claim could be seen as a canny ploy to exert some political pressure on the national local government employers to pay at least to the low paid the tiny increase offered by the Chancellor when he announced the pay freeze, it probably fails the test of effectiveness even on this basis. We could exert at least the same pressure on the basis of a claim which had some hope of motivating at least our activists.
The General Secretary made a more considered and far sighted contribution to this discussion when he observed that pay restraint always breaks down, but not normally in the first year. Whilst this does not seem at all like the first year of pay restraint for local government workers, it probably is true that we need to focus on the medium term to pursue the objective of a fair pay increase.
We don't do ourselves any favours if we compartmentalise our response.
Continuing the reverse order action-replay of (poorly) edited highlights of last week's meeting of the UNISON NEC would bring me to the item on Equal Pay.
As ever and for good reasons - cannot report in detail on this item because of the various legal cases still being taken by, or otherwise involving, the Union.
The major item for discussion at last week's UNISON NEC, led off by our General Secretary but also involving most of the other senior officers in the room in one way or another, was around a report entitled "Defending Public Services."
Dave Prentis made clear that this should be viewed as THE priority for our Union over the coming months, and should provide the focus and direction for all the activities of every part of our Union.
Probably because this was the first NEC meeting since Conference (and therefore also the first since the Emergency Budget) the combined length of the officer introductions to this 11 page report exceeded an hour, although as the report's author rightly pointed out; "UNISON must be judged by our actions in this period not the length and extent of our analysis."
Given the proposed review of timing for future NEC meetings (of which more below) the error of not having met in July will not, I hope, be repeated.
The report itself usefully summarised the attacks upon us from the Coalition Government and the response to date from UNISON and the wider trade union movement. Rather than repeat that here I will append the document to my report to London UNISON Branches.
The key point from this debate was that our defence of public services must be the central principle around which we organise all our trade union activity, building towards the TUC demonstration in March (and various elections in May) on the basis of local anti-cuts activity.
United on this basis we can be formidable. I hope we are.
A few days late, I shall aim to complete my reports from last Wednesday's full day meeting of UNISON's National Executive Council, which I shall blog in reverse order for no good reason whatsoever.
By the time we got to the agenda item for the General Secretary's Report we had already covered a lot of ground, but Dave asked the Head of Health to report on our response to the NHS White Paper.
We were told that UNISON's legal challenge to the White Paper (over the inadequacy of consultation) had sent "an almighty shudder through the Department for Health." The legal challenge is to be heard this Wednesday (http://www.bmj.com/content/341/bmj.c5398.extract) and we must hope it succeeds.
However, the best that this legal challenge can achieve will be delay and so we also need a campaign which must go beyond being a campaign "in" the NHS (though it must be the greatest of those there has ever been) to be a campaign "for" the NHS.
Once consortia of General Practitoners, expensively if not ably assisted by private consultants, start purchasing healthcare provision on the market, the "renationalisation" of the health service would probably require withdrawal from the European Union and abrogation of international treaty obligations.
The White Paper goes far further than any previous attempt to open up healthcare to private profit and would replace the National Health Service (in England) with a national healthcare market "free at the point of use" but increasingly prone to the development of two-tier provision as providers try to turn a profit.
For UNISON this is a great challenge to us to see to it that all our Service Groups and all our branches (even all our NEC members) are fully engaged in a struggle, which is in all our interests, to preserve the single greatest achievement of our movement.
A hat tip to fellow UNISON blogger Dave Watson for a useful summary of today's interim report attacking our pensions from Lord Hutton (http://unisondave.blogspot.com/2010/10/hutton-review.html) which saves me the bother of reading it on my day off.
Increased pension contributions are a de facto pay cut and will be a very clear indication that low paid public servants are to pay the price for the bail-out of the banks.
Coming on top of the changes to indexation which have already shaved up to 15% of the value of our income in retirement, Hutton's proposals look a lot like a declaration of war on public sector workers.
All of which reminds me that there is something that should be said to those public servants who voted Lib Dem in May.
But I shan't say it as I avoid obscenities when blogging.
Instead I shall coin a new swear word and simply say that those who voted for the Coalition parties were total Huttons.
I am pondering the irony of having a day off on World Day for Decent Work (http://www.wddw.org/).
Decent work is a modest aspiration but one which cannot consistently be achieved in a society in which labour power is a commodity.
Nevertheless, collective organisation in the workplace can make our working lives far more tolerable - not least by winning an adequate amount of annual leave.
Decent work will, of course, be further away for many public servants if the ConDems get their way with cuts in jobs and a pay freeze.
At the tail end of Dave Prentis' General Secretary's Report (of which more soon)(or not so soon) I asked some questions prompted by information from some London Borough branches.
I asked about the perceived tardiness of legal advice to branches facing significant challenges. I was advised that this was the first our General Secretary had heard of such a problem and that further details would elicit a further response. I will pursue this.
I also advocated our writing to members resident in the area of any local authority attacking our members, urging them to lobby Councillors against such attacks. I was advised that we do use this tactic but that its expense means that we employ it sparingly.
I concur with the views of the London Branch Secretary who felt that we should look at how to moderate the cost to the national union of this sensible tactic - by, for example, branch funds paying the postage and branch activists stuffing the envelopes.
As you will see when I get back to the beginning of the meeting, we have a single priority as a Union, which is to confront the ConDem cuts and their consequences, building alliances in our communities. To do this our branches need prompt and effective support from Regional and National level.
Continuing the reverse trawl through today's NEC meeting brings me to the discussion of the NUC at the NEC (NUC = New Union Centre, the somewhat delayed building rising on the site of the former Elizabeth Garrett Anderson hospital which will be our new HQ).
Today we were presented with recommendations from the Finance Committee that, rather than sell the freehold of Mabledon Place once we have vacated it, we should lease the site to a developer on a long lease in return for a cut of the rent which the leaseholder will receive from the tenant when the building has been refurbished.
My concern - which was met sufficiently that I voted for the recommendation - was that we should regularly consider selling the remaining freehold interest in the site. I was persuaded that we would have the flexibility to do this at any time when it was financially advantageous - and was swayed by the fact that the £13 Million we will get up front for the lease will pay off the loan we took out to build the "NUC".
Other NEC members raised the sound point that we could face problems if the leaseholder rented out a site which we still owned (as freeholder) to a tenant whose business was at odds with our aims and values.
Branches may wish to consider a Conference motion instructing the NEC to dispose of the freehold as soon as is consistent with the duties of our trustees (who appeared not to have been kept completely in the loop).
In fact, given the way this country is going under the ConDems and the possibility of further legal restrictions on the right to strike maybe we need to think about holding our reserves beyond the reach of the UK legal system altogether?
Five (Assistant) Heads are better than one?
For no good reason whatsoever I shall blog today's NEC meeting in reverse order and therefore begin with Roger Bannister's valiant - if doomed - attempt to move reference back of the report of the Staffing Committee (which I supported).
Roger was addressing the manner of the announcement to NEC members of the decision to recruit additional Assistant General Secretaries (AGSs) (about which I blogged when it was announced - http://jonrogers1963.blogspot.com/2010/08/four-more-voices-for-public-services.html).
Roger queried both the need for additional posts at this level and the decision to proceed with such an important decision without a discussion at the full NEC.
The debate saw a spirited defence of the decision from Dave Prentis and a reasoned intervention from lead North West Region NEC member Bernie Gallagher who highlighted the fact that attempts to debate the election of officials at Conference are ruled out of order for fear that they could breach the contracts of staff, yet here we are happily appointing new staff without even considering the option of electing to the newly created posts.
Dave Prentis told the NEC that since his letter in August the Union had thought again and that the posts were now being advertised openly. Whether or not this changes the outcome (and one need not be too much of a cynic to think that it won't) this does at least mean that the Union is behaving in a manner consistent with one of the common justifications for the appointment, rather than election, of officials (and in a manner less vulnerable to challenge).
Although I would support the election of these senior officials, if they are to be appointed at least we now know that anyone can apply and that the appointment panel can - at least in theory - choose from the widest pool of talent. I hope that those recruiting these senior officials will not play favourites or defer to anyone's presumed preferences.
So, dear reader, send those applications in now!
Here's the link for those reading this blog for career opportunities (who may be in the wrong place online) - http://guardianjobs.mobi/default.aspx?tem=ite&pa=0&gid=0&sid=0&job=79546.
Noting that we are advertising for five AGSs to fill the five posts I wonder what that means for the incumbent (http://pipl.com/directory/people/Bob/Abberley)?
The official report of today's UNISON NEC meeting is online within minutes of the end of the meeting (http://www.unison.co.uk/news/news_view.asp?did=6374).
What hope do mere bloggers have of keeping up!
Pop back here later for the unexpurgated and blatantly partial reports expected by regular readers Sid and Doris Blogger.
I have been reviewing the paperwork for next week's meeting of UNISON's Greater London Regional Council and am happy to spot a couple of progressive developments.
First, the NEC report has been relegated to the back of the Reports booklet even though it comes before many other reports on the agenda.
This is a welcome assertion, by the Regional Management Team in Greater London, of the primacy of the rank and file. My only regret is that - since I am the only one of the Region's four NEC members to have submitted a report - I am alone in being able to express my admiration.
Secondly, whilst I foolishly requested that the General Secretary's letter explaining the decision to appoint additional Assistant General Secretaries (whilst restricting the pool of applicants) should be copied to all delegates, the office has wisely decided to limit our carbon footprinted by not doing so.
It is surely a positive statement of the "Greening" of London UNISON that the Regional Secretary knew that there was no need to consult me in advance about the decision not to provide delegates with the report as I had intended.
This is a welcome assertion, by the Regional Management Team, of UNISON's "Green" credentials in the spirit of which I shall now ensure that the letter circulates far and wide electonically so that it does not deplete scarce resources.
As much as this apparent conversion of senior officials in UNISON's Greater London Region to the "Green Left" is unexpected, it is hardly unwelcome.
With the sad news today about Norman Wisdom, the last echoes of Albanian Communism are now gone - libertarian Green socialism offers a viable alternative which I commend to the Regional Management Team - and the Regional Council Officers who are nominally in charge - in UNISON's Greater London Region.
Tonight I travelled far into the Twilight Zone, where not all is as it seems.
I witnessed the Chief Executive of an ALMO who was visiting a resident's consultation meeting from an alternate universe.
An ALMO is an Arms Length Management Organisation and - when we lived on Planet New Labour we were meant to yearn for them as the least unpalatable device to unlock spending on Council Housing. Now we are on planet ConDem they are neither use nor ornament.
Obviously in the alternate universe from which the speaker I heard tonight had travelled there is still hope of funding targeted at ALMOs. That is not true on Earth.
In that universe ALMO's (governed by unaccountable boards restricted in what they can say to tenants and residents by their duties to "the company") are seen as more accountable than democratically elected local Councillors. That is not how they are seen on Earth.
Also in that universe, ALMOs which admit that they are making deep cuts in front line staff whilst increasing employment of "back office" staff become popular with Councillors and residents. This is not what would happen on Earth.
I can only hope that Lambeth's Labour Councillors live on Earth and not the alternate reality and that they are prepared to draw the obvious and necessary conclusions.
There is no point Councillors giving Lambeth's ALMO (Lambeth "Living") twelve months to improve if it uses the time to savage front line services so as to build up top heavy management and wasteful duplication.
The Twilight Zone was a marvellous TV show, but it's not a guide to good management of Council housing.
CBI - Conspiring to Bully Individuals at work?
Most employers think they should be allowed to boss us about. Most managers likewise believe that their larger pay packet gives them the right to call the shots in the workplace ("management's right to manage"). There may be an entire industry devoted to promoting "employee voice" and the "added value" from consultation but at the end of the day they believe in their power.
That's why we need trade unions - because our collective strength is the only antidote to the inequality inherent in the employment contract in a capitalist economy. Without collective organisation we are isolated and vulnerable as individuals. (All the more so as unemployment rises).
That's why the CBI want to make it even harder to take strike action (with legal protection) and easier for employers to undermine strikes (http://www.cbi.org.uk/ndbs/press.nsf/0363c1f07c6ca12a8025671c00381cc7/a1b868b57283cfd7802577ae002dfe0e?OpenDocument).
I particularly love the juxtaposition of their proposals that we'd have to give fourteen days notice of a strike whilst getting only thirty days notice of mass redundancies (http://m.guardian.co.uk/ms/p/gmg/op/sAPSXvBwFRdp_ev4Q2pP53Q/view.m?id=590821&tid=120787&cat=Search).
Hands up anyone whose union could decide upon, initiate and conclude an official ballot for industrial action in the 16 day gap that would allow!
The only good thing about this is that it has drawn a defence of our rights from the TUC (http://www.tuc.org.uk/industrial/tuc-18582-f0.cfm) in which Brendan Barber (think mild-mannered Clark Kent without the alter-ego) says of the right to strke that it is "a fundamental right that helps deliver decent standards at work for millions each and every day."
That is spot on. As infrequently as may use the right to strike, it is the fact that we could do so that gives us the leverage to bargain with employers on issues where there is a conflict of interest between employer and employees.
No wonder the lobby group for indolent rentiers and their overpaid corporate hirelings want to tighten the legal shackles on our class. It'll make it easier for them to exploit their workers.
If they get their way we are going to have to rethink an approach of slavish compliance with laws which already breach the United Kingdom's obligations to the International Labour Organisation.
The death knell for universalism?
Today’s announcement about the planned withdrawal of child benefit from higher rate tax payers is justified by the Chancellor on the basis that we shouldn’t tax the low paid to pay benefit to the higher paid.
But apply that logic more widely and it is a recipe to replace all universal benefits (in cash or kind) with means testing and fees. Why should we tax the low paid to fund hospital operations for those who are relatively more wealthy? Why should cleaners pay tax to fund the state education of the children of doctors and lawyers?
Because we – the working class (“by hand or by brain” as Clause IV used to say) really are “all in this together” – and not just at a time of crisis. Universal benefits funded by progressive taxation provide fairness in a manner which unifies the interests of all those who pay those taxes (“from each according to their means”) and use the services (“to each according to their needs”).
The combined impact of the plans of the Coalition Government will be – if we let them – to wipe out what is left of the Welfare State established after the Second World War.
The lessons of New Labour?
Someone called Tim Allan has emerged from well deserved obscurity to berate Ed Miliband in today's Observer (http://m.guardian.co.uk/ms/p/gmg/op/smBmnSswYJgAPSkOd_cicLg/view.m?id=590247&tid=120787&cat=Search). He's worried that young Ed may turn his back upon the "lessons of New Labour."
What are these lessons? That once the pound had crashed out of the Exchange Rate Mechanism the Tories were set to lose in 1997? That Labour could have won as a (rightward leaning) social democratic Old Labour under John Smith? That an expensive obsession with privatisation was damaging both politically and economically? That following a right-wing Republican President on an imperialist adventure was massively unpopular and wrong?
Apparently not. Mr Allan thinks Blairism is the key to future popularity.
Mind you I'm not inclined to take too seriously a commentator who asserts that the leadership election was "decided by trade unionists who are not even Party members after instruction from their union bosses."
He's wrong on two counts.
First political levy payers are affiliated members of the Party.
Secondly we all got individual votes and I was one of many who did not give my first preference in accordance with my Union's recommendation.
If this is the best the Blairites can manage they all deserve Mr Allan's obcurity. Who is he anyway? (http://en.m.wikipedia.org/wiki/File:Tim-nice-but-dim.jpeg?wasRedirected=true)?
Now that we have real Tories to worry about the cheerleaders for the corpse of New Labour are revealed as the irrelevance they should always have been. | 2019-04-21T02:20:23Z | http://jonrogers1963.blogspot.com/2010/10/ |
All purpose spray paint. Fast drying. Pistol grip handle easily snaps on aerosol cans. Wide, spring-action trigger and unique finger grips provide easy handling and reduced finger fatigue. All purpose spray paint. Fast drying.
All purpose household spray paint. Fast-drying All purpose household spray paint. Fast-drying All purpose spray paint. Fast drying.
Fast drying, for general use on wood, wicker metal and crafts. Provides rich, shiny finish for decorating and accent pieces. Made with real metal leafing flakes. Fast-drying. Provides rich, shiny finish for decorating and accent pieces. Made with real metal leafing flakes. Fast-drying.
Provides rich, shiny finish for decorating and accent pieces. Made with real metal leafing flakes. Fast-drying. Provides rich, shiny finish for decorating and accent pieces. Made with real metal leafing flakes. Fast-drying. Fast drying, for general use on wood, wicker metal and crafts.
Used for decorating and for accent pieces. Fast-dry. Formula can be used on virtually any surface. Used for decorating and for accent pieces. Fast-dry. Formula can be used on virtually any surface. Fast drying, for general use on wood, wicker metal and crafts.
Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading. Non-reflective camouflaging colors. When combined together in a variety of patterns the colors achieve a perfect blend with nature on any terrain. Quick dry formula can be used on wood or metal, hunting equipment, vehicles, boats and more. Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading.
Rustoleum 249082 Ultra-Cover 2X General Purpose Topcoat Enamel Spray Paint, Colonial Red?
Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading. Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading. Non-reflective camouflaging colors. When combined together in a variety of patterns the colors achieve a perfect blend with nature on any terrain. Quick dry formula can be used on wood or metal, hunting equipment, vehicles, boats and more.
Rustoleum Painter's Touch Ultra-Cover 2X General Purpose Topcoat Enamel Spray Paint, Apple Red?
Non-reflective camouflaging colors. When combined together in a variety of patterns the colors achieve a perfect blend with nature on any terrain. Quick dry formula can be used on wood or metal, hunting equipment, vehicles, boats and more. Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading. Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading.
Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading. Durable protective finish. Designed to refresh old, worn looking appliance surfaces. Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading.
Rustoleum 249116 Ultra-Cover 2X General Purpose Topcoat Enamel Spray Paint, Colonial Red?
Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading. Resist water and weather on metal, protecting the substrate from rust and corrosion. Resist water and weather on metal, protecting the substrate from rust and corrosion.
Non-reflective camouflaging colors. When combined together in a variety of patterns the colors achieve a perfect blend with nature on any terrain. Quick dry formula can be used on wood or metal, hunting equipment, vehicles, boats and more. Resist water and weather on metal, protecting the substrate from rust and corrosion. Resist water and weather on metal, protecting the substrate from rust and corrosion.
Prevents glitter from flaking. Maintains sparkle and color without fading. For use on wood, metal, wicker, plastic, glass, ceramic, pottery, craft foam, paper mache, and paper. Clear. Resists heat up to 1,200 degrees Fahrenheit. Specially formulated with silicone and heat-resisting pigments to provide a rich satin finish that resists heat and weathering. Ideal for barbecue grills, wood-burning and coal stoves, fireplaces, etc. Resists heat up to 1,200 degrees Fahrenheit. Specially formulated with silicone and heat-resisting pigments to provide a rich satin finish that resists heat and weathering. Ideal for barbecue grills, wood-burning and coal stoves, fireplaces, etc.
Resists heat up to 1,200 degrees Fahrenheit. Specially formulated with silicone and heat-resisting pigments to provide a rich satin finish that resists heat and weathering. Ideal for barbecue grills, wood-burning and coal stoves, fireplaces, etc. Resists heat up to 1,200 degrees Fahrenheit. Specially formulated with silicone and heat-resisting pigments to provide a rich satin finish that resists heat and weathering. Ideal for barbecue grills, wood-burning and coal stoves, fireplaces, etc. Paintable rubberized black coating protects metal surfaces from corrosion and moisture. Rust preventive formula provides a barrier from rust on cars, trucks, trailers and other recreational vehicles. Hold can 12-16" from surface and spray in a steady back and forth motion, slightly overlapping each stroke. For best results, apply two coats. Aerosol can.
Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading. Resists heat up to 1,200 degrees Fahrenheit. Specially formulated with silicone and heat-resisting pigments to provide a rich satin finish that resists heat and weathering. Ideal for barbecue grills, wood-burning and coal stoves, fireplaces, etc. Converts wood, metal, plastic, glass, paperboard and hardboard into writable/erasable surfaces. Formulated with extremely hard pigments. Use for kids' projects and resurfacing Ping-Pong tables.
Formulated for plastic. Delivers twice the coverage, the advanced Double Cover Technology provides the best formula for ultimate hiding power, which allows projects to be completed faster and easier. Apply to wood, wicker, metal, plaster or unglazed ceramic. Fast-dry formula resists chipping and fading. Scatters light coming through the glass without letting anyone see through preserving privacy. Gives a decorative etched glass look to windows, mirrors and shower doors. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping.
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Used for bringing bright vibrant color to sporting goods, crafts, toys, kids' decorations and more. Also great for stenciling, marking, color-coding and wherever high visibility is desired. Good for Halloween or hunting season.
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Used for bringing bright vibrant color to sporting goods, crafts, toys, kids' decorations and more. Also great for stenciling, marking, color-coding and wherever high visibility is desired. Good for Halloween or hunting season. Used for bringing bright vibrant color to sporting goods, crafts, toys, kids' decorations and more. Also great for stenciling, marking, color-coding and wherever high visibility is desired. Good for Halloween or hunting season.
Rustoleum Stops Rust Rust Preventive Protective Enamel Spray Paint, 12 oz, Carnival Red?
Applies a low-sheen finish to metal, wood or wicker. Dries into a smooth, protective enamel. Durable, corrosion-resistant. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping.
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Applies a low-sheen finish to metal, wood or wicker. Dries into a smooth, protective enamel. Durable, corrosion-resistant. Applies a low-sheen finish to metal, wood or wicker. Dries into a smooth, protective enamel. Durable, corrosion-resistant.
Applies a low-sheen finish to metal, wood or wicker. Dries into a smooth, protective enamel. Durable, corrosion-resistant. Applies a low-sheen finish to metal, wood or wicker. Dries into a smooth, protective enamel. Durable, corrosion-resistant. Tough, rust-inhibiting base that works well under most automotive paints and "Stops Rust" finishes. Fast-drying formula can be top coated or wet-sanded to an ultra-smooth finish in just 15 minutes.
Tough, rust-inhibiting base that works well under most automotive paints and "Stops Rust" finishes. Fast-drying formula can be top coated or wet-sanded to an ultra-smooth finish in just 15 minutes. Inhibits rust on clean, lightly rusted, or painted metal. Contains heavy concentrations of anti-corrosive additives that protect metal surfaces against rust. Can be covered with any top coat. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping.
Tough, rust-inhibiting base that works well under most automotive paints and "Stops Rust" finishes. Fast-drying formula can be top coated or wet-sanded to an ultra-smooth finish in just 15 minutes. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping.
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Prevents corrosion and tarnishing on aluminum, brass or copper. Resists chipping and restores original gloss and color. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping.
Specialized formula penetrates rust to bare metal and drives out corrosive air and moisture. Bonds tightly to rust to form a surface top coats can adhere to. Durable. Fast-drying. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping.
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Applies a low-sheen finish to metal, wood or wicker. Dries into a smooth, protective enamel. Durable, corrosion-resistant.
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Renew or change colors of plastic items. Primer sprays on fast and easy, providing a tight bond for the top coat for superior paint adhesion and durability on plastic. Adheres to hard-to-paint surfaces. Can be coated with nearly any spray paint.
Rustoleum Stops Rust Rust Preventive Protective Enamel Spray Paint, 12 oz Aerosol Can, Sunrise Red?
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Hi-build formula that fills in minor imperfections in the surface and improves top coat adhesion and appearance. For use on metal, wood and fiberglass surfaces. Any-angle spray can with comfort tip. Use outdoors or in a well-ventilated area such as an open garage. Hi-build formula that fills in minor imperfections in the surface and improves top coat adhesion and appearance. For use on metal, wood and fiberglass surfaces. Any-angle spray can with comfort tip. Use outdoors or in a well-ventilated area such as an open garage.
Specialized formula penetrates rust to bare metal and drives out corrosive air and moisture. Bonds tightly to rust to form a surface top coats can adhere to. Durable. Fast-drying. Applies a low-sheen finish to metal, wood or wicker. Dries into a smooth, protective enamel. Durable, corrosion-resistant. Creates a baked-glazed finish without the heat. Creates a glass-like coating that is both decorative and protective.
Add a non-glossy finish to artwork and other decorative projects. Adds a layer of protection without glossiness or glare. Transform a spray can into a professional spray gun. Improves accuracy and control. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping.
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Applies a low-sheen finish to metal, wood or wicker. Dries into a smooth, protective enamel. Durable, corrosion-resistant. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping.
Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Long-lasting protection and beauty, retains appearance and qualities months after exposure to the elements. Elasticity, stands up to stress, expands and contracts under changing conditions with less peeling, cracking and chipping. Water-repellent paint for metal surfaces in kitchens and bathrooms. Washes easily, resists abrasion, moisture and scratching. Self-leveling formula creates a smooth factory-like finish.
Durable protective finish. Designed to refresh old, worn looking appliance surfaces. Water-repellent paint for metal surfaces in kitchens and bathrooms. Washes easily, resists abrasion, moisture and scratching. Self-leveling formula creates a smooth factory-like finish. Water-repellent paint for metal surfaces in kitchens and bathrooms. Washes easily, resists abrasion, moisture and scratching. Self-leveling formula creates a smooth factory-like finish.
Water-repellent paint for metal surfaces in kitchens and bathrooms. Washes easily, resists abrasion, moisture and scratching. Self-leveling formula creates a smooth factory-like finish. Turn outside surfaces into playing fields, games, signs or outdoor masterpieces. Spray Chalk instantly turns to powder as it comes out of the can creating cool sidewalk chalk looks with a spray can effect. Spray on grass, asphalt, snow and more! The pet and vegetation friendly formula dissolves naturally in the rain. Color fades to white naturally in 7 days; washes away with water. Layer multiple colors when wet to create new colors. For outdoor use and temporary markings only. 6oz. sprays up to 80 linear feet. Turn outside surfaces into playing fields, games, signs or outdoor masterpieces. Spray Chalk instantly turns to powder as it comes out of the can creating cool sidewalk chalk looks with a spray can effect. Spray on grass, asphalt, snow and more! The pet and vegetation friendly formula dissolves naturally in the rain. Color fades to white naturally in 7 days; washes away with water. Layer multiple colors when wet to create new colors. For outdoor use and temporary markings only. 6oz. sprays up to 80 linear feet.
Turn outside surfaces into playing fields, games, signs or outdoor masterpieces. Spray Chalk instantly turns to powder as it comes out of the can creating cool sidewalk chalk looks with a spray can effect. Spray on grass, asphalt, snow and more! The pet and vegetation friendly formula dissolves naturally in the rain. Color fades to white naturally in 7 days; washes away with water. Layer multiple colors when wet to create new colors. For outdoor use and temporary markings only. 6oz. sprays up to 80 linear feet. Turn outside surfaces into playing fields, games, signs or outdoor masterpieces. Spray Chalk instantly turns to powder as it comes out of the can creating cool sidewalk chalk looks with a spray can effect. Spray on grass, asphalt, snow and more! The pet and vegetation friendly formula dissolves naturally in the rain. Color fades to white naturally in 7 days; washes away with water. Layer multiple colors when wet to create new colors. For outdoor use and temporary markings only. 6oz. sprays up to 80 linear feet. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide.
Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide.
Etches and primes in one easy step, prepares bare metal, aluminum and fiberglass surfaces to promote maximum adhesion and smoothness of the top coat. Formulated to stop rust and is an essential step to achieve a professionally finished look. Any-angle spray can with comfort tip. Use outdoors or in a well-ventilated area such as an open garage. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide.
Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide.
Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use to make any surface safe and provide protection from weather conditions, moisture, and industrial fumes. Can be sprayed on metal, plastic, wood, and masonry. High visibility. For industrial and home use.
Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide.
Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Rust-Oleum Primer Sealer helps bond base coats to the surface to achieve a uniform and smooth final finish. When applied over a Rust-Oleum Automotive Primer it also prevents top coat paint from soaking into the primed surface. Any-angle spray can with comfort tip. For best results, apply two coats (allow product to dry for 1-2 minutes between coats). Use outdoors or in a well-ventilated area such as an open garage.
Renews and restores color on vinyl and fabrics. Fast drying. Durable. Use for car and boat seats, dashboards, upholstery, luggage, furniture, sports equipment and more. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Heavy-duty rust prevention for machinery and farm equipment. Superior rust-inhibitive topcoats, specially formulated to match original equipment colors.
Heavy-duty rust prevention for machinery and farm equipment. Superior rust-inhibitive topcoats, specially formulated to match original equipment colors. Heavy-duty rust prevention for machinery and farm equipment. Superior rust-inhibitive topcoats, specially formulated to match original equipment colors. Heavy-duty rust prevention for machinery and farm equipment. Superior rust-inhibitive topcoats, specially formulated to match original equipment colors.
Heavy-duty rust prevention for machinery and farm equipment. Superior rust-inhibitive topcoats, specially formulated to match original equipment colors. Heavy-duty rust prevention for machinery and farm equipment. Superior rust-inhibitive topcoats, specially formulated to match original equipment colors. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide.
Durable weather-resistant, long lasting. Colors meet manufacturers' specifications for farm, lawn, and garden equipment. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use to make any surface safe and provide protection from weather conditions, moisture, and industrial fumes. Can be sprayed on metal, plastic, wood, and masonry. High visibility. For industrial and home use.
Use to make any surface safe and provide protection from weather conditions, moisture, and industrial fumes. Can be sprayed on metal, plastic, wood, and masonry. High visibility. For industrial and home use. Use to make any surface safe and provide protection from weather conditions, moisture, and industrial fumes. Can be sprayed on metal, plastic, wood, and masonry. High visibility. For industrial and home use. Durable weather-resistant, long lasting. Colors meet manufacturers' specifications for farm, lawn, and garden equipment.
Use for marking athletic fields, sporting events, landscaping playgrounds, work sites and more. Marks crisp, fast-dry, high-visibility lines on grass, pavement, cement, gravel, dirt, lumber and more. Non-clogging inverted tip. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide.
Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenheit. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku# 826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide.
Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Use for marking concrete, pavement, gravel, grass, and more. Use to mark the location of underground utilities at construction and excavation sites where identification is desired. Features a precision-line spray tip for easy-to-read, bright, vivid markings. Can be applied down to 25-degree Fahrenhiet. Dries in less than 5 minutes. Spray-through cap. Tip keeps paint off fingers. Use with sku#826.4608. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Covers approximately 600-700 linear feet at 1 in. wide. Renews and restores color on vinyl and fabrics. Fast drying. Durable. Use for car and boat seats, dashboards, upholstery, luggage, furniture, sports equipment and more.
Designate a no-hunting zone without posting traditional signs. Weather-resistant formula legally indicates a no-hunting/trespassing/fishing zone in participating states. Water-repellent paint for metal surfaces in kitchens and bathrooms. Washes easily, resists abrasion, moisture and scratching. Self-leveling formula creates a smooth factory-like finish. For general purpose use on wood, metal, plastic, wicker & masonry. Fights rust. Dries in 5 minutes. No drip formula. Features spray anyway valve.
For general purpose use on wood, metal, plastic, wicker & masonry. Fights rust. Dries in 5 minutes. No drip formula. Features spray anyway valve. For general purpose use on wood, metal, plastic, wicker & masonry. Fights rust. Dries in 5 minutes. No drip formula. Features spray anyway valve. For general purpose use on wood, metal, plastic, wicker & masonry. Fights rust. Dries in 5 minutes. No drip formula. Features spray anyway valve.
For general purpose use on wood, metal, plastic, wicker & masonry. Fights rust. Dries in 5 minutes. No drip formula. Features spray anyway valve. For general purpose use on wood, metal, plastic, wicker & masonry. Fights rust. Dries in 5 minutes. No drip formula. Features spray anyway valve. Primes craft foam surfaces for paint. Protects craft foam from melting or damage. For best application allow 48 hours for primer to cure before applying colored top coat.
Contains a high zinc content in the dry film for ultimate galvanic protection. Excellent corrosion protection. Adheres to galvanized metal. Fast-drying. USDA acceptable. Creates a smooth finish and is formulated for use on automotive engines and other automotive surfaces. Resists heat up to 500 degrees Fahrenheit, gas and oil resistant, stops rust formula, can be sprayed at any angle with comfort tip. Provides a bright, polished metallic finish on a variety of projects. Ideal for furniture, decor and crafts. Easy to use. Dries quickly.
Creates a smooth finish and is formulated for use on automotive engines and other automotive surfaces. Resists heat up to 500 degrees Fahrenheit, gas and oil resistant, stops rust formula, can be sprayed at any angle with comfort tip. Offers maximum visibility and safety in home, office, or shop, can be used on wood, metal, cloth and most plastics. Offers maximum visibility and safety in home, office, or shop, can be used on wood, metal, cloth and most plastics.
Offers maximum visibility and safety in home, office, or shop, can be used on wood, metal, cloth and most plastics. Offers maximum visibility and safety in home, office, or shop, can be used on wood, metal, cloth and most plastics. Provides a bright, polished metallic finish on a variety of projects. Ideal for furniture, decor and crafts. Easy to use. Dries quickly.
Provides a bright, polished metallic finish on a variety of projects. Ideal for furniture, decor and crafts. Easy to use. Dries quickly. Bonds to bare metal and helps create a smooth top-coat finish. Specially formulated to prevent rust. Recommended for use on automotive engines and other automotive surfaces which reach intermittent temperatures up to 500-degrees F. Stops Rust formula. Any-angle spray with comfort tip. Offers maximum visibility and safety in home, office, or shop, can be used on wood, metal, cloth and most plastics.
For use on wood, metal, plastic, paper mache, glass, plaster, ceramic, paper, and wicker. Dries quickly to a brilliant shine. No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup. Use to mark aisles, lift truck routes, pallet positions, hazardous areas and commercial parking lots. Creates crisp and clean, long-lasting lines. Use on concrete, grass, gravel or other types of pavement. Produces approximately 150 linear feet of a 4" stripe. Use with striping machine sku#142.9455 or striping wand sku#897.1350. USDA acceptable. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995.
Use to mark aisles, lift truck routes, pallet positions, hazardous areas and commercial parking lots. Creates crisp and clean, long-lasting lines. Use on concrete, grass, gravel or other types of pavement. Produces approximately 150 linear feet of a 4" stripe. Use with striping machine sku#142.9455 or striping wand sku#897.1350. USDA acceptable. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup. No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup.
No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup. Use to mark aisles, lift truck routes, pallet positions, hazardous areas and commercial parking lots. Creates crisp and clean, long-lasting lines. Use on concrete, grass, gravel or other types of pavement. Produces approximately 150 linear feet of a 4" stripe. Use with striping machine sku#142.9455 or striping wand sku#897.1350. USDA acceptable. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Rust inhibiting and water resistant to protect wood and metal from the elements. Provides camouflage with any nature background. For use on vehicles, boats, trailers, duck blinds, free stands, ladders, ladder stands, guns, bows, etc.
Rust inhibiting and water resistant to protect wood and metal from the elements. Provides camouflage with any nature background. For use on vehicles, boats, trailers, duck blinds, free stands, ladders, ladder stands, guns, bows, etc. Rust inhibiting and water resistant to protect wood and metal from the elements. Provides camouflage with any nature background. For use on vehicles, boats, trailers, duck blinds, free stands, ladders, ladder stands, guns, bows, etc. No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup.
Provides superior coverage and hiding. Apply to metal, wood, concrete and masonry in heavy-duty and commercial environments. Retains color against the elements. Fast drying. Durable. Provides superior coverage and hiding. Apply to metal, wood, concrete and masonry in heavy-duty and commercial environments. Retains color against the elements. Fast drying. Durable. Provides superior coverage and hiding. Apply to metal, wood, concrete and masonry in heavy-duty and commercial environments. Retains color against the elements. Fast drying. Durable.
Rustoleum Professional High Performance Topcoat Enamel Spray Paint, 15 oz Aerosol Can, Safety Red?
Provides superior coverage and hiding. Apply to metal, wood, concrete and masonry in heavy-duty and commercial environments. Retains color against the elements. Fast drying. Durable. Provides superior coverage and hiding. Apply to metal, wood, concrete and masonry in heavy-duty and commercial environments. Retains color against the elements. Fast drying. Durable. No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup.
Durable weather-resistant, long lasting. Colors meet manufacturers' specifications for farm, lawn, and garden equipment. Use on engines, exhaust manifolds and pipes. Withstands 1,200 degrees Fahrenheit. Durable finish with Heat-Guard protection. Protects against rust. Use on engines, exhaust manifolds and pipes. Withstands 1,200 degrees Fahrenheit. Durable finish with Heat-Guard protection. Protects against rust.
Rustoleum Industrial Choice S1600 System Inverted Solvent Based Striping Spray Paint, 18 oz, Red?
No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup. Use to mark aisles, lift truck routes, pallet positions, hazardous areas and commercial parking lots. Creates crisp and clean, long-lasting lines. Use on concrete, grass, gravel or other types of pavement. Produces approximately 150 linear feet of a 4" stripe. Use with striping machine sku#142.9455 or striping wand sku#897.1350. USDA acceptable. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup.
No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup. For striping athletic fields. Dries fast in 30 minutes. Creates sharp, well-defined lines. Good hide with one application. Safe for use on grass. Smudge-resistant. Durable. Use with athletic field inverted striping machine sku#826.7908. No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup.
Use to mark aisles, lift truck routes, pallet positions, hazardous areas and commercial parking lots. Creates crisp and clean, long-lasting lines. Use on concrete, grass, gravel or other types of pavement. Produces approximately 150 linear feet of a 4" stripe. Use with striping machine sku#142.9455 or striping wand sku#897.1350. USDA acceptable. Can be used in USDA facilities based on FSIS Directive 11,000.4 (Rev. 1), November 24, 1995. Eliminates rust and primes the surface. Eliminates rust and primes the surface.
For striping athletic fields. Dries fast in 30 minutes. Creates sharp, well-defined lines. Good hide with one application. Safe for use on grass. Smudge-resistant. Durable. Use with athletic field inverted striping machine sku#826.7908. No primer needed spray directly on metal surfaces. Stops future rust from forming and dries in less than 30 minutes. Low odor, one-coat coverage. Easy soap and water cleanup. For striping athletic fields. Dries fast in 30 minutes. Creates sharp, well-defined lines. Good hide with one application. Safe for use on grass. Smudge-resistant. Durable. Use with athletic field inverted striping machine sku#826.7908.
Provides maximum corrosion protection and long lasting durability. Professional finish provides resistance to chipping, cracking and peeling. Can be used on surfaces that reach temperatures up to 200-fahrenheit. Dries fast. Gloss retention. For general purpose use on wood, metal, plastic, wicker & masonry. Fights rust. Dries in 5 minutes. No drip formula. Features spray anyway valve. For general purpose use on wood, metal, plastic, wicker & masonry. Fights rust. Dries in 5 minutes. No drip formula. Features spray anyway valve.
Adds a colorful touch to any glass surface. Translucent paint for glass. For indoor decorating. Creates a smooth, slate-like finish, perfect for creating or resurfacing chalkboard surfaces. For use on wood, metal, glass, plaster and ceramic. Use as a utility marking on golf courses, landscaping, construction sites, and surveying. Designed to be sprayed in an inverted position. Produces vivid marks, does not clog, and is safe for grass. Meets APWA color standards and can be sprayed by hand or with the Z-605 marking gun or Z-606 marking wand.
Use as a utility marking on golf courses, landscaping, construction sites, and surveying. Designed to be sprayed in an inverted position. Produces vivid marks, does not clog, and is safe for grass. Meets APWA color standards and can be sprayed by hand or with the Z-605 marking gun or Z-606 marking wand. Use as a utility marking on golf courses, landscaping, construction sites, and surveying. Designed to be sprayed in an inverted position. Produces vivid marks, does not clog, and is safe for grass. Meets APWA color standards and can be sprayed by hand or with the Z-605 marking gun or Z-606 marking wand. Use as a utility marking on golf courses, landscaping, construction sites, and surveying. Designed to be sprayed in an inverted position. Produces vivid marks, does not clog, and is safe for grass. Meets APWA color standards and can be sprayed by hand or with the Z-605 marking gun or Z-606 marking wand.
Enhances the look and color of your vehicle's wheels while keeping the surface free from rust. Recommended for use on plastic hubcaps and wheels made of aluminum or steel. Long lasting finish. Any-Angle spray with comfort tip. Enhances the look and color of your vehicle's wheels while keeping the surface free from rust. Recommended for use on plastic hubcaps and wheels made of aluminum or steel. Long lasting finish. Any-Angle spray with comfort tip. One-step spray paint matches high-end look in multiple colors. Create a premium finish on interior/exterior metal & wood surfaces.
Durable, corrosion-resistant. Premium high-end finish. Combines a rich metallic with a fine textured finish. Applies to metal, wood and more. Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements. For premium patio furniture and metal objects. Use to achieve a new contemporary look on previously coated products all around the home.
For premium patio furniture and metal objects. Use to achieve a new contemporary look on previously coated products all around the home. For premium patio furniture and metal objects. Use to achieve a new contemporary look on previously coated products all around the home. For premium patio furniture and metal objects. Use to achieve a new contemporary look on previously coated products all around the home.
Designed to be applied right over rust for a distinctive hammered metal appearance with Stops Rust protection. Hides flaws and imperfections in scratched, rusted and pitted metal with minimal surface preparation. Designed to be applied right over rust for a distinctive hammered metal appearance with Stops Rust protection. Hides flaws and imperfections in scratched, rusted and pitted metal with minimal surface preparation. Designed to be applied right over rust for a distinctive hammered metal appearance with Stops Rust protection. Hides flaws and imperfections in scratched, rusted and pitted metal with minimal surface preparation.
Designed to be applied right over rust for a distinctive hammered metal appearance with Stops Rust protection. Hides flaws and imperfections in scratched, rusted and pitted metal with minimal surface preparation. Designed to be applied right over rust for a distinctive hammered metal appearance with Stops Rust protection. Hides flaws and imperfections in scratched, rusted and pitted metal with minimal surface preparation. Use on engines, exhaust manifolds and pipes. Withstands 1,200 degrees Fahrenheit. Durable finish with Heat-Guard protection. Protects against rust.
Provides a bright, polished metallic finish on a variety of projects. Ideal for furniture, decor and crafts. Easy to use. Dries quickly. Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements. Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements.
Rustoleum Professional High Performance Topcoat Enamel Spray Paint, 15 oz Aerosol Can, Regal Red?
Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements. Zinc-rich primer provides ultimate rust prevention on clean, lightly rusted or galvanized metal. Protects metal like hot-dip galvanizing. Use for recoating galvanized steel, sheet metal and fences. Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements.
Rustoleum Professional Primer Spray, 15 oz Aerosol, Liquid, Red?
Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements. Provides superior coverage and hiding. Fast-drying, indoor or outdoor, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements. Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements.
Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements. Provides superior coverage and hiding. Fast-drying, durable, corrosion-resistant. Apply to metal, wood, concrete and masonry in heavy duty and commercial environments. Retains color against the elements. Durable, corrosion-resistant. Premium high-end finish. Combines a rich metallic with a fine textured finish. Applies to metal, wood and more. | 2019-04-23T00:42:23Z | https://www.thevillagemercantile.com/category-s/16202.htm |
Annu. Rev. Plant Biol. 2008.59:67-88. Downloaded from www.annualreviews.org by University of Uppsala on 12/13/12. For personal use only.
Leaves and stems are ultimately derived from the shoot apical meristem (SAM); leaves arise from the peripheral zone of the SAM and stem tissue is derived from both the peripheral and central zones of the SAM. Both the peripheral and central regions of the SAM are formed during embryogenesis when the basic body plan of the plant is established. Interplay between points of maximal concentration of auxin and specific patterns of transcription of both auxin-responsive transcription factors and other patterning genes subdivide the embryo along both the apical-basal and central-peripheral axes. Differential gene expression along these axes leads to the differentiation of tissues, lateral organs, meristems, and boundary regions, each with varying responsiveness to auxin. Subsequent shoot growth and development is a reiteration of basic patterning processes established during embryogenesis.
THE DEVELOPMENT AND EVOLUTIONARY CONTEXT FOR ANALYSIS OF PATTERNING OF THE SHOOT SYSTEM . . . . . . . . . . . . . . . ORIGIN OF PATTERN FORMATION IN ARABIDOPSIS SPOROPHYTES . . . . . . . . . . . . . . . . The Flow of Auxin . . . . . . . . . . . . . . . Interplay . . . . . . . . . . . . . . . . . . . . . . . . . Insights into Temporal Aspects of Auxin Biology and Gene Expression . . . . . . . . . . . . . . . . . . . . EXTRAPOLATING THE ARABIDOPSIS MODEL TO OTHER SEED PLANTS . . . . . . . . CONCLUDING REMARKS . . . . . . .
Figure 1 Shoot apex of Ginkgo biloba. The shoot apical meristem includes the central zone (cz) of larger vacuolate cells and the peripheral zone (pz) of smaller, less vacuolate cells. Leaves are derived from the peripheral zone whereas both the peripheral and central zone contribute to the stem. Leaf primordia are labeled youngest (p0) to oldest (p3). Note the many mitotic figures ( yellow arrows) in the peripheral zone associated with p0.
For personal use only. leaves.org by University of Uppsala on 12/13/12. are propagated during the remainder of the sporophytic phase of the life cycle. an understanding of the underlying molecular processes of these early stages can. Nonetheless. One 69 www. it is clear that position largely determines cell fate in most contexts. the study of embryogenesis contributes to our understanding of the SAM (56).org • Seed Plant Shoot Patterning and Polarity . analyses focusing on the initial patterning events may be informed by findings from the study of the SAM and conversely. and the programs necessary for the generation of lateral organs. Although this may merely be due to our present ignorance of the molecular mechanisms of plant development. and roots. although the reiterative nature of plant development renders the demarcation between embryogenesis and postembryonic development nebulous (16. to a large degree. be extrapolated to the rest of the growth and development of the sporophyte. the cotyledons. and highlight a few key events about which little is presently known. when seeds are shed from the parent plant and dispersed. The sporophyte (diploid) generation of seed plants (like all vascular plants) is capable of continuous development through the activities of shoot and root meristems. The developmental patterning that is established during embryogenesis is repeated throughout the life of the plant. This work has focused on the model system Arabidopsis. where many small. as in the files of cells readily apparent in the epidermises of stems. all the major pattern elements of the sporophyte body plan are established during the time between fertilization of the female gametophyte by the male gametophyte and the onset of seed dormancy. symmetry in the embryo. 95) and the ideas and experimental data in this review need to be considered in light of these other recent reviews on related topics. Downloaded from www. 2008.of leaf primordia from the peripheral zone.annualreviews. it is often convenient to think of seed development as embryogenesis. it is also possible that molecules other than peptides may be more important. peptide signaling molecules have been identified as critical for developmental patterning. Plant Biol. In general terms. Rev. implicating a role for signaling molecules. few such molecules have been identified in plants. secreted. and proximo-distal axes of the plant and its first lateral organs. Thus. Annu. 56). and control of phyllotaxy. For the purposes of this review we will use the term embryogenesis to encompass the developmental period in which the basic apical-basal. 54) and aspects of leaf development (7. The stage of development where the basic body plan of the seed plant sporophyte is established is often referred to as embryogenesis. the radial axis.59:67-88. Unlike animals. Other excellent reviews highlight additional aspects of body plan establishment in Arabidopsis (12. development is the process by which different cells of a multicellular organism attain different fates. 25. are established. For many species.annualreviews. Finally we discuss the significance of the emerging developmen- tal genetic data for understanding the nature of some of the concepts in plant development. Here we attempt to survey a limited number of recent findings that contribute toward understanding the development of the shoot system. which is amenable to genetic analysis and manipulation. this corresponds to the time between the formation of the zygote by fertilization of the female gametophyte and seed dormancy. It must be noted that this is not always the case because some species do not undergo a ‘dormant stage’. including the apical-basal axis. and the seeds of many species contain ‘embryos’ with several leaves in addition to the cotyledons. radial. Thus. such as cytohistological zonation in the SAM. We then attempt to extrapolate as to how generally applicable the developmental processes discovered in Arabidopsis are likely to be for other flowering plants and seed plants. 22. Although cell lineages are often visually conspicuous in plants. The basic patterns set up during this developmental window. and the establishment of differential growth. ORIGIN OF PATTERN FORMATION IN ARABIDOPSIS SPOROPHYTES In Arabidopsis.
2008.such molecule that has a pervasive role in plant development is auxin (12. Thus. auxin may act in an instructive manner. and predicted auxin flow during Arabidopsis embryogenesis. Apical cell Determining how these gradients are established and how they are modulated is critical to understanding pattern formation in plants. Following fertilization. Downloaded from www. Chalazal Suspensor Zygote Zygote Mic Micropylar c py cropy ylar 1-cell 2-cell 2-cell Figure 2 PIN FORMED (PIN) expression. 53. 70 4-cell 8-cell 16+-cell * * Early-globular Mid-globular Late-globular Transition Early-heart PIN7 PIN1 * * Predicted auxin flow Low DR5 expression High DR5 expression Mid-heart PIN1::PIN1:GFP DR5 negative auxin maxima? Bowman · Floyd . auxin maxima. establishment of the apical-basal axis. Indeed. three major patterning events in angiosperm embryogenesis. 60.org by University of Uppsala on 12/13/12. establishent of the central-peripheral axes. the Annu. and subsequently. and initation of lateral organs (cotyledons). 25. Reversals in PIN1 polarity marking the establishment of the cotyledons. Rev. PIN1::PIN1:GFP in a late heart stage wild-type embryo. The Flow of Auxin In Arabidopsis apical-basal polarity of the sporophyte correlates with a polarity already established in the female gametophyte (Figure 2). For personal use only.59:67-88. auxin flow back toward the meristem following cotyledon formation are demarcated with asterisks. are correlated with dynamic patterns of auxin concentration and flux. 98). with the potential for concentration gradients to pattern developmental events. 13. Plant Biol.annualreviews.
It is tempting to speculate that an asymmetric distribution of auxin between two daughter cells whose chromatin status reflects an embryonic cell fate may be sufficient to result in a progression into an embryonic developmental program. www. including embryos lacking apical-basal polarity and consisting of a file of suspensor-like cells. development of a second embryo. Plant Biol. Rev. an establishment of upward flow of auxin in the protodermal layer and thence downwards through the center contributes to axial elongation of the future procambium in the late globular embryo. 2008. 99).59:67-88. Thus. derived from cells normally fated to be extraembryonic suspensor cells. if not instructive. experiments using reporter genes. Embryo polarity could be established in the egg cell prior to fertilization because Arabidopsis egg cells are distinctly polar with a large vacuole at the micropylar end and the nucleus positioned at the chalazal end (66).annualreviews. which will give rise to most of the embryo proper. indicates that embryonic polarity can be established autonomously. Secondly. Third. First.annualreviews. auxin is thought to be drained from the embryo during the globular stage owing to the basa1 expression of PIN1. the production of somatic embryos. Two observations suggest that embryonic patterning may be largely autonomous. a 71 Annu. this is likely due to extensive compensatory redundancy among PIN genes. free from the influence of any maternal sporophyte. Severe embryonic phenotypes. Downloaded from www. Second. the establishment of bilateral symmetry and the SAM is correlated with a reversal in PIN polarity at the apex of the globular embryo. with an opposite polarity as compared with that derived from the apical cell. For personal use only. and a larger micropylar basal cell that gives rise to the extraembryonic suspensor and the root meristem of the embryo. Dynamic changes in auxin flux and maxima are mediated by both transcriptional control of PIN genes and the regulation of polar localization of PIN proteins (15.org by University of Uppsala on 12/13/12. suggest that embryonic polarity can be established independently of maternal inputs (96).zygote elongates and divides asymmetrically to produce a smaller apical cell. in which the expression patterns of other family members change as a response to loss-of-function PIN alleles. The basal cell of the two-celled zygote expresses PIN7 protein at its apical end. 102). the polarity established at the first zygotic division of the embryo corresponds with the polarity of the embryo sac. GNOM (GN). That the dynamic flow of auxin and the creation of maxima is. presumably facilitating auxin flow into the apical cell (36). at least necessary for proper embryo development is demonstrated by mutations in genes regulating PIN protein localization that result in abnormal auxin flow and embryonic patterning. Although loss of PIN7 activity has only minor effects on axis formation. 99). The correspondence between embryo sac polarity and maternal sporophyte polarity brings up the question of how much instruction the maternal sporophyte provides with regard to embryonic polarity. that respond positively to auxin suggest that auxin accumulates in the apical cell (reviewed in Reference 42). there is evidence that auxin is shunted back toward the meristem following the formation of lateral organ primordia (24. Dynamic changes in auxin flow correlate with subsequent major events in embryonic development as described in Figure 2 (36). are observed in pin1 pin3 pin4 pin7 quadruple mutants. Finally. 50). These two poles correspond to the asymmetric first division of the zygote that results in a smaller apical cell and a larger basal cell that receives the egg vacuole (Figure 2). 36. This pattern presages much of what follows and highlights the need for understanding the establishment of the role of the epidermis in general patterning processes. Apical-basal axis formation is also marked by an asymmetric distribution of members of the PIN FORMED (PIN) family of proteins that mediate cellular auxin efflux from cells (39.org • Seed Plant Shoot Patterning and Polarity . Firstly. Although auxin has been difficult to detect directly. such as DR5::GFP. 76. suggesting that the early auxin asymmetry observed at the two-cell stage may be instructive with respect to apical cell fate (15.
The creation of auxin maxima can be determined either by changing the direction of auxin flow such that opposing flows result in an accumulation of auxin. by localized synthesis of auxin. 104) and another via nitrilase (reviewed in Reference 73). 58. 99). but the polar localization of PIN1 protein is not oriented normally and the cotyledons fail to develop appropriately. In these double mutant combinations. 90).annualreviews. 99). the random changes in PIN1 distribution observed in gn mutants imply that GN does not determine the polarity of PIN localization (40.org by University of Uppsala on 12/13/12. the SAM. On the basis of the coincident expression Annu. such that phosphorylation of PIN1 promotes its apical cellular localization. or alternatively. The gn mutant resembles the severe embryo phenotype of pin1 pin3 pin4 pin7. PID encodes a serine-threonine protein kinase. but much of embryonic pattern formation occurs normally in pid mutants. Phosphorylation of PIN proteins by PID is counteracted by the activity of PROTEIN PHOSPHATASE 2A (PP2A).membrane-associated guanine nucleotide exchange factor. an important process for recycling of PIN proteins between endosomal compartments and the plasma membrane (90). primarily owing to the incomplete knowledge of auxin biosynthesis and its sequestration via conjugation. Rev. YUC1 and YUC4 expression is detected as early as the transition stage in the apical regions of the embryo. indicating the 72 Bowman existence of other controls. · Floyd . YUC4 is positively regulated by STYLISH1 (STY1). and incipient leaf primordia (21). At least four YUCCA genes are expressed during embryogenesis (21). 85. a transition stage embryo appears to develop. Auxin maxima directing the initiation of organs are altered in plants lacking PID function. regulates vesicle budding. 23). presumably through conjugative processes and increasing auxin flow. The expression of YUCCA genes in the presumptive SAM supports the hypothesis that elevated levels of auxin are present in the the SAM (Figure 2). Localized synthesis of auxin within the developing embryo could also play a role in creating auxin maxima and influencing auxin flows. 84. This is especially relevant because PIN1 expression is responsive to auxin concentration. suggesting that dynamic recycling of PIN proteins is important for embryo development (15. What little is known about the control of reversals in the polar localization of PIN proteins revolves around the activity of the PINOID (PID) gene. Plant Biol. one based on the products of the YUCCA genes (20. Furthermore. Although increases in auxin concentration through exogenous application or expression of bacterial biosynthetic genes can often be accommodated. 86. However. YUC10 and YUC11 are expressed in similar patterns during the heart stage. with later expression primarily at the tips of the cotyledons. What is the origin of embryonic auxin? This is a question that has been largely neglected thus far. 37). Thus. PID controls some aspects of polar PIN1 localization. 88). 59. suggesting the dynamic changes of auxin flux will include feedback regulation (50. For personal use only. Furthermore. suggesting that the control of auxin synthesis needs to be considered (104). 10. 17. and may directly regulate PIN1 polarity because loss of PID activity leads to basal PIN1 localization and gain of PID function leads to apical PIN1 localization in cells of cotyledon primordia (23. ectopic expression of YUCCA genes has severe morphological effects. 74.59:67-88. pid mutants often possess three cotyledons and fail to initiate floral organs (8. 94). whereas reduction in phosphorylation of PIN1 results in a basal cellular localization (70). Downloaded from www. 67. and and multiple loss of function mutations in STYLISH-related genes result in similar carpel and leaf phenotypes as YUCCA lossof-function mutant combinations (20. 2008. At least two biochemical pathways can lead to auxin synthesis. the loss of cotyledons in pid pin1 mutants can be suppressed by mutations in CUP-SHAPED COTYLEDON (CUC) genes (38). and auxin can be inactivated via conjugation pathways (reviewed in Reference 103). pid pin1 and pid enhancer of pinoid (enp) double mutants lack cotyledons (38.
org • Seed Plant Shoot Patterning and Polarity . 75). and subsequently leaf primordia. How is the protodermal layer initated and differentated? Second. require different gene expression patterns. STYLISH genes are likely involved in embryonic YUCCA gene regulation. The release of the ARF proteins from their AUX/IAA partner allows their binding to auxin response elements (AREs) and the regulation (positive or negative) of target genes. 46. the double mutants lack both the axial elongation of central cells and cotyledon initiation. During the transition from the early to late globular stages auxin is thought to flow upward in the epidermis and then downward through the central region instead of being drained from the embryo. from initially pumping auxin into the embryo. 101). the relative contributions of auxin synthesis and auxin flux in generating auxin maxima are not clear. the mechanism of reversal of PIN1 polarity in the epidermis at the apex of the embryo that establishes the positions of cotyledon primordia is largely unknown. 47. First. 60. suggesting that MP/NPH4 are required to interpret auxin maxima directing these two developmental processes. Fourth. The behavior of auxin flow differs significantly between the epidermal and internal cell layers. ARF2. The establishment of auxin maxima that mark the cotyledons. ARF proteins are negatively regulated by AUXIN/INDOLE ACETIC ACID (AUX/IAA) proteins. the initiation of lateral organ primordia and the establishment of procambial precursors.annualreviews. www. MONOPTEROS (MP/ARF5 ) and NONPHOTOTROPIC HYPOCOTYL 4 (NPH4/ARF7 ) have demonstrated roles in embryo axis patterning. For personal use only. and ARF4 are likely candidates for contributing to cotyledon patterning (4. Third. However. Subsequent flow into the internal cells from sites of auxin maxima establishes the path of provascular tissue. although it is likely related to the origin of the protodermal layer. this does not preclude the participation of other family members in other aspects of embryonic pattern formation. result in a similar loss of embryonic apical-basal polarity. BODENLOS (BDL). At present. how is auxin flow shifted from being primarily epidermal to an internal flow into subepidermal layers at sites of PIN1 convergence? Such changes result in a draining of auxin from the site of the epidermal maxima and mark the initial establishment of routes of vascular patterning. but it is likely that a combination of localized auxin synthesis and directional auxin flow is required to generate and maintain auxin maxima. Rev. concomitant with the initiation of cotyledons 73 Annu. Several significant morphological transitions during embryogenesis remain enigmatic. The control and initation of this process is also unknown. which are targeted for degradation in response to auxin via a transport inhibitor resistant (TIR)-mediated targeting of the AUX/IAA protein to the proteasome (reviewed in References 26. with double mutants lacking both apical and basal embryonic development (11. the establishment of the protoderm by periclinal divisions at the eight-cell stage sets the stage for signaling events between cell layers. changes in auxin flow. Two members of the ARF gene family.59:67-88. MP/NPH4 must interact with other cell type–specific factors to regulate morphogenesis. and 103). 82. 93. Downloaded from www. Plant Biol. imply that embryonic pattern formation requires both dynamic changes in PIN protein expression patterns and subcellular localization. Finally. One consequence of auxin maxima created by convergent auxin flow and localized auxin synthesis is the activation of AUXIN RESPONSE FACTORS (ARFs).annualreviews. ETTIN.patterns of STY1 and YUCCA genes during embryogenesis. suggesting that MP/NPH4 and BDL are the primary ARF-AUX/IAA proteins involved in early embryonic development (44. 2008. Because these processes. Dominant gain-of-function alleles in an AUX/IAA partner. Specifically. 45. transcription factors that activate and/or repress target genes (reviewed in References 61 and 82). occurs through changes in auxin flow within the epidermal layer and likely localized synthesis of auxin. 101). to a state where auxin is drained from the embryo at the early globular stage.org by University of Uppsala on 12/13/12.
CUC expression becomes limited to the marginal regions. KANADI in yellow. CUC genes are initially expressed in a domain extending across the upper region of the globular embryo. dividing the embryo into two halves (2. not to be comprehensive.org by University of Uppsala on 12/13/12. Once SHOOT MERISTEMLESS (STM ) is activated in the center of the embryo (65) to mark the future SAM. Plant Biol.59:67-88. effectively forming a boundary between the cotyledons (92). even of those Figure 3 Expression patterns of four classes of transcription factors [PHABULOSA (PHB) + PHAVOLUTA (PHV ) + REVOLUTA (REV ) in green. CUP-SHAPED COTYLEDON (CUC ) in red. which completes the establishment of all the major pattern elements of the apical portion of the embryo. 100) (Figure 3). Downloaded from www. Arabidopsis transcription activation factor (ATAF). and ARF genes is a largely unknown territory. Note that both the spatial and temporal patterns are approximate because the observations of expression for each gene were done independently. For personal use only.annualreviews.is the formation of the SAM. 89. 74 Annu. 2008. Rev. and CUC] transcription factors causes a repression of growth between organs that creates boundaries. without multiple labeling of individual embryos. How are these dynamic changes achieved? Interplay What is known about the transcriptional control of the auxin synthesis. the expression patterns of several classes of transcription factors have been correlated with aspects of auxin biology. Although the direct transcriptional control of PIN. 92. SHOOT MERISTEMLESS (STM ) in blue] during early embryogenesis. PID. Loss of CUC 4-cell 8-cell 16+-cell Early-globular Mid-globular Late-globular Transition Early-heart PHB + PHV + REV KANADI CUC STM Mid-heart Late-heart Bowman · Floyd . and response machinery? Unfortunately. but to highlight how little is known about their precise roles. genes that have been subjected to significant analyses. and their expression is correlated with low auxin levels (38). not much. Here we describe a few. flux. The activity of the CUC class of NAC [no apical meristem (NAM).
Class I KNOX genes are excluded from the positions of auxin maxima associated with the site of leaf initiation within the SAM.org • Seed Plant Shoot Patterning and Polarity . 64). at sites of PIN polarity reversal where auxin appears to be drained from a point).annualreviews. The accumulated evidence suggests that Class I KNOX genes are expressed in regions of low auxin concentration and low PIN-mediated transport and act to inhibit processes of growth and differentiation that are associated with auxin action. BP is also expressed in the cortex of the hypocotyl and in young internodal regions that become cortex. and thus boundaries may be instructive during developmental processes. 62).activity results in a loss of separation between the cotyledons.g. boundaries may facilitate communication pathways between the two separated organs by providing a third cell type distinct from each of the entities that the boundary defines. the nebulous relationship between CUC gene expression and the regulation of auxin synthesis and flow highlights the paucity of our knowledge about the relative temporal relationships of change in gene expression during embryonic pattern formation.59:67-88. and it has been suggested that Class I KNOX genes are downregulated by high levels of auxin and may also act to repress auxin transport (48. STM is not activated appropriately in cuc1 cuc2 embryos. members of the Class III homeodomainleucine zipper (HD-Zip) gene family have expression patterns that correlate with known pathways of auxin flow out of the apex toward 75 Annu.. Second. a Class I knotted1like homeobox (KNOX) gene (1) (Figure 3). The observation that some of the CUC genes are initially activated in a border domain suggests that they are in some respects responding to a preexisting boundary. 49). but what establishes this boundary remains unclear. premature and increased levels of lignification occur in cortical and interfascicular regions of the stem. a phenotype that can be phenocopied by application of auxin transport inhibitors to developing embryos (1. 52. such that a SAM is not formed (1). One consequence of CUC expression in the central apical region of the embryo is the activation of STM. such that the entire periphery of the embryo develops as a single cupshaped cotyledon. CUC gene expression defines boundaries. Class I KNOX gene activity is hypothesized to suppress differentiation within the SAM and the formation of organ boundaries (6. and directly downregulates components of the lignin biosynthetic pathway (69). For personal use only. In addition. In bp mutant plants. Hay and coworkers (49) propose a model in which Class I KNOX genes in the SAM [such as STM and BREVIPEDICELLUS (BP) in Arabidopsis and KNOTTED 1 (KN1) in maize] promote cytokinin synthesis and downregulate gibberellic acid (GA) levels. Observations in real time of living inflorescence apices have been pivotal in providing insight into these processes. Are CUC genes activated in response to low auxin levels (e. which can provide a separation between organs so that they can subsequently develop autonomously (reviewed in Reference 3). Downloaded from www. In addition.annualreviews. as described below (50). Conversely. www. promoting meristematic activity. In contrast to the Class I KNOX genes. Rev. For example.org by University of Uppsala on 12/13/12. CUC genes are ectopically expressed throughout the apical periphery of pin1 pid embryos and cotyledon primordia fail to initiate appropriately. Several lines of evidence indicate that Class I KNOX genes may act to regulate and be regulated by plant hormones to promote maintenance or formation of the SAM (43. but removal of CUC activity in this background results in the restoration of cotyledon development (38). First. ectopic CUC expression is correlated with a repression of growth. Analyses of CUC genes highlight two significant questions with respect to pattern formation. whereas overexpression of BP leads to a reduction in lignification throughout the stem (69). or does the activation of CUC genes result in a subsequent reduction in the response to auxin? These scenarios do not have to be mutually exclusive. 2008. Plant Biol. 49). and perhaps the variability in the initial expression patterns of CUC1 and CUC2 reflects an interplay between CUC and PIN gene regulation.
( j ) KAN1 expression in the heart stage embryo.59:67-88. which is consistent with a role for this gene in directing the normal flow of auxin within the shoot (27. Downloaded from www. revoluta. Class III HD-Zip genes may respond to auxin by promoting the differentiation of cell types (e. Although the mechanistic relationship between presumptive pathways of auxin flow and Class III HD-Zip gene expression is unknown. rev. In this background.and gain-of-function REV mutations lead to a reduction or expansion. blue arrows mark ectopic expression in kan124 embryos.annualreviews. PIN FORMED. rather than 76 Bowman direct. 78). 106) (Figure 3. phavulota. PIN. 78. continues such that an embryo with a single central auxin maximum is formed (Figure 4g). However. 2008. incipient leaf primordia and in the provasculature (27. kanadi. ¨ Loss of DORNROSCHEN (DRN ) and DRN-LIKE (DRNL) activity results in an embryonic mutant phenotype similar to that of loss of Class III HD-Zip gene activity (19). Rev. of lignified tissues in the stem. DRN and DRNL proteins physically interact with Class III HD-Zip proteins and the embryonic expression pattterns of DRN and DRNL overlap with those of Class III HD-Zip · Floyd . For personal use only. respectively. lacking adaxial cell types. 50. 107). White arrows denote cotyledons. and that by disrupting Class III HD-Zip activity reduced auxin flow occurs owing to a loss of proper conduits. Instead.g. kan. the pattern of presumed auxin flow in the early globular embryo. (e–g) PIN1::PIN1:GFP. results in a loss of central shoot identity (27. and instead comprise a single radialized cotyledon. 4h–i ). phabulosa. (h–i ) REV expression in the inflorescence shoot and heart stage embryo.. the reversals in PIN1 polarity that establish the divergent flow of auxin away from the center of the embryo and demarcate bilateral symmetry do not occur (51). Wild-type kan124 phb phv rev REV REV KAN1 Figure 4 (a–d ) Seedlings. as in phabulosa (phb) phavoluta (phv) revoluta (rev) mutants. procambium) that further facilitate auxin polar transport away from the SAM and in the vasculature. The apical regions of mutant seedlings lack a SAM. phv. Zhong & Ye (106) showed that auxin polar transport is reduced in rev plants and that the expression of two of the PIN genes is reduced. 105. Loss. blue arrows show ‘hypocotyl leaves’.a b c d Wild-type kanadi124 phb phv rev kan124 phb phv rev e f g h i j Annu. radial vascular bundle (Figure 4c). that dynamic patterns of auxin flow appear to be established in a phb phv rev background in which KANADI activity (see below) is also removed suggests that that Class III HD-Zip activity may largely respond to. 68.org by University of Uppsala on 12/13/12. and the yellow arrow shows the ‘central’ leaf. upward through the epidermis and down centrally. patterns of auxin flux. Plant Biol. it has been reported that Class III HD-Zip genes influence polar auxin transport. with a small. Loss of Class III HD-Zip activity. Abbreviations: phb.
www. In kan1 kan2 kan4 embryos. Leaf primordia are initiated from the peripheral region when exogenous auxin is applied. as was shown by the application of exogenous auxin to shoot apices (80). one might expect to see a reversal of PIN1 from leaf/cotyledon primordia toward the SAM. but this capability is restricted during the globular stages by the peripheral expression of KANADI. such a reversal could account for the high expression levels of PIN1 in the L1 layer of the meristem in late heart and torpedo stage embryos (51). PIN1-mediated auxin flow converges and appropriate auxin response factors are expressed. ectopic auxin maxima form in the hypocotyl.org • Seed Plant Shoot Patterning and Polarity . Normally this occurs only in the peripheral zone of the meristem. in phb phv rev kan1 kan2 kan4 hextuple mutants. suggesting they may act in a common protein complex (19. 78). and the Class I KNOX genes likely play some role. Loss.59:67-88. However. 30. The ectopic auxin maxima are generated by ectopic reversals in PIN1 localization below the cotyledons as well as by the ectopic maintenance of PIN1 localization at the apical end of protodermal cells of the hypocotyl (Figure 4f ). PIN1 is expressed more basally around the entire circumference of the embryo (Figure 4j ). but they are not initiated from the central zone even if auxin is applied to the center of the meristem (80). 57). 50) also cautions against the use of using only DR5 to define auxin maxima. not limited to the establishment of flower meristems. but because PHB. These results suggest that auxin-mediated organ outgrowth can occur wherever opposing. ARR (Arabidopsis response regulators) and Psr1 (phosphorous stress response1 from Chlamydomonas). but in KANADI mutants. Another class of gene that has been proposed to regulate auxin biology is the KANADI group of GARP transcription factors. 85). the ectopic auxin maximum induces an ectopic leaf-like organ in the hextuple mutant.and gain-of-function phenotypes of KANADI activity are largely the converse of those of Class III HD-Zip genes (29. During the globular stage PIN1 normally becomes restricted to the apical portion of the embryo. The interactions between these four families of transcription factors and auxin biology highlight that the response to auxin maxima is context dependent. because this method depends on the distribution of ARFs that act as activators of transcription 77 Annu. One hypothesis for the origin of the ectopic reversal lies in what has been observed by live imaging of the dynamic changes in PIN1 localization in the flowering shoot apices of Arabidopsis (50). named for maize Golden 2.annualreviews. Plant Biol. perhaps acting through downstream genes. Because PIN1 is positively regulated by auxin (50.genes. The idea that the meristem may also be a point of high auxin concentration (24. PIN1 is already ectopically expressed during the globular stage.annualreviews. The lack of response in the central zone of the SAM to auxin requires the function of the Class III HD-Zip genes. one phenotypic feature of loss of KANADI activity that is not observed in gain-of-function alleles of Class III HD-Zip genes is the formation of leaves from the hypocotyl of kan1 kan2 kan4 plants (51) (Figure 4b). For personal use only. Once a flower primordium is established. Rev. If this reversal is a general process. if this reversal is not limited to the regions adaxial to the cotyledons. Likewise. However. cells of the developing hypocotyl are initially competent to form and respond to auxin maxima.org by University of Uppsala on 12/13/12. PHV. 71). and REV are required for normal SAM development (27. radial leaf-like organs also initiate from the hypocotyl and the shoot apex (Figure 4d ). Downloaded from www. The ‘hypocotyl’ leaves that develop during embryogenesis are associated with ectopic auxin maxima that form during the heart stage. Following cotyledon formation. the orientation of PIN1 reverses such that auxin is transported away from the newly initiated flower primordium back toward the meristem (50). the flow of auxin back toward the center of the embryo in the hextuple kan1 kan2 kan4 phv phb rev mutant would create an auxin maximum in the position normally occupied by the SAM in the wild-type. 2008. but also occurs below the cotyledons owing to the ectopic expression of PIN1 there.
Rev.(reviewed in Reference 42). whose regulation is thought to reflect ARF activity in cells. Conceptually a self-organizing system could be established by the initation of auxin synthesis at sites of auxin maxima. ETTIN (ETT. difficulties arise owing to their embedded position within the maternal sporophyte. Because the distribution of ARF activation is dependent on auxin.59:67-88. Insights into Temporal Aspects of Auxin Biology and Gene Expression A major limiting factor in our understanding of pattern formation is the lack of knowledge about the relative temporal relationships between the dynamic changes in auxin flow and gene expression of transcriptional regulators of patterning. The induction of ETT/ARF4 in response to auxin abaxially. 75). a large fraction of which is expressed (based on microarray data) in the embryo or in the shoot tips (reviewed in References 61 and 82). Although in theory this could be accomplished by observing developing embryos. could lead to the downregulation of auxin responses via their combined activity. For personal use only. The KANADI genes provide an example of a likely negative feedback loop involving ARF activity. the action of ARFs in conjunction with other transcription factors is likely instrumental in coordinating these events. whereas the primordia produced on the · Floyd . Although the KANADI/ETT/ARF4 system exhibits a role only in the cotyledons and leaves. similar feedback modules could act in different cells on the basis of the different combinations of ARF proteins and other transcription factors expressed in particular cell types.annualreviews. In Arabidopsis the ARF gene family consists of 23 members and the AUX/IAA family consists of 29 members. perhaps at a second threshold level of auxin. 85. as well as a need for integrating these with the expression of other developmentally important genes. both in the phyllotaxy of the shoot and in the devel78 Bowman Annu. A greater understanding of the expression patterns and lossof-function phenotypes of ARF gene family members in addition to those of MP and NPH4 is required to begin to understand the role of these genes in embryonic patterning. and finally at the sites of cotyledon primordia. 55. 2008. Loss of ARF2. Mutations in ETT also enhance the phenotypic effects of kan1 mutations and suppress the effects of ectopic KANADI activity. in a domain in which KANADI activity is already present. 79) (Figure 5). auxin maxima form sequentially in the embryo proper. ARF3). the root pole. Again. and these combinations feed back to further influence auxin biology as well as other transcriptional patterns. patterning is a complex interplay between ARFs and other transcription factors within a cell. the need for an understanding of the spatial and temporal patterns of auxin biosynthesis and ARF gene expression is highlighted. perhaps at a certain threshold level of auxin. a phenotype that resembles loss of KANADI activity (4. 81. DR5 is a synthetic promoter composed of four repeats of a composite auxin response element. Although some changes could occur in the absence of transcription. and ARF4 activity results in adaxialized leaves with outgrowths on their abaxial sides. the shoot pole. Downloaded from www. 87). opment of leaf vascular patterns (9. This could be extrapolated to the formation of auxin maxima in the embryo. the increased auxin synthesis could then lead to a change in the flow of auxin away from the site of synthesis. However. The primary difference between the developmental dynamics of the inflorescence meristem and the establishment of embryonic patterning and subsequent functioning of the vegetative shoot meristem is that primordia formed on the periphery of the inflorescence meristem represent a reduced bract and its axillary meristem (the flower). recent technical advances in microscopy have allowed such observations in the Arabidopsis inflorescence meristem (41.org by University of Uppsala on 12/13/12. Epistasis experiments suggest neither activity is upstream or downstream of the other. leading Pekker and colleagues (75) to speculate that KANADI and ARF proteins act together. The formation of auxin maxima exhibits hallmarks of a self-organizing system. Plant Biol. 24.
suggesting the auxin adaxial to the primordium flows back toward the center of the meristem. both CUC2 and STM are downregulated in regions predicted to have a high auxin concentration (50).59:67-88. further highlighting the need for information about the sites of auxin synthesis. First. suggesting that PIN1 and REV expression interact to define a boundary. REV is initially expressed in the central region of the shoot meristem. REV expression extends only to the abaxial edge of PIN1 maximum expression and not all the way to the abaxial margin of the peripheral zone.annualreviews. both genes are upregulated in a band of cells just adaxial to the region of downregulation. Expression of PIN1 marks the initiation of flower meristems in two respects. Concomitant with the formation of peripheral auxin maxima. both in the embryo and at later stages of development. Following the formation of auxin maxima in the peripheral zone. as if following the flow of auxin predicted by the polar expression of PIN1 protein. Despite this caveat. The dynamics of PIN1 protein expression observed with live imaging of inflorescence apices resembles that observed during embryogenesis (50).org by University of Uppsala on 12/13/12. 99). www. Flower primordia (Pn) and incipient positions (In) where flower primordia will next arise are labeled. 2008. following the observed reversal of auxin flow back toward the meristem (presumably from where auxin is being drained). the polarity of PIN1 protein in the shoot apex is toward the position of the incipient flower meristem. because PIN1 is positively regulated by increases in auxin concentration. whereas REV exhibits the converse expression pattern. In addition. Downloaded from www. For personal use only. 74. REV expression disappears from this region such that the REV 79 Annu. However. or that both PIN1 and REV may be responding to a preexisting abaxial-adaxial boundary (50). suggesting that auxin is flowing from the meristem toward the position of the next flower primordium. REVOLUTA (REV) ( green) and FILAMENTOUS FLOWER (FIL) (magenta) proteins labeled. and its expression pattern expands within the epidermis in a ray from the center of the meristem toward the site of primordium initiation. with or without associated axillary meristems (63). auxin maxima are formed in the periphery of the meristem at the positions predicted by the polarity of PIN1 within the meristem.annualreviews. At approximately the time when CUC2 and STM are upregulated in a boundary region adaxial to the primordium. CUC2 and STM are downregulated in response to high auxin. the expression levels of PIN1 are highest at the sites of flower initiation (50.org • Seed Plant Shoot Patterning and Polarity . the cells adaxial to the newly formed primordium exhibit a reversal in the polarity of PIN1 protein. suggesting both these genes may be regulated by ARF-mediated transcriptional responses. CUC2 expression forms a boundary between the newly established flower primordium and the inflorescence meristem. Plant Biol. Second. In most respects this is similar to what has been observed during the globular to heart stages of embryogenesis. studies on the dynamics of gene expression in the inflorescence and flower meristems obtained by live imaging (50) can likely be extrapolated to other stages of shoot development. On the basis of DR5 reporter gene expression. with the exception of the lack of an established shoot meristem in the embryo that could act as a source of auxin to be funneled to the sites of cotyledon initiation. periphery of the globular embryo or the vegetative meristem are leaf-like organs.P1 P4 P3 I1 P2 P5 Figure 5 Arabidopsis inflorescence apex with PIN FORMED 1 (PIN1) (blue). Rev.
It is not known if CUC1/CUC2 orthologs exist in gymnosperms. patterning in the seed plant SAM likely involves conserved genes with conserved functions that evolved in a common ancestor. For personal use only. MP. allowing cause to be separated from effect with respect to some developmental events. with homologs present in lycophytes and moss (32). which is expressed in the peripheral zone. the presumed role of Class I KNOX genes in suppressing growth and response to auxin in the Arabidopsis SAM may be conserved in seed plants. the Class III HD-Zip gene 80 Bowman family is present in the genome of all land plants (33. such as the YUCCA genes. Class I KNOX genes are also expressed in the apices of gymnosperms. a slight overlap in the expression domains of FIL and REV is detected. Rev. a search of the rice genome indicates that there is a single gene that is the likely ortholog of CUC1 and CUC2 (S. These data are consistent with the presence of at least one CUC1/CUC2 gene in all seed plants. Class I KNOX genes are also ancient. and application of these techniques to embryo development and vegetative meristems will allow the identification of the common mechanisms of organ establishment and meristem function in Arabidopsis. Can we extend the model for patterning the Arabidopsis embryo to embryos of other flowering plants and seed plants and account for variability among them? One immediately obvious difference within flowering plants is the lack of bilateral symmetry of the monocot embryo. Finally. 91). and adaxially in leaves (31. Likewise.org by University of Uppsala on 12/13/12. but this event likely represents the beginning of autonomous development of the flower primoridum. Downloaded from www. as is STM.Annu. This suggests a conserved role for Class III HD-Zip function in establishing central shoot identity and adaxial leaf identity as well as promoting vascular development in seed plants. 77. The first to be identified. is expressed in the SAM and is excluded from the sites of leaf initiation. It is not clear at present what is cause and effect.K. Plant Biol.annualreviews. PHV. Although there are no published data. 2008. Gymnosperms have a single ortholog of PHB. provascular tissue. but Axtell & Bartel (5) identified miR164. Thus. where they are excluded from the sites of leaf initiation (14. KNOTTED-1 (KN1) in maize. and further multiple combinations of fluorescently labeled proteins will continue to provide additional insights into these developmental processes. The KANADI gene family is also ancient. FILAMENTOUS FLOWER (FIL) expression marks the abaxial region of the primordium. a microRNA that targets CUC1 and CUC2. 83). Although there is no direct evidence to date about expression and function of PIN genes in shoot apices of plants other than Arabidopsis. with homologs identified in the lycophyte Selaginella and the moss Physcomitrella (32). peripheral to the maximal region of PIN1 expression. STY. Floyd. unpublished data).59:67-88. The significance of these results is that for the first time we have a glimpse into the temporal relationships between the establishment of auxin maxima and some gene expression patterns. the PIN gene family seems to be ancient in land plants. Thus. suggesting there is a single auxin · Floyd . EXTRAPOLATING THE ARABIDOPSIS MODEL TO OTHER SEED PLANTS What evidence exists for commonality in mechanisms of patterning and polarity among diverse seed plants? All seed plants exhibit a SAM with similar patterns of cytohistological zonation and spiral phyllotaxis. although to date there is no evidence for the function of KANADI homologs in nonflowering plants. 33). in a conifer. and REV. expression in the primordium is cut off from the REV expression in the meristem center. and loss of both genes leads to loss of SAM (reviewed in Reference 43). It seems reasonable to predict that PIN-mediated auxin maxima may be responsible for the initiation of organs from the peripheral zone. The examination of additional genes. and KANADI. and map to the common ancestor of mosses and vascular plants (18).
encircling the SAM. embryogenesis in flowering plants begins with asymmetrical division of the zygote as in Arabidopsis. Plant Biol. Most nuclei are aggregated at what will become the apical end and cellularization begins there as well. 2008. it is clear that seed plant embryos vary in terms of the number. The shoot apex becomes organized even in the absence of complete cellularization of the basal end in cycads Annu. PINOID) influence and are influenced by transcription factors. Auxin maxima form in the peripheral zone to determine where leaf primordia will emerge. Downloaded from www.59:67-88. Class III HD-Zips) and some of which are associated with low auxin concentrations (KNOX. However. most gymnosperm embryos begin with a phase of freenuclear division. leaf primordia are broader than in Arabidopsis. Finally. which can happen only in multicellular tissue. However. PIN-mediated auxin flux occurs through polar localization of PIN proteins at the plasma membrane. and insertion of cotyledons so that cotyledon initiation leads to asymmetry (monocots. but in cycads each cotyledon has a base that encircles the meristem much like a grass leaf base (35). Other genes that are expressed in the peripheral zone include PHB. the clearly bipolar embryos contain hundreds of nuclei (in cycads and Ginkgo). 34). and initiate the provasculature of the hypocotyl cannot occur in the gymnosperm embryo and may reflect a heterochronic shift to engage shoot patterning mechanisms at an earlier stage in development in the flowering plant lineage. In maize. a whorl of cotyledons is formed. and KN1 is excluded in an encircling zone on the SAM prior to the emergence of the leaf primordium (52). CONCLUDING REMARKS A model is emerging in which auxin gradients and auxin transporters (PINs. (35). CUC. Much emphasis is placed on the onset of bilateral symmetry in Arabidopsis embryogenesis. Although auxin gradients may be involved. The tightly controlled movement of auxin through particular cells and cell layers of the early embryo that occurs in Arabidopsis to create the shoot pole. position. 81 www. or radial symmetry (conifers). some of which are associated with high auxin concentration and flux (ARFs. Rev. KANADI). This suggests a broader auxin maximum throughout a larger arc of the peripheral zone in maize than in Arabidopsis. On the basis of the model for Arabidopsis we would predict that the differences in cotyledon number and arrangement among seed plants reflect spatial and temporal differences in PIN-mediated maxima and CUC-mediated boundaries.org • Seed Plant Shoot Patterning and Polarity . As we mentioned at the beginning of this review. Expression and functional data are needed to confirm or reject these predictions.maximum during embryogenesis resulting in an asymmetrical embryo. suggesting numerous auxin maxima are formed in those embryos. Together these transcription factors create patterns of differential growth in the shoot to maintain a meristem and produce lateral organs. Bilateral symmetry and heart stage are descriptive terms that apply to some seed plants and it is more broadly meaningful to focus on the developmental process of organogenesis (56). and REV in the adaxial side of the entire peripheral zone.annualreviews. bilateral symmetry (dicotyledonous plants).org by University of Uppsala on 12/13/12. zygotic PIN-mediated polar transport cannot establish polarity within the free-nuclear embryo of gymnosperms (on the basis of our understanding of PIN function in Arabidopsis). The underlying commonality is that cotyledon initiation represents the onset of organogenesis from the shoot apex (56). Cycads and Ginkgo both have two cotyledons. The central zone includes the initial cells and their subadjacent derivatives. In conifers. PHV. in which cell division is infrequent and the cells are larger and more vacuolate than in the peripheral zone (Figure 1). For personal use only. create the root pole. cycads).annualreviews. the SAM of seed plants is unique among land plants in that it exhibits cytohistological zonation that is associated with maintenance of stem cells (the central zone) and the production of lateral organs (the peripheral zone) (28.
PHV. more vacuolate character that defines the central zone until after STM expression. Tasaka M. The first auxin maxima forms at the boundary of KANADI and PHB. and Monash University. 2008. LITERATURE CITED 1. Ishida T. such as the role of auxin biosynthesis and the causal relationship of auxin maxima. and STM everywhere except the auxin maxima. At the same time. not establish them. The fact that a ring of tissue with adaxial and abaxial characters develops in the pin1 mutant inflorescence meristem and the cuc1 cuc2 mutant embryo indicates that ad/abaxial polarity does not depend on the formation of auxin maxima or leaf primordia in the peripheral zone (1. Marcus Heisler. CUC1 and CUC2 between adjacent primordia. 68). We thank members of our lab. This supports the view of Kaplan & Cooke (56) that the apical pole of the globular proembryo is the SAM and STM activity is required to maintain a population of stem cells. PHB. KAN1 expression is evident around the periphery of the hypocotyl (57).annualreviews. The authors’ research is funded by the Australian Research Council (DP0771232. We apologize for citing reviews in some cases rather than the primary literature owing to a lack of space. and the transcription factors that are expressed in those regions. Downloaded from www. Genes involved in organ separation in Arabidopsis: An analysis of the cup-shaped cotyledon mutant. PHV. However. Plant Biol. FF0561326). Plant Cell 9:841–57 82 Bowman · Floyd . Fujisawa H. There are still many gaps in the Arabidopsis model. 97).org by University of Uppsala on 12/13/12.59:67-88. Fukaki H. the United States National Science Foundation (IOB-0515435). and REV are initially expressed throughout the embryo and then their expression becomes restricted to the apical and central regions (27. In both embryos and growing shoot apices organs form at the boundary of an abaxial/outer domain and an adaxial/inner domain of PHB. For personal use only.Annu. which indicates that the peripheral zone is defined and functional prior to the establishment of the central zone and that in stm mutant plants the peripheral zone is established but the central zone is not. Rev. such as the developmental origin of the SAM in seed plants and the manner in which the SAM functions. cells at the center of the meristem do not acquire the larger. However. PHV. and Marcus Heisler for the image in Figure 5. ACKNOWLEDGMENTS We thank Gabriela Pagnussat for the images of embryo development in Figures 2 and 3. plant developmental genetics is beginning to address the fundamental issues of patterning in plants that we can apply to long-standing concepts from comparative anatomy to achieve a better understanding of seed plant development and evolution. minima. Together this suggests that the peripheral zone is a region that represents the boundary of peripheral and central shoot expression domains in which auxin maxima form. and Yuval Eshed for helpful discussions over the years. The data merging from detailed analyses of Arabidopsis are beginning to provide new insights into the developmental genetics of some longstanding questions. We also have still more to learn about how broadly the Arabidopsis model can be applied to understand seed plant shoot patterning in general. Aida M. 1997. REV expression where there is no STM expression (50). with auxin flow converging from outer and inner domains. KANADI in the abaxial side of the peripheral zone. The real-time analyses of Heisler and coworkers (50) suggest that the peripheral zone is already polarized with adaxial and abaxial domains when auxin maxima are formed and when elevated levels of REV expression occur. REV expression (50). In the globular embryo.
Seifertova D. Genet.59:67-88. Development 126:1563–70 3. Tasaka M. Zhao Y. Fleming AJ. Morphogenesis in pinoid mutants of Arabidopsis thaliana. Bartel DP. Busch M. Offringa R. Berleth T. Dai X. Sauer M. 2002. Blum E. Development 128:4057–67 9. Nature 433:39–44 16. Development 134:1653–62 20. 250:681–91 18. 60:915–28 4. Aida M. 1993. Curr. Shoot apical meristem and cotyledon formation during Arabidopsis embryogenesis: interaction among the CUP-SHAPED COTYLEDON and SHOOT MERISTEMLESS genes. Beerling DJ. Ancestry of KNOX genes revealed by bryophyte (Physcomitrella patens) homologs. Biol. Pham T. 2007. 2006. Mol. Berleth T. Moore C. Opin. Plant Mol.annualreviews. Nat. Cell Biol. Alvarez JP. The PINOID protein kinase regulates organ development in Arabidopsis by enhancing polar auxin transport.2. Goliber TE. Pekker I.annualreviews. efflux-dependent auxin gradients as a common module for plant organ formation. Cell 115:591–602 10. Endogenous and synthetic microRNAs stimulate simultaneous. 2001. 2007. Morphogenesis and patterning at the organ boundaries in the higher plant shoot apex. Plant J. et al. 2008. . 2006. Bennett MJ. et al. Weijers D. 1908. efficient. Tasaka M. Chandler JW. Towards the systems biology of auxintransport-mediated patterning. Ishida T. 2005. Plant Biol. Benjamins R. Benkova E. Smyth DR. Grewe B.org by University of Uppsala on 12/13/12. 2003. Plant Cell 17:1658–73 6. Blilou I. Teichmann T. Ashton N. Champagne C. Bower FO. Paponov I. Bossinger G. Mayer U. Amsellem Z. Downloaded from www. Flier A. Origin of a Land Flora: A Theory Based on the Facts of Alternation. Willemsen V. 2007. 20:1790–99 21. Bennett SRM. The PIN auxin efflux facilitator network controls growth and patterning in Arabidopsis roots. Poethig RS. Plant Cell 18:1134–51 5. 1995. Quint A. Science 296:1858– 60 15. 1999. Homologies in leaf form inferred from KNOX1 gene expression during development. Dai X. Trends Plant Sci. Alvarez J. Cole M. Kessler S. Bharathan G. Xu J.org • Seed Plant Shoot Patterning and Polarity 83 Annu. Goldshmidt A. 1996. Jurgens G. Barton MK. 8:505–20 ¨ 11. Development 118:575–87 12. 150:23–36 19. Cheng Y. 2001. Wildwater M. 2003. Eshed Y. Axtell MJ. 2005. The case for morphogens in plants. Hooykaas P. The AP2 transcription fac¨ ¨ tors DORNROSCHEN and DORNROSCHEN-LIKE redundantly control Arabidopsis embryo patterning via interaction with PHAVOLUTA. Local. Development 119:823–31 7. Gen. Scarpella E. 2006. 5:939– 43 14. Michniewicz M. and localized regulation of multiple targets in diverse species. Auxin biosynthesis by the YUCCA flavin monooxygenases controls the formation of floral organs and vascular tissues in Arabidopsis. The role of the monopteros gene in organizing the basal body region of the Arabidopsis embryo. Plant Biol. Molecular analysis of the Arabidopsis pattern formation gene GNOM: Gene structure and intragenic complementation. Plant Cell 19:2430–39 www. Werr W. Cheng Y. 10:4–12 8. Bhalerao RP. Sinha NR. 12:151–59 13. 1993. Prusinkiewicz P. Aida M. London: Macmillan ¨ 17. Auxin synthesized by the YUCCA flavin monooxygenases is essential for embryogenesis and leaf fromation in Arabidopsis. New Phytol. 2007. For personal use only. Genes Dev. Rev. Zimmermann’s telome theory of megaphyll leaf evolution: a molecular and cellular critique. Jurgens G. Zhao Y. Antiquity of microRNAs and their targets in land plants. Formation of the shoot apical meristem in Arabidopsis thaliana—an analysis of development in the wild-type and in the shoot meristemless mutant.
2006. Ljung K. Genet. Structure and growth of the shoot apex in Ginkgo biloba. Galweiler L. Anders N. 2003. Floyd SK. Dev. Emery JF.59:67-88. Holtan H. Alvarez J. Jurgens G. 2008. Belcram K. Gifford EM Jr. promoters and regulatory factors. Baum SF. Wolters H. Eshed Y. 2002. Mizukami Y. USA 103:1627–32 ¨ 25. 1998.22. Izhaki A. Sci. Distinct developmental mechanisms reflect the independent origins of leaves in vascular plants. et al. Biol. Zalewski CS. Estelle M. 13:1768–74 28. Mele G. Kato T. et al. Dharmasiri N. Grandjean O. Foster AS. Furutani M. Club 65:531–56 35. Regulation of polar auxin transport by AtPIN1 in Arabidopsis vascular tissue. Friml J. Aida M. Biol. and auxin-dependent plant growth. Int. Plant Sci. Auxin-responsive gene expression: genes. Friml J. cell growth. Bohn-Courseau I. 49:373–85 43. Asymmetric leaf development and blade expansion in Arabidopsis are mediated by KANADI and YABBY activities. Muller A. Kornberger W. Acad. Bowman JL. 2007. The role of KNOX genes in plant development. Curr. Proc. Ramirez J. Genetics 173:373–88 34. 2004. Opin. Cell 112:219–30 41. Baum SF. Vernoux T. J. · Floyd . Nature 426:147–53 37. Keicher J. 2004. A PINOID-dependent binary switch in apical-basal PIN polar targeting directs auxin efflux. Plant Cell 16:74–87 42. Guo MJ. Michniewicz M. Comparative Morphology of Vascular Plants. Weigel D. Mendgen K. 2001. Yang X. Development 134:813–23 23. Development 131:2997–3006 31. Magnani E. Schwarz H. 2003. Floyd SK. Chory J.annualreviews. Bowman JL. Regulation of auxin response by the protein kinase PINOID. Patterning the axis in plants—auxin in control. The Arabidopsis GNOM ARF-GEF mediates endosomal recycling. Hagen G. Perea JV. Tasaka M. Bowman JL. auxin transport. Quint A. et al. Floyd SK. Traas J. Floyd SK. 2007. Bowman JL. et al. 2004. Carraro N. Radial patterning of Arabidopsis shoots by class III HD-Zip and KANADI genes. Curr. Bowman JL. Foster AS. Vernoux T. The ancestral developmental toolkit of land plants. Eshed Y. Biol. Wisman E. Efflux-dependent auxin gradients establish the apical-basal axis of Arabidopsis. Nogueira FTS. Annu. For personal use only. Curr.org by University of Uppsala on 12/13/12. Eshed Y. Traas J. 2004. Development 131:5021–30 39. 2006. 1977. 2000. Establishment of polarity in lateral organs of plants. Floyd SK. Hake S. Science 306:862–65 38. Trends Plant Sci. Computer simulations reveal properties of the cell-cell signaling network at the shoot apex in Arabidopsis. et al. PIN-FORMED1 and PINOID regulate boundary formation and cotyledon development in Arabidopsis embryogenesis. Plant Mol. Timmermans MCP. Rev. Auxin signaling and regulated protein degradation. Vieten A. Guilfoyle T. Rev. 2003. Laufs P. 2007. Geldner N. 16:1911–17 32. 168:1–35 33. Torrey Bot. Christensen SK. Evolution of class III homeodomain leucine zipper genes in streptophytes. 9:302–8 27. 1974. 2004. Sauer M. Bull. In vivo analysis of cell division. San Francisco: Freeman 36. 2006. Establishing leaf polarity: the role of small RNAs and positional signals in the shoot apex. Science 282:2226–30 40. 11:1251–60 30. Esau K. Hawker NP. Biol. Weijers D. New York: Wiley 29. Biol. Dagenais N. et al. 1938. Cell Dev. Guan CH. Smith HMS. de Smet I. de Reuille PB. Plant Biol. 2004. Natl. Chitwood DH. 20:125–51 84 Bowman Annu. Weijers D. Downloaded from www. Anatomy of Seed Plants. Morin H. Curr. 17:1–7 26. and differentiation at the shoot apical meristem in arabidopsis. Cell 100:469–78 24.
Plant Mol. Plant Cell 19:495–508 52. 2004. Patterns of auxin transport and gene expression during primordium development revealed by live imaging of the Arabidopsis inflorescence meristem.59:67-88. Liu CM. Embryonic patterning in Arabidopsis thaliana. 15:1899–911 51. B¨ aurle I. Poethig RS. Reddy GV. Jurgens G. 2006. 2005. Overlapping and nonredundant functions of the Arabidopsis auxin response factors MONOPTEROS and NONPHOTOTROPIC HYPOCOTYL 4. 23:207–36 ¨ 55. et al. Mjolsness E. Development 129:4707–17 60. 17:1405–11 47. 1997. Barton MK. Fridborg I. Fundamental concepts in the embryogenesis of dicotyledons: a morphological interpretation of embryo mutants. 2007. 2002. Ckurshumova W. STY1 and STY2 promote the formation of apical tissues during Arabidopsis gynoecium development. 16:1610–15 ¨ 45. Leyser O. Hardtke CS. 2006. Lukowitz W. 1994. Vidaurre DP. Gillmor CS. Kientz M. Berleth T. 1999. Izhaki A. Liscum E. Kuusk S. et al.¨ 44. Development 120:405–13 53. Heisler MG. Bowman JL. Jackson D. Rev. Singh SA. Acad. Hardtke CS. Das P. 49:387–400 62. Sci. Natl. Development 126:1387–95 46.annualreviews. Tsiantis M. Sohlberg JJ. Downloaded from www. Shapiro BE. For personal use only. Stamatiou G. Jenik PD.org by University of Uppsala on 12/13/12.org • Seed Plant Shoot Patterning and Polarity 85 Annu. Genes Dev. USA 103:1633–38 56. Craft J. 2006. Biol. Barkoulas M. Expression of maize KNOTTED1 related homeobox genes in the shoot apical meristem predicts patterns of morphogenesis in the vegetative shoot. Development 133:3955–61 49.annualreviews. Hay A. Biol. 2005. 2007. Hay A. Jonsson H. 2002. Sohlberg JJ. Meyerowitz EM. Kaplan DR. Heisler MG. Plant Biol. Tsiantis M. Curr. The Arabidopsis gene MONOPTEROS encodes a transcription factor mediating embryo axis formation and vascular development. Bollman K. Plant Cell 5:621–30 www. Veit B. Eklund DM. Surge and destroy: the role of auxin in plant embryogenesis. The Arabidopsis BODENLOS gene encodes an auxin response protein inhibiting MONOPTEROS-mediated embryo patterning. Hamann T. Benkova E. Reed JW. Development 131:1089–100 48. Auxin polar transport is essential for the establishment of bilateral symmetry during early plant embryogenesis. Jenik PD. KANADI and class IIIHD-zip gene families regulate embryo patterning and modulate auxin flow during embryogenesis in Arabidopsis. 47:99–111 59. 1998. 1993. The auxin-insensitive bodenlos mutation affects primary root formation and apical-basal patterning in the Arabidopsis embryo. Sundberg E. Jurgens G. Kuusk S. Annu. EMBO J. Nature 411:706–9 58. Plant hormones and homeoboxes: bridging the gap. Cell Dev. 2001. Biol. 16:R424–33 61. Hake S. Chua NH. ASYMMETRIC LEAVES1 and auxin activities converge to repress BREVIPEDICELLUS expression and promote leaf development in Arabidopsis. An auxindriven polarized transport model for phyllotaxis. 2004. Genetics of Aux/IAA and ARF action in plant growth and development. Plant J. Rev. Xu ZH. Functionally redundant SHIfamily genes regulate Arabidopsis gynoecium development in a dose dependent manner. . Bomblies K. Sieber P. Proc. 2008. 2002. Development 132:3577–85 54. Ohno C. Long JA. 2006. Dynamic integration of auxin transport and signalling. Mayer U. Plant Cell 9:1903–19 57. BioEssays 26:395–404 50. KANADI regulates organ polarity in Arabidopsis. Sundberg E. Cooke TJ. Taylor RA. Kerstetter RA. Biol. Curr. Hamann T.
69:461–76 ¨ 67. Plant Mol. Can. Contrasting modes of diversification in the Aux/IAA and ARF gene families. Barton MK. For personal use only. Yang YZ. NJ: Princeton Univ. Petr´ asek J. A member of the KNOTTED class of homeodomain proteins encoded by the STM gene of Arabidopsis. The knotted-like homeobox gene BREVIPEDICELLUS regulates cell differentiation by modulating metabolic pathways. PIN proteins perform a rate-limiting function in cellular auxin efflux. antagonistic. Mandel T. Isolation of homeodomain-leucine zipper genes from the moss Physcomitrella patens and the evolution of homeodomainleucine zipper genes in land plants. 2005. is necessary for stamen emergence in Arabidopsis. Sato Y. 218:341–53 64. Evol. Patterns in vascular plant diversification: an analysis at the species level. Genes Dev. 18:491–502 86 Bowman Annu. Weijers D. J. 2006. Biol. Niklas KJ. Development 117:149–62 68. Redundancy as a way of life—IAA metabolism. 2004. Long J. Barton MK. Long JA. Downloaded from www. Barton MK. Curr. JW Valentine. Pekker I. Mansfield SG. Bot. Otsuga D. Long JA. Clark SE. Biol. 17:2088–93 70. 2008. Pesce ER. 8:350–61 78. Ori N. Plant Cell 17:2899–910 76. 2000. an AP2 gene. Reddy GV.org by University of Uppsala on 12/13/12. Plant Physiol. Petr´ asek J. Reed JW. 97–128. Prigge MJ. et al. Eshed Y. McConnell JR. Moan EI. Antagonistic regulation of PIN phosphorylation by PP2A and PINOID directs auxin flux. 65:219–32 72. Prigge MJ. Clark SE. DORNROSCHEN-LIKE . Ehrhardt DW. Alonso JM. Apical-basal pattern-formation in the Arabidopsis embryo—studies on the role of the gnom gene. Medford JI. Barton MK. The development of apical embryonic pattern in Arabidopsis. Evol. Auxin response factors mediate Arabidopsis organ asymmetry via modulation of KANADI activity. 2006. 2004. Knoll AH. Zago MK. Nature 379:66–69 66. 2000. 135:1738–52 83.63. Abas L. Jurgens G. Early embryogenesis in Arabidopsis thaliana. 1993. Emery J. Ruthardt N. Plant Cell 12:507–18 81. Opin. Real-time lineage analysis reveals oriented cell divisions associated with morphogenesis at the shoot apex of Arabidopsis thaliana. pp. Bao N. Eshed Y. Mravec J. Auxin regulates the initiation and radial position of plant lateral organs. Nishiyama T. Nature 411:709–13 69. Dev. Ecker JR. Zazimalov´ a E. Abas M. Plant Biol. Drews GN. 1985.annualreviews. Baltensperger K. Dev. et al. Stieger P. Stierhof YD. 1998. Evolution of the class III HD-Zip gene family in land plants. 2:207–13 74. Press 73. Hake S. Development 125:3027–35 65. Kato M. 2001. Role of PHABULOSA and PHAVOLUTA in determining radial patterning in shoots. ed. Schweighofer A. Tiffney BH. and distinct roles in Arabidopsis development. Kuhlemeier C. Auxin inhibits endocytosis and promotes its own efflux from cells. Biol. Sakakibara K. Blakeslee JJ. Nature 435:1251–56 75. Nag A. Bowman J. Science 312:914–18 77. 2007. Plant Cell 17:61–76 79. Remington DL. Alvarez JP. Guilfoyle TJ. Mol. Michniewicz M. Reinhardt D.59:67-88. 1999. Hasebe M. In Phanerozoic Diversity Patterns: Profiles in Microevolution. 2003. Normanly J. Jack T. Plant Biol. Class III homeodomain-leucine zipper gene family members have overlapping. Buttner G. Mandel T. 2001. Mele G. Briarty LG. Nature 426:255–60 82. Bouchard R. et al. Rev. 2005. II. The developing embryo. Paciorek T. Vision TJ. Heisler MG. 2007. et al. Cell 130:1044–56 ¨ 71. Regulation of phyllotaxis by polar auxin transport. 2003. Initiation of axillary and floral meristems in Arabidopsis. Meyerowitz EM. · Floyd . Development 131:4225–37 80. Mayer U. 2005. Bartel B. 1991. 1996. Princeton. Reinhardt D.
annualreviews. Shevell DE. Grandjean O. Prusinkiewicz P. Plant Biol. Tasaka M. de Vries SC. Herz M. Souer E. 20:1015–27 86. cell expansion. Laufs P. Molecular and cellular aspects of auxintransport-mediated development. Traas J. Vieten A. Vernon DM. Rev. 2006. Benkov´ a E. Control of leaf vascular patterning by polar auxin transport. Myren˚ as M. The CUP-SHAPED COTYLEDON1 gene of Arabidopsis regulates shoot apical meristem formation. Natl. 2003. Cell 77:1051–62 87. 2008. 2006. et al. Koes R. USA 103:1301–6 88. Ljung K. Development 127:5157– 65 98. Sci. Proc. Kwaaitaal M. Friml J. Plant Cell 15:1563–77 101. Maintenance of embryonic auxin distribution for apical-basal patterning by PIN-FORMED-dependent auxin transport in Arabidopsis. Reinhardt D. The gene ENHANCER OF PINOID controls cotyledon development in the Arabidopsis embryo. 12:160–68 99. 2005. Functional redundancy of PIN proteins is accompanied by auxin-dependent cross-regulation of PIN expression. Tsukaya H. Plant Cell 17:2517–26 102. Teale WD. Scarpella E. Marcos D.¨ V. Rev. 1994. Xia GX. Takada S. 47:112–23 89. Friml J. Vanneste S. The no apical meristem gene of Petunia is required for pattern formation in embryos and flowers and is expressed at meristem and primordia boundaries. 1994. Meurette O. Natl. A plausible model of phyllotaxis. et al. Plant Biol. Nat. Canalization of 84. 2007. Mordhorst AP. Paponov IA. Ruzicka K.org by University of Uppsala on 12/13/12. et al. Guyomarc’h S. Xu J. Auxin in action: signalling. Sauer M. 2001. For personal use only. Weijers D. 20:2902–11 85. Biol. Kronenberger J. Kloos D. Leu WM. Seifertov´ a D. Cell Biol. Engstrom tential developmental control function in the meristem of the conifer Picea abies. Sund˚ as-Larsson A. Rev. Vroemen CW. Plant J. Smith RS. Development 128:1127–35 93. Annu. 2006. Vieten A. 165:566–73 97. Trends Plant Sci. Vernoux T. 1996. Steinmann T. 2006. and cell-adhesion in Arabidopsis and encodes a protein that has similarity to Sec7. A homeobox gene with po91. Ishida T. Geldner N. Grebe M. Dev. Reinohl auxin flow by Aux/IAA-ARF-dependent feedback regulation of PIN polarity. USA 95:15118–22 92.org • Seed Plant Shoot Patterning and Polarity 87 Annu. Sci. Development 132:4521–31 100. Mangold S. Sohlberg JJ. Kuhlemeier C. Emb30 is essential for normal-cell division. Schweizer G. Hibara K. Cell 85:159–70 90. . 1998. Mol J. a polyembryonic mutant of Arabidopsis. Balla J. 57:477– 96 96. Palme K. et al. Albrecht C. Chua NH. et al. van Houwelingen A. Proc. Wisniewska J. Wisniewska J. et al. 2006. Treml BS. Downloaded from www. et al. 2005. Embryogenic transformation of the suspensor in twin. Science 312:883 www. Genes Dev.annualreviews. Meinke DW. Mandel T. Kuusk S. Radykewicz R. 7:847–59 94. Polar PIN localization directs auxin flow in plants. Acad. Friml J. 2000. Svenson M. Sauer M. 2005. STY1 regulates auxin homeostasis and affects apical-basal patterning of the Arabidopsis gynoecium. Development 132:4063–74 95. Sauer M. Luschnig C. Mechanism of leaf-shape determination. The CUPSHAPED COTYLEDON3 gene is required for boundary and shoot meristem formation in Arabidopsis. Berleth T. Kowalczyk M. Acad.59:67-88. 2006. Gillmor CS. Feldmann KA. Wisniewska J. Brewer PB. Coordinated polar localization of auxin efflux carrier PIN1 by GNOM ARF GEF. Winderl S. PIN-FORMED 1 regulates cell fate at the periphery of the shoot apical meristem. Brewer PB. Science 286:316–18 ¨ P. Lagercrantz U. Benjamins R. Liao H. Genes Dev. Mol. transport and the control of plant growth and development. Jackson CL. 2006. 1999.
action. 2004. Zhong R. Ye Z-H. 2005. Plant Cell 11:2139–52 106. IFL1. is associated with alterations in the polarity of leaves. 126:549–63 107. encodes a homeobox-leucine zipper protein. and interaction. Plant Cell Physiol. A role for flavin monooxygenase-like enzymes in auxin biosynthesis. 95:707–35 104. Plant Physiol. Bartel B. Zhong R. Science 291:306–9 105. Rev. Ye Z-H. 2008. Ye Z-H. Auxin: Regulation. Woodward AW.annualreviews. 2001. 88 Bowman · Floyd . et al. Alteration of auxin polar transport in the Arabidopsis ifl1 mutants. Downloaded from www. Christensen SK. 2001. Fankhauser C. amphivasal vascular bundle 1. 1999. Cohen JD. Cashman JR.103. For personal use only. Zhao YD.org by University of Uppsala on 12/13/12. Zhong RQ. 45:369–85 Annu. Ann. a gene regulating interfascicular fiber differentiation in Arabidopsis. a gain-of-function mutation of the IFL1/REV gene. Bot.59:67-88. stems and carpels. Plant Biol.
Downloaded from www. Howe and Georg Jander p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 41 Patterning and Polarity in Seed Plant Shoots John L. Rev. For personal use only. Plant Biol. Graham p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 115 The Role of Glutathione in Photosynthetic Organisms: Emerging Functions for Glutaredoxins and Glutathionylation Nicolas Rouhier. and Jean-Pierre Jacquot p p p p p p p p p p p p p p p p p p p p p 143 Algal Sensory Photoreceptors Peter Hegemann p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 167 Plant Proteases: From Phenotypes to Molecular Mechanisms Renier A. Floyd p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 67 Chlorophyll Fluorescence: A Probe of Photosynthesis In Vivo Neil R.J.L.org by University of Uppsala on 12/13/12.C.Annual Review of Plant Biology Contents Our Work with Cyanogenic Plants Eric E. St´ ephane D. 2008.annualreviews. Bowman and Sandra K. Lemaire. Conn p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 1 Annu. Bailey-Serres and L. Baker p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 89 Seed Storage Oil Mobilization Ian A. 2008 New Insights into Nitric Oxide Signaling in Plants Ang´ elique Besson-Bard.59:67-88. Alain Pugin. van der Hoorn p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 191 Gibberellin Metabolism and its Regulation Shinjiro Yamaguchi p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 225 Molecular Basis of Plant Architecture Yonghong Wang and Jiayang Li p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 253 Decoding of Light Signals by Plant Phytochromes and Their Interacting Proteins Gabyong Bae and Giltsu Choi p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 281 Flooding Stress: Acclimations and Genetic Diversity J. Voesenek p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 313 v .A. and David Wendehenne p p p p p p p p p p p p p p p p p p p p p p p p p 21 Plant Immunity to Insect Herbivores Gregg A. Volume 59.
Downloaded from www. Libourel and Yair Shachar-Hill p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 625 Mechanisms of Salinity Tolerance Rana Munns and Mark Tester p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 651 Sealing Plant Surfaces: Cuticular Wax Formation by Epidermal Cells Lacey Samuels. Gould. Lucia F. Nitrogen Transformations. Rev. Tetsuya Kurata. and Camille Steber p p p p p p p p p p p p p p p 387 Trehalose Metabolism and Signaling Matthew J. and Geoffrey I. Waller. Deveraj Jhurreea.org by University of Uppsala on 12/13/12. McFadden p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 491 Coordinating Nodule Morphogenesis with Rhizobial Infection in Legumes Giles E. 2008. and Yuhua Zhang p p p p p p p p 417 Auxin: The Looping Star in Plant Development Ren´ e Benjamins and Ben Scheres p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 443 Regulation of Cullin RING Ligases Sara K. Fabio Fornara.D. Primavesi.annualreviews.59:67-88. Cavagnaro p p p p p p p p p p p p p p p p p p p p p p p 341 A Genetic Regulatory Network in the Development of Trichomes and Root Hairs Tetsuya Ishida. and Timothy R. and Brett Lahner p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 709 Annu. Ivan Baxter. Plant Biol. and Takuji Wada p p p p p p p p p p p p p p p p p p 365 Molecular Aspects of Seed Dormancy Ruth Finkelstein. and Reinhard Jetter p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 683 Ionomics and the Study of the Plant Ionome David E. Oldroyd and J. and Ecosystem Services Louise E. Hotton and Judy Callis p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 467 Plastid Evolution Sven B. Jackson. and George Coupland p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 573 Plant Aquaporins: Membrane Channels with Multiple Integrated Functions Christophe Maurel. vi Contents . Wendy Reeves. Paul. Doan-Trung Luu. Salt. Kiyotaka Okada. Lionel Verdoucq. Ross F. Ljerka Kunst. Tohru Ariizumi. Allan Downie p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 519 Structural and Signaling Networks for the Polar Cell Growth Machinery in Pollen Tubes Alice Y.Roots. For personal use only. Martin Burger. Cheung and Hen-ming Wu p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 547 Regulation and Identity of Florigen: FLOWERING LOCUS T Moves Center Stage Franziska Turck. and V´ eronique Santoni p p p p 595 Metabolic Flux Analysis in Plants: From Intelligent Design to Rational Engineering Igor G.L.
For personal use only. 2008. Facchini p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 735 Genetically Engineered Plants and Foods: A Scientist’s Analysis of the Issues (Part I) Peggy G.Alkaloid Biosynthesis: Metabolism and Trafficking J¨ org Ziegler and Peter J.org/ Contents vii . Volumes 49–59 p p p p p p p p p p p p p p p p p p p p p p p p 813 Cumulative Index of Chapter Titles. Downloaded from www. Errata An online log of corrections to Annual Review of Plant Biology articles may be found at http://plant. Volumes 49–59 p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 818 Annu. Lemaux p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 771 Indexes Cumulative Index of Contributing Authors.org by University of Uppsala on 12/13/12.59:67-88.annualreviews.annualreviews. Plant Biol. Rev. | 2019-04-23T08:27:24Z | https://www.scribd.com/document/163508473/annurev-2Earplant-2E57-2E032905-2E105356 |
Our best selling model for a reason: For most people and their uses it offers the optimum balance of loading space, low weight and practicability.
Small and lightweight hiking trailer. Can also be used as bike trailer but it really shines when you're out and about on foot.
The Fiffi saves you from having to carry all that heavy stuff on your back. We put an empty wine crate on top of it and use it for shopping groceries and being out and about in nature. You can also configure this model with a drawbar as bike trailer but it really shines and is primarily designed to be used on foot as hand cart.
Or you configure Fiffi yourself with different wheel options and parts.
Please note that you cannot switch the drawbar back and forth from bike trailer mode into hand cart mode as you can with our other models like the Hmini.
The small one: For your weekly groceries but also really heavy stuff. Compact in design yet extremely capable. Usable as bike trailer as well as hand cart with the simple change of the drawbars position.
Already our smallest bike trailer has a very high load-carrying capacity. It easily handles your weekly shopping and even the transport of much larger items. When turned into hand cart mode it makes for a perfect shopping cart thanks to its compact size. And five seconds later it's back at being your bike trailer.
Our trailers can handle a lot and are very robust. However, please adhere to the maximum weight limit your bike and its brakes were designed for. Please consult the bikes manufacturer for its specific maximum system weight (bicycle+rider+trailer+load).
Our best selling model for a reason: For most people and their uses it offers the optimum balance of loading space, low weight and practicability. Usable as bike trailer as well as hand cart with the simple change of the drawbars position.
There's hardly anything we can add to the above statement. For most people this trailer has indeed the near pefect balance of size, capacity and practicability for almost all tasks imaginable. You'd be suprised of just how much you'll be able to transport with it. Put a waterproof and lockable aluminium box on top and you have the closest thing to a car trunk for your bicycle.
Our multi-award winning model. Due to the intelligently placed and cnc-milled recess it sheds 1,2 kg of weight. These cutaways in the chassis also offer additional possibilities of securing loads. Light and fast it retains almost the same load-carrying capacity as its sibling Hmax.
The big brother of Hmax offers additional loading space in case some extra length is needed. Usable as bike trailer as well as hand cart with the simple change of the drawbars position.
Sometimes a few extra centimeters are all you need to fit your dog box, cello case or bee box on your bike trailer. It is for those circumstances the Hxl offers you that extra amount of space without being larger than necessary.
The Hxxl is especially interesting if you want to use the zillions of different Euro containers that perfectly fit and stack onto this trailer and make it even more versatile. Usable as bike trailer as well as hand cart with the simple change of the drawbars position.
There's hardly anything our second largest bike trailer can't handle. It fits two 60x40 cm Euro containers that are available in a multitude of variations that are inter-stackable. With new parts for 2019 it becomes even more robust in its standard configuration!
The weight optimized version of the Hxxl offers the same enourmous lodaing capacity like its "heavier" sibling while shadding nearly two kilogramms of weight.
Just like the Hxxl you can fit two Euronorm boxes on this model. Thanks to its cut outs it offers additional possibilities for lashing and fixing things. With new parts for 2019 it becomes even more robust in its standard configuration!
Our largest: loads more than your average car yet is extremely light. Designed to fit three Euro containers that are inter-stackable. Usable as bike trailer as well as hand cart with the simple change of the drawbars position.
It's astounding just how much will fit on our largest trailer. Yet despite it's large loading capacity its size is very manageable for everyday use. It fits three Euro containers that can be stacked up. Before this trailer has reached its limit you will already have.
A befitting way to move around bicycles it fits up to three bicycles. It can be upgraded with fattyres and thanks to its length it can also serve as a sleeping plattform.
The BikeTransporter 3 fits up to three bicycles or e-bikes. Even heavier bikes can be easily loaded and unloaded on the trailer by using the optional loading ramp. Some people also use it as plattform to build up a bicycle caravan since it is long enough to accommodate a sleeping person.
This BikeTransporter fits up to five bicycles or a Euro-pallet. Aimed at professionals it draws a lot of attention advertising your business and environmental friendliness at the same time.
The BikeTransporter 5 was designed to carry up to five bicycles. The designated cut-outs for the bicycles wheels and our custom designed lashing straps make loading the trailer extremely fast and easy.
The small box bike trailer for your daily shopping. Extremely compact yet capable. And in case you don't need the boxes lid just quickly take it off.
Our box bike trailers are very compact because they are not wider or longer than their respective boxes. Some people don't need the endless possibilities our normal bike trailers with their open loading space offer. And it's true, for the most time a high-quality aluminium box that is lockable, water- and dustproof is all you need.
The size of the Hbox 73 L is ideal for carrying your groceries and its size makes it extremely easy to handle. So we recommend this trailer for anyone who needs these features. If the compact size and the benefits that come along with that are not your main priority, we recommend the Hbox 90 L as a more capable trailer for general usage.
We strongly recommend outfitting this trailer with our stainless steel loops. They offer additional points to lash down things on top of the aluminium box.
Film coated und cnc-milled plywood panel made with waterproof glue.
Our trailers can handle a lot and are very robust. However, please adhere to the maximum weight limit your bike and its brakes were designed for. Please consult the bikes manufacturer for its specific maximum system weight (bicycle+rider+trailer+load). Generally we recommend loading our trailer with no more than 45 kg.
Based on the aluminium box for our bestselling model Hmax this box trailer offers a perfect balance of size and loading space. It's ideally suited to handle pretty much anything that needs transportation in everyday life.
The Hbox 90 L has the same size as our bestselling Hmax and that trailer is so popular for a reason. It's not wider than a kids trailer for one child yet already extremely capable of transporting pretty much anything you throw at it. Granted, very long and bulky things are not its strong suit but with a little creativitiy and enough lashing-straps at hand a lot is possible.
We have tried it ourselves to fill up this box trailer with our empty milk crates from our Hinterher coffee kitchen. It took us months. Ok, we are a small company but this is a seriously large aluminium box already.
The Hbox 137 L is perfect if your weekly grocery shopping is on the larger end or if you want to transport bulkier equipment like a tripod, your camera collection or your fishing gear. Because of its size it comes standard with some of our heavy-duty parts, like the URSUS kick stand, the rigid stainless steel axle mount and the reinforcement braket for the tow bar adapter.
This trailer can haul so much that you'll have a hard time filling it up with just your weekly groceries. It's especially aimed at craftsmen and small businesses to carry everything from tools to measuring instruments or your film equipment.
Defy your daily traffic jam and the need to find a parking space. With this trailer you can carry all your equipment, even bulky things like ladders that you lash on top of the box with our optional and highly recommended steel loops.
Please request a quote for this trailer to your individual shipping adress.
This huge trailer is a real workhorse. Set up with our heavy-duty components it's ideal for "last mile" delivery in cities, for transporting tools or goods.
This trailer has proofen itself and is used by UPS in various German cities for last mile delivery. We highly recommend outfitting the trailer with our stainless steel loops for additional fixing points.
Our trailers can handle a lot and are very robust. However, please adhere to the maximum weight limit your bike and its brakes were designed for. Please consult the bikes manufacturer for its specific maximum system weight (bicycle+rider+trailer+load). Equiped with our heavy-duty components this trailer can handle loads of up to 100 kg.
At last a trailer with a splashproof and lockable box that can hold three Euro boxes inside. Now you don't need that van anymore for city deliveries. You'r welcome!
This is our newest trailer and you could compare it to our Hxxxl light model that can also fit three Euro boxes. But if you need to transport them enclosed, shielded away from dust, moisture and light this trailer is for you.
The largest available aluminium box built up as a heavy-duty trailer with two axles turns your e-bike into a real truck. With nearly a thousand litres volume of loading space you can quadruple the loading volume of most cargobikes.
Granted, you need a heavy-duty cargobike or ebike to put this trailer to good use. But thanks to its two axles it is self-balancing and it's surprisingly easy and fun to push per hand. Redefine of what's possible to transport with a bike.
All trailer models from the Alu Chassis line are available in three standard colours: silver, red and black. Please write us your choice of colour in the commentary field at the bottom of this page.
Hmini + Hmax are additionally available in seven non-standard colours for a small extra charge.
Turn every one of our smaller models into a height adjustable table whenever you want to. It only takes a few seconds and you'll have yourself an info stand, picknick table or working space at your destination.
This set of table legs is compatible with our smaller models up to the Hxxl which already come equipped with all necessary holes for installation. Once installed turning your Hinterher bike trailer into a table at your rides destination only takes seconds. For your picknick, business, info stand, hobby or candlelight dinner.
Please use this table set as you would use a leightweight camping table of comparable size. Under no circumstances may it be used as stepladder or to carry a person. Please bear in mind that the tables stability will also depend on the nature of the ground it stands on. With its telescopic legs it stands level even on uneven ground.
° High strength cords for guying the table legs including carabiners.
The picture shows the camping table set at different heights. Please note that for every current model you do not need to drill the holes for installing the table set as they come already with all the necessary holes in place.
Padded bag for transporting the four table legs. This bag was actually designed to house a tripod but works just as well with the table legs.
Leight in weight and small in size with a shoulder strap and a hidden zip pocket for keys or tools.
All our bike trailers (except for the Hmini) come with black 20 inch wheels and Schwalbe Big Apple tires as standard. Alternatively you can choose silver rims instead without extra charge.
All tires have reflective side walls. Thanks to its large volume the Schwalbe Big Apple can be driven with low pressure acting as suspension for the trailer. We use stainless steel spokes on all our wheels.
Please note: The price displayed here referes to the price of the wheels as part of a trailer. If you want to order individual wheels please look in the spare part section of this page.
All our bike trailers come with black 20 inch wheels and Schwalbe Big Apple tires as standard. Choose these wheels if you prefer silver rims instead.
Standard on Hmini and optional on Hboat and Hbigboat.
High quality wheelset with Schwalbe Big Apple tires. Standard for Hmini, however, our trailers normally outfitted with 20 inch wheels can be ordered with 16 inch wheels too. Smaller tires for these larger models are recommendable if you want to lower the centre of gravity of your trailer. This makes it easier to handle at higher speeds with higher loads. This usually applies for people using the trailer for touring purposes. During everyday uses in traffic these advantages will hardly come into effect. When chosing 16 inch instead of 20 inch wheels this will also affect the geometry of your trailer when used as hand cart or trolley. In combination with a bicycle with 28 inch wheels your trailer well be slightly inclined.
Plastic wheels with heavy-duty tires and sealed stainless steel axle bearings suited for boat trailers or hiking trailers.
For rough terrain, sand or snow you can equip your trailer with fat tires that are 90 mm wide and 57 mm in diameter. Only in combination with the rigid stainless steel axle possible.
Because these tires are so wide you can only mount them on a rigid stainless steel axle with a clearance of 2,7 cm on each side. Because of the large volume of these tires the trailer is slightly inclined when resting on the swing-up stand.
The price referes to the surcharge to the standard wheel configuration. Please note that quick-release axles have to be ordered separately.
Protect your cargo from dirt and water with these mudguards.
These mudguards are especially made to our specifications from high-quality plastic and are screwed into the sidewall of the trailer. They ship with all necessary screws and a stiffening plate. They are ideal if you want to transport your pets on the trailer or a concerned about your cargo getting dirty. However, since they are permanently attached your trailer cannot be folded into a very small package.
Order two to outfit your two-wheel trailer.
Please note: These mudguards do not entirely cover the width of our Smart Sam or Super Moto tire. However, the sufficently reduce the amount of dirt and water that gets thrown up by the wheels.
One of the most usefull accessories for our trailers is our grooved rubber mat. It protects the colour coating of your trailer, keeps the cargo from shifting and dampens noise. Please specify the size when ordering. We will adjust the invoice according to your chosen size.
The grooves help to keep your cargo from shifting. The rubber mat comes in the fitting size for the chosen model. Cut out a little piece of the mat in the fronts centre if you want to use your trailer as hand cart. For this you need to access the triangular opening in the trailers floor.
This simple looking lashing strap makes all the difference in day to day use, because it's so fast and easy to use. Our industrial designer Maruan Attia put quite some work into designing and developing it. The hooks are self-securing when clipped into the chassis and self-alligning when tensioned. Unclipp them with a simple twisting motion towards the side.
This tail light consists of a very bright high-powered-LED (0,5 W) and two additional LEDs. It is powered with 2 AAA batteries (included) and has a running time of up to 50 hours and a light indicating when it's low on batteries. Since it is certified to be used in German traffic it has by law a steady light output only and no flashing mode. We are big fans of this little yet powerful light and have cnc-milled two little slots on each side of the trailers back wall where it clips on beautifully.
If ordered with a new trailer it comes already installed. When ordered separately it comes ready for installation.
Attention: The bow handle and trolley option does not work in combination with the rigid stainless steel axle or the URSUS heavy-duty kickstand.
Collapsible ledge in silver or black for the trolley function of Hmini and Hmax.
Please specifiy the colour at the end of your trailer configuration in the messaging field.
When orderered as part of a trailer it comes already installed.
When ordered seperately it comes with everything needed for installation.
Made and cnc-milled from 4mm strong aluminium. Prevents the cargo from sliding off when the trailer is used as trolley.
Maximum loading capacity: 25 kg.
Please note that the collapsible ledge is a weight optimized part made from aluminium. It therefore has not the same loading capacity and strength as a professional hand truck. Please carefully test for yourself if it can support the loads you're planning to pull.
The v-shaped reinforcement bracket is cnc-milled and anodised. It strenghtens the hitch arm adapter which is advisable when mainly using a trailer on rough roads with lots of vibrations or when transporting heavy loads are your daily business.
We recommend ordering or retrofitting the v-reinforcement bracket for those using their trailer professionally. We also recommend it for people taking their trailer on long touring trips or expeditions as well as anyone transporting really heavy stuff on a regular basis.
The splashguard by FAHRER Berlin was especially developed for using it with a trailer. Extra long and installed on the rear mudguard of your bike it will protect your trailer from water and dirt.
The LATZ splasguard can easily be installed on the rear mudguard of your bike.
Additional wheel turning your trailer into a three-wheeler. Ideally suited for professional use when a horizontally stable working space is required or when you have frequent stops to make when on foot.
The front wheel is a stronger alternative to the standard delivery swing-up stand of our trailers. This wheel set turns your trailer into a three-wheeler in a few seconds and enables you to use it as a horizontally movable working space, for example as shopping cart, as camera dolly, as paper delivery trailer etc. The wheels arm clicks into the hitch arm adapter of your trailer which is empty when you use your trailer as a hand cart. Smooth running wheel with ball bearings.
Parking brake for sidewise mounting to the aluminium chassis. Blocks a wheel and prevents accidental rolling away of the parked trailer.
If you order your trailer including the parking brake it comes already assembled and ready for installation. Each trailer has designated preexisting holes on either side. Please specify on which side you want the parking brake to be mounted (in the direction of travel right or left side). We recommend using parking brakes on both sides.
Parking brakes for sidewise mounting to the aluminium chassis. Block both wheels and prevent accidental rolling away of the parked trailer.
If you order your trailer including the parking brakes they come already assembled and ready for installation. Each trailer has designated preexisting holes on either side making installing them very easy.
For all trailers that are constantly used with very heavy loads as well as for all our larger models we recommend installing rigid axle mounts.
This tube made from stainless steel is permanently installed with two aluminium clamping pieces (not included) underneath your trailer. Click in your wheels with their quick-release slide-in shafts and you're ready to roll.
The rigid axle mounts come standard with our Hxxl light model, Hxxxl as well as with all our Bike-Transporter models. The rigid axle mounts are available in different sizes and are priced accordingly. If you order it seperately from a trailer please specify your trailer model and we will pick the right lenght automatically and adjust the total pricing.
The rigid axle mounts are available in the lenghts: 500, 550, 600, 650, 700, 750 und 800 mm.
The diameter is 20 mm.
Please order the clamping pieces seperately.
Please note: You cannot use the trolley function when the rigid axle mounts are installed as they collide with the expandable bow-arm.
The picture shows a clamping piece with excentric lever. Please specify what you need the clamping pieces for. For installing the rigid axle mount we deliver them without excentric lever, for the telescopic rigid axle mounts we deliver them with excentric lever.
There are situations where you'd wish that your trailer had a greater track width. Enter our telescopic axle mounts! They offer an additional track width of 18 cm making your trailer safer from overturning on downhills or with bulky and heavy loads on top.
This set consists of two stainless steel axle mounts ( Length 200mm, diameter 20 mm) as well as four clamping pieces with excentric levers and stainless steel screws for installation. The two outer clamping pieces can be screwed into the same holes as our standard axle mounts. For the two inner clamping pieces you need to drill a total of four holes. We include a drilling template.
Please note: The telescopic axle mounts collide with the trolley option!
Install our aluminium deflectors on each side of your trailer to protect its wheels. We recommend deflectors for larger and wider trailers that are used often or professionally. Deflectors can be combined with our parking brakes. If you already own parking brakes please tell us when ordering deflectors.
All our models come with all necessairy holes already in place making for an easy installation. Here you see the deflectors installed in combination with the parking brakes.
Robust t-shaped handlebar that can be attached to the end of the hitch arm using the same coupling mechanism. Makes pulling your trailer even more comfortable and offers variable positions for your hands.
If you are an above average height male you might want to consider using the t-shaped handlebar as well as the extended hitch arm to find a comfortable solution of using the trailer in hand cart mode.
This heavy-duty kickstand is great for our larger trailers and can be comfortably operated with ones feet. It is much more robust than the standard delivery swing-up stainless steel stand.
Works only with trailers with 20 inch wheels. If you retrofit your trailer with the URSUS kickstand you need to drill four holes into your trailers chassis (except for our Hxxxl model and Bike-Transporter). If you order it together with a new trailer we install it for you.
Cannot be combined with the trolley option as it colides with the expandable bow arm.
Using this ramp even heavy bikes can be easily pushed onto our Bike-Trailer models and don't have to be lifted.
The ramp is being fixated with a plug connection when in use. Older models don't come standard with a designated hole but that can just be drilled by yourself.
CNC-milled from aluminium and anodised in silver.
Our standard hitch arm that ships with all of our models. If you want to order an additional standard hitch arm click here.
Our hitch arms are designed to be used with the hitch-system made by WEBER.
If you want to use a different system please write to us.
The same dimensions as our standard hitch arm but with a lock which lets you lock the hitch arm to your bike.
This lockable hitch arm is a good protection against petty theft. If you leave your trailer unattended for a longer period of time we still recommend using a propper lock or a loop cable with your primary bike lock because you could otherwise still detach the trailer from the hitch arm if you knew how.
The price refers to the surcharge to the standard hitch arm. The lock can not be retrofitted to a standard hitch arm.
This hitch arm is 12 cm longer than our standard hitch arm making it more comfortable for taller people to pull the trailer in hand cart mode.
By taller we mean people of 1,85 meters and above. Naturally the extended hitch arm works with all our trailer models. Very tall people can combine the extended hitch arm with the t-shaped handlebar for even more reach. When used in bike trailer mode the extended hitch leads to a longer distance between bike and trailer (which is a benefit for transporting bulky goods that extend well beyond the loading plattform.
This special hitch arm was designed for attaching the bike trailer to vehicles with two rear wheels hold by a rear-axle. Installation is nearly centric on the axle of the bike. Naturally this hitch arm works with all our trailers.
This special hitch arm was designed for narrow DIY trailers for which the usual off-centre mounting of the hitch arm adapter is not possible. This hitch arm is also used by our boot trailers Hboat and Hbigboat. This hitch arm comes in a lockable version only.
For some bike types or some purposes this high hitch arm is preferable to our standard low hitch arm.
If possible we always recommend the lower hitch arm connection because of the much better driving dynamics. The high hitch arm straines the hitch adapter in a different way making the v-reinforcement bracket mandatory (please order it when ordering this hitch arm). We automatically change our standard EL Weber hitch to the H-hitch when you order this high mounting hitch without an extra charge.
If you already own a kids trailer or a different hitching system than our preferred WEBER we offer this hitch arm with an open end on one side for you to attach a different hitch adapter.
For transporting long loads you can extend the standard hitch arm with this adapt made from aluminium and metal-reinforced plastic. Use a maximum of two extensions at the same time.
The extension fits to the hitch arm almost free of play. Combine a maximum of two extensions at once and be aware that cycling with an extended hitch arm changes the driving characteristics of your trailer.
When ordering the extension together with a trailer it comes ready for use. Otherwise you either have to do a bit of handiwork yourself or you send us your existing hitch arm and we will do the adaption for you free of charge. You just pay the shipping costs.
For our large trailer models we recommend upgrading to the heavy-duty hitch arm and hitch arm adapter when heavy loads are your daily business. BikeTrailer models have them as standard.
Fits to any trailer model and can be easily retrofitted as it uses the same holes as our standard hitch arm adapter. The heavy-duty hitch arm adapter (combined with the heavy-duty hitch arm, the rigid axle mounts and the URSUS kickstand) upgrade your trailer to a truely heavy-duty biest. Please note that due to the geometry and the tubular shape of the heavy-duty hitch arm you cannot use it to pull your trailer in hand cart mode.
When choosing the heavy-duty hitch arm adapter with a new trailer it only makes for an increase of 89,- € incl. VAT.
The heavy-duty version of our standard hitch arm is made from a much thicker walled tube of aluminium. This reduces vibrations when a trailer is heavily loaded and reduces the risk of its fracture.
Works only in combination with the heavy-duty hitch arm adapter. Due to the changed geometry and tubular shape the heavy-duty hitch arm cannot be used to pull the trailer as a hand cart as it doesn't fit through the triangular openings in the trailers chassis.
The heavy-duty version of our standard hitch arm for central mounting is made from a much thicker walled tube of aluminium. This reduces vibrations when a trailer is heavily loaded and reduces the risk of its fracture.
Heavy-duty hitch arm if you want for central mounting on your bike and trailer.
Our reinforced heavy-duty hitch arms are perfect for trailers that have to haul heavy weights. Paired with our heavy-duty hitch arm adapter. This straigth shaped version is perfect if you have the possibility of mounting the trailer hitch centrally behind your bike, e.g. on trikes, wheel chairs or other bikes.
Please note that the heavy-duty hitch arm adapter has to be installed centrally on the trailers chassis which is done by drilling four holes.
These hitch arm extension of our heavy-duty hitch arm line have our unique QuickClamp locking mechanism. With this the hitch arm extension is easily attached without the need of tools and without having any play.
In case you already own a heavy-duty hitch arm and just want the extension we would have to outfit your heavy-duty hitch arm as well as the hitch arm adapter with the QuickClamp lock too. If you order all at once this will automatically be done.
This trailer hitch comes as standard delivered with your trailer. In case you need an additional trailer hitch you can order it here.
Everyone of our trailers comes standard with a WEBER EL-hitch which is only certified to be used for cargo trailers.
Chose the Weber E-hitch (or other variations) in case you want to use it for pulling a kids trailer too.
Please read the manual by WEBER and scroll down to the installation guide in English.
If you have a Rohloff Speedhub on your bike: congratiolations! We love that hub! For owners of a Rohloff hub without quick release skewers (touring axle) and with a sliding dropout we recommend the Weber ER-hitch. If your bike doesn't have a sliding dropout than you can use the Weber E-hitch with an additional part from Rohloff.
In case your frame has drillings for attaching kickstands directly to the frame (the KSA 18 or KSA 40 standard) you can attach the WEBER hitch there too.
Our standard hitch certified to be used for pulling kids trailer too.
Trailer hitch for seatpost mounting and trailer weights up to 45 kg.
Hinterher seatpost hitch with WEBER conector. In theory it can handle loads up to 80 kg but we restrict its usage to 45 kg of trailer weight. It is not suitable for light-weight seatposts or ones made from carbon fibre.
Comes included with two different plastic sheets to fit different seatpost diameters.
Please bear in mind to install the seatpost hitch as low as possible to reduce the leverage by the seatpost. Please also make sure that the trailer hitch has no play when installed. Depending on where you're going with your trailer, how the trailer is loaded onto the trailer our maximum weight recommendation may vary. Please use common sense when judging what your seatpost, bike and our seatpost hitch can actually haul in practice.
Please note in the comment field if you want to order this hitch version instead of our standard WEBER EL hitch.
In case you need to use our trailers with a high rising drawbar that connects to the seatpost this is the hitch you'll need.
When ordering a hitch version together with a new trailer we only charge you the additional cost compared to the standard hitch. If you want to order a hitch in addition (and not instead) of the standard hitch please specify this in the commentary field at the bottom of this page.
Please wait for your invoice to see the exact amount.
The WEBER trailer hitch ES is the heavy-duty version of the EL. It is meant for those who frequently need to pull weights above 80 kg with their bike. Just like the EL the ES is not meant to be used with kids trailers. In case you use one of our trailers with two wheel axles this hitch can even withstand 200 kg loads. Certain conditions apply for instance a centrally placed drawbar connection to your bike.
Trailer hitch WEBER ER "Rohloff"
For those lucky enough to own a bike equiped with a Rohloff Speedhub this Weber version may be perfect depending on the dropouts of your bike.
Some bikes come with a kickstand mount for the Pletscher kickstands. In case you have not enough space on your bike you can use this adapter to mount the Weber EP hitch in a different way saving you space.
Trailer hitch WEBER EP "Pletscher"
Some bike frames come with a mount for a kickstand designed to be used with kickstands made by Pletscher.
Trailer hitch WEBER EH "Hebie"
If your bike frame already has a mount for the Hebie kickstand system you can use the EH version of the Weber hitch.
Trailer hitch WEBER EU "Ursus"
For bikes with a mount for a ursus kickstand this hitch is perfect.
Sometimes you just can't install your trailer hitch at the rear axle. And if your bike doesn't have some other holes for installing a kickstand things get complicated. Luckily this combination of a kickstand and a Weber hitch is easy to mount directly onto the frame.
Sometimes you just can't install your trailer hitch at the rear axle. And if your bike doesn't have some other holes for installing a kickstand things get complicated. Luckily this version of the Weber hitch attaches directly to the frame and can solve your mounting problems.
In case the quick release skewer on the rear wheel of your bike has not enough threads left to accomodate the WEBER hitch you can replace it with this extra long quick release skewer.
Extremely compact rachet for your workshop or for the road. Including six nuts (5/6/8/10/12/13) und 16 bits. With two extensions.
We love this little tool set that suprised us with its functionality, quality and low price. Unlike common multi-tools this rachet works in the tightest of spaces. Comes in a high-qualitay metal box.
Loop cable to secure your bike trailer with your primary bicycle lock.
Secure your trailer in case you have to leave it outdoors and loop the cable through your wheels and the triangular opening of the trailers chassis.
Protects your bike from theft in high-risk areas. Use it together with the ABUS loop cable to secure your bike and trailer. Made from hardened steel, foldable.
Legendary universal oil - tried and tested for generations!
Use this silicon oil spray to clean and protect the plastic or rubber parts on our trailer. This silicon spray prevents plastic or rubber from getting embrittled. It's ideal for caring and protecting the hitch arm and the hitch arm adapter of your bike.
With only a few exra parts you can turn pretty much any of our bike trailers into a hiking trailer. Get the load off your back, move heavier stuff further faster and with less energy. All you need is to install a second hitch arm adapter, the v-reinforcement brackets and our collapsable handlebars.
All our trailers come with the necessary holes already in place for installing a second hitch arm adapter, making the installation a matter of minutes. The second hitch arm adapter remain permanently on your trailer, whether you use it as bike trailer or of course as hiking trailer. Click in the two handlebars and you're ready to go. For longer hikes we recommend using our optional hip belt for pulling the trailer hands-free. A special carabine allows you to dettach the trailer from the hip belt even while under tension.
Our Hmax light model is especially suited for being used as a hiking trailer since it's already weight optimized. The whole hiking trailer packs down to a small package making for easy transportation.
For using your bike trailer as hiking trailer you need these two handlebars. For easy transportation they can be parted in the middle. They come with grip tape, hand loops and short loops for attaching them to the optionally available hip belt with carbines.
Please note: The two handlebars attach to the trailer via the hitch arm adapters. So you need a total of two hitch arm adapters on your trailer. Please order the requiered number separately.
Proven and reliable pulling harness by Fjellpulken. Attaching your hiking trailer to this harness makes pulling it even easier and more comfortable. Your arms can now freely swing while you walk.
This tried-and-tested pulling harness by Fjellpulken is more comfortable and sophisticated than our basic harness. This makes it perfect for prolonged hikes and expeditions.
Ideally suited for pulling a trailer this backpack with an integrated pulling harness offers 25 liters of volume for all things that have to be quickly accessible.
We recommend using this carabines for attaching our trailer to the pulling harnesses by Fjellpulken. They can be opened under load in emegerncy situations.
We ship the carabines with a length-adjustable abrasion resistant cord for attaching it to the pulling harness.
Overview of our hitch arm parts for rickshaws. This modular and highly reliable system constists of partable parts that make for easy storage and transportation.
Das SUP-Board wird ganz hinten auf den Bootswagen gelegt und verspannt.
This wonderfully leightweight yet extremely sturdy trolley lets you easily move your canoe or kayak to the water. Even long portages become easy. The trolley can be disassembled in seconds without tools and packs extremely small.
CNC-milled high-quality plywood panel with several coatings, made with waterproof glue.
This trolley is extremely robust and will handle boats up to a length of 6 meters that are not wider than one meter.
Getting your boat to the lake or shore by bicycle? With this bike trailer it is easy. In combination with a folding bike it means total independence from transfers. Just pack and fold everything together into your boat and enjoy the waters.
The most beautiful places and spots can be seldomly reached by car. But on a bicycle you most often can. Pack your boat and bike to the lake or shore. And if you happen to own a folding bike you can experience total independence from car transfers. Just get in or out of the water and cycle away.
This bike trailer and trolley is extremely robust and will handle boats up to a length of 6 meters that are not wider than one meter. When used as bike trailer please adhere to the maximum weight limit your bike and its brakes were designed for. Please consult the bikes manufacturer for its specific maximum system weight (bicycle+rider+trailer+load).
This luggage trolley is just as robust as its siblings designed for transporting boats. It's perfect for effortlessly transporting your folding or inflatable boat, equipment and luggage. With different wheel sizes and tires available it can be customized for every terrain and is yet easily disassembled and packed away.
All you want behind your bike is a rolling box with huge loading space that is splash proof and lockable? Then this trailer is the right one for you. Using the Hboat base plate the whole trailer becomes very lightweight. And don't underestimate the great pracktikability and versatility of the reeling on top of the box that lets you transport all sorts of (bulky) things ontop of the box.
Just like its smaller brother the Hbigboat trolley is perfect for easily and securely pulling larger boats, surf boards or stand-up-paddle-boards. When not in use it packs away in no time and stores in a small package.
This trolley is extremely robust and will handle most surf boards and boats up to a length of 6 meters that are not wider than one meter. Special solutions for various requirements are available too.
This trailer lets you use your bike to get your surf board or stand-up-paddle-board to the water. And there's still ample storage space left for your further equipment.
If you want to pull heavy loads take a look at this model. Compared to moving loads on your back it's super efficient and comfortable. You can go further faster and move heavier loads. And our trailer is still very leightweight for what it is capable of.
Combine it with our harness and make pulling your rikshaw even more comfortable and have your hands free. Upgrade it with drum brakes from Sturmey Archer to brake it on slopes. For everyday hikes or expeditions, you decide!
This rikshaw is extremely robust and will handle very heavy loads you wouldn't want to go hiking with. Please load according to the expected topography and your physical abilities.
One pair of handlebars for pulling your trailer, partable. Can be retrofitted to any model from the alu chassis series which comes already shipped with all the necessary holes for installation.
we recommend upgrading the two hitch arm adapters with our v-bracket reinforcement because in hiking mode there is a lot more stress on the them since the two handlebars act as levers.
Handlebar for trolley use, partable.
Use your boat trailer as rickshaw for transporting your equipment. The handlebars are partable and don't take much room when not in use.
For transporting your SUP on foot or with a bike. For the latter you need the seatpost hitch by WEBER.
We couldn't help but configure a boat trailer with ski. It just too much fun hauling stuff through the snow and making a trailer even more versatile.
more information » Preis auf Anfrage bei individueller Konfiguration der Bauteile.
High-quality aluminium box for the Hmini. Lockable, splash-proof and made in Germany.
We are big fans of using aluminium boxes on our trailers. They not only hold your goods together but protect them from rain or dust. Granted, they are not cheap but will last you decades. And they are even more practical than you might think. Put some padding at the bottom of the box if you transport delicate stuff to dampen the vibrations. Off the trailer we use the box as seat and "safe deposit box". Lock it, loop cable it to your bike and you can go for a beer. You can even drill two holes into the trailers chassis and your box and use two quick release skewers to fix it to your trailer. Only when the (lockable) box is open can you then open the quick release skewers and take off the box in no time. We also strongly recommend installing our stainless steel hinges on top of the box for lashing down things.
High-quality aluminium box for the Hmax. You can take the lid off and use it without. The box is also lockable, splash proof and made in Germany.
We are big fans of using aluminium boxes on our trailers. They not only hold your goods together but protect them from rain or dust. Granted, they are not cheap but will last you decades. And they are even more practical than you might think. Put some padding at the bottom of the box if you transport delicate stuff to dampen the vibrations. Off the trailer we use the box as seat and "safe deposit box". Lock it, loop cable it to your bike and you can go for a beer. You can even drill two holes into the trailers chassis and your box and use two quick release skewers to fix it to your trailer. Only when the (lockable) box is open can you then open the quick release skewers and take off the box in no time.
We also strongly recommend installing our stainless steel hinges on top of the box for lashing down things.
High-quality aluminium box for the Hxl. Lockable, splash-proof and made in Germany.
High-quality aluminium box for the Hxxl. Lockable, splash-proof and made in Germany.
High-quality custom-made aluminium box for the Hxxxl. Lockable with three locks, splash-proof and made in germany.
Our usefull railing for the aluminium boxes for self installation. We ship it with all necessary parts for installation with is not too hard if you know how to drill a hole.
With a drilling hole pattern you have to drill 8 holes (d=10mm) through the lid of the box. Use some silicon to waterproof the holes.
Add even more versatility to your aluminium box. Lash things down on top of the box.
We cannot recommend this option (or the stainless steel hinges) enough, because they add so much more practicability to your trailer with a box.
1 stainless steel loop, forged and made by Wichard originally for sailing boats. The hooks of our custom-made lashing straps fit it perfectly.
Seriously, if you order one of our aluminium boxes, order these steel loops as well. We cannot recommend them enough. Put bulky things on top of your box and lash them down or knot down the elastic cord for quickly stashing light things. If you know how to use a drill and apply some common sense (e.g. not drilling through the lids sealing) you can easily install the loops yourself.
4 stainless steel loops, forged and made by Wichard originally for sailing boats. The hooks of our custom-made lashing straps fit them perfectly. We throw in an elastic cord that you can guy through the loops for quickly stashing light things onto your aluminium box.
Seriously, if you order one of our aluminium boxes, order these steel loops as well. We cannot recommend them enough. Put bulky things ontop of your box and lash them down or knot down the elastic cord for quickly stashing light things. If you know how to use a drill and apply some common sense (e.g. not drilling through the lids sealing) you can easily install the loops yourself (see our other option for ordering just the parts without installation).
Bored? Then build your own trailer with a Zarges MaxiBox. Our base plate is made of a CNC-milled high-quality plywood panel with waterproof glue.
Below you see an example of a Maxibox including our railing, parking brakes, deflectors and a second hitch arm adapter to click in our rickshaw handlebars.
Fits our H Fiffi, Hmini and Hmax models perfectly, especially if you use the latter two as trolley.
Versatile, waterproof, Ortlieb. This usefull and heavy-duty backpack is ideal for our smaller trailers.
Versatile, waterproof, Ortlieb! The padded shoulder strabs can be taken off.
Tried and tested, we love to put Ortlieb bags onto our trailers.
Tried and testet, we love to put Ortlieb bags onto our trailres.
Versatile, waterproof, Ortlieb! TIZIP zipper for great access to the main compartment. Available in different colours and sizes.
The padded shoulder straps can be taken off. The ideal solution for your Hinterher trailer if you are looking for an affordable yet robust and leightweight option to transport things.
Folding box for Hmini. Made of wood and tarpulin.
Mit nur einer Handbewegung werden die Klapp-Bordwände auseinandergefaltet und anschliessend mit zwei beigelegten Gurtbändern am Aluchassis befestigt.
Die Scharnierbänder werden aus recycelter LKW-Plane hergestellt.
Folding box for Hmax. Made of wood and tarpulin.
With Schwalbe Big Apple tire, black hub and rim, stainless steel spokes and sealed bearings.
With Schwalbe Big Apple tire, silver hub and rim, stainless steel spokes and sealed bearings.
Please note that the quick-release axle is not included and has to be orderered separately. When combining a trailer with fattyres and the URSUS kickstand your trailer will not stand level because of the larger volume of the fattyres. Pleaes also note that the rigid axle mount has to have at least 2,7 cm of clearance on each side of the aluminium chassis otherwise the fattyre will touch the chassis.
Spare inner tube for 16" wheels with Schrader valve.
Spare inner tube for 20" wheels with Schrader valve.
The Big Apple is our standard tire. Excellent rolling resistance and large volume make it perfect for trailer use. Since it's meant to be used at low air pressure it acts as a good suspension for our trailers.
Depending on what you are loading onto your trailer we drive the tire with very low air pressure for maximizing its dampening effect.
Great tire with excellent puncture resistance for heavy transports (allowed carrying capacity of 115 kg per tire). Certified to be used with 45 km/h e-bikes.
Excellent mountainbike tire ideally suited for off-road use of our trailers (e.g. for hiking trailers).
1 quick-release axle with black aluminium cap.
With ball lock pins to safely securing the wheel in the axle mount. Includes spacer and rubber ring.
Please note: The axle is made from steel since it is harder and more stress resistant than stainless steel. Please clean it regularily from dirt and lubricate it with a high quality lubricant, e.g. chain oil.
1 quick-release axle with silver aluminium cap.
1 axle mount made from glas fibre reinforced plastic with an inner brass casing. Includes stainless steel screws.
If you order more than one piece please note this in the commentary field at the bottom of this page.
Patented hitch arm adapter with integrated swing-up stand for trailers with 16 inch wheels.
Made from fibre reinforced plastic and stainless steel. Includes all necessary screws for installation.
Patented hitch arm adapter with integrated swing-up stand for trailers with 20 inch wheels.
Stainless steel handlebar, extendable. For using the Hmini or Hmax as trolley.
Set comes complete with clamping pieces.
If you order it together with a Hmini or Hmax we install it for you. Please note that the folding flap is not included.
Clamping piece made from high-quality plastics.
Designed to clamp tubes with 15mm in diameter. Comes with stainless-steel screws included.
Guding piece made of high-quality plastic for guiding the trolley handlebar.
Made for tubes with 15mm in diameter. Comes with stainless-steel screws included.
Lashing strap hook that fits the cut outs in our trailers chassis. For DIY straps.
Ideally suited for 25mm wide straps.
Please note the desired number in the commentary field at the bottom of this page and wait for our invoice for the exact amount charged.
The shipping costs displayed in your shopping cart are for shipping within Germany only.
Because parcel sizes can vary enormously depending on the trailer you pick we cannot automatically display the actual shipping costs for the EU or world. Please wait for your invoice to see the propper shipping costs for your order. For your right of cancellation please look here Details about your right of cancellation. | 2019-04-21T16:23:58Z | https://munich-biketrailer.com/shop.php?shop_artikelid=41&shop_anzahl=1&type=o&t=1555409775&shopname=HHmaxshop |
Chrysler Pacifica 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, FACTORY WARRANTY REMAINING, Hands Free Bluetooth Capability, LEATHER HEATED & COOLED SEATS, NAVIGATION, ONE OWNER, PANORAMIC MOONROOF, REAR BACKUP CAMERA, Pacifica Limited S, 4D Passenger Van, 3.6L V6 24V VVT, 9-Speed Automatic, FWD, Ocean Blue Metallic, Black/Black/Black w/Nappa Leather Bucket Seats w/S Logo, 115V Auxiliary Power Outlet, 220 Amp Alternator, 360 Surround View Camera System, 3-Channel Video Remote Control, 3-Channel Wireless Headphones, 3rd row seats: split-bench, Adaptive Cruise Control w/Stop & Go, Advanced Brake Assist, Advanced SafetyTec Group, Auto High-beam Headlights, Automatic High Beam Headlamp Control, Automatic temperature control, Black Badging, Black Chrysler Grille Wing Badge, Black Day Light Opening Moldings, Black Spear Applique - Rear Fascia, Black Stow N Place Roof Rack, Blind spot sensor: Blind Spot Detection warning, Blu-Ray/DVD Player/USB Port, Body Color Door Handles, Body Color Exterior Mirrors, Dual front side impact airbags, Electronic Stability Control, Emergency communication system: SiriusXM Guardian, Falken Brand Tires, Front anti-roll bar, Front dual zone A/C, Full Speed Forward Collision Warning Plus, Fully automatic headlights, Garage door transmitter, Heated rear seats, Heated steering wheel, High Definition Multimedia Interface, High-Intensity Discharge Headlights, Knee airbag, Lane Departure Warning Plus, Memory seat, Nappa Leather Bucket Seats w/S Logo, Overhead airbag, Parallel & Perp Park Assist w/Stop, ParkSense Front/Rear Park Assist w/Stop, Power driver seat, Power Liftgate, Power moonroof, Quick Order Package 27P, Radio: Uconnect 4C Nav w/8.4" Display, Rain Sensitive Windshield Wipers, Rear air conditioning, Rear Parking Sensors, Reclining 3rd row seat, Remote keyless entry, S Appearance Package, S Badge, Seatback Video Screens, Split folding rear seat, Steering wheel mounted audio controls, Sun blinds, Telescoping steering wheel, Tilt steering wheel, Turn signal indicator mirrors, Uconnect Theater w/Streaming, Upper/Lower Grilles/Blk Surrounds Premium Fascia, Ventilated Front Seats, Video USB Port, Wheels: 20" x 7.5" Aluminum Black Noise. 19/28 City/Highway MPG Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler Pacifica 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, FACTORY WARRANTY REMAINING, Hands Free Bluetooth Capability, LEATHER HEATED & COOLED SEATS, NAVIGATION, ONE OWNER, PANORAMIC MOONROOF, REAR BACKUP CAMERA, Pacifica Limited, 4D Passenger Van, 3.6L V6 24V VVT, 9-Speed Automatic, FWD, Jazz Blue Pearlcoat, Black/Alloy/Black w/Premium Leather Trim Bucket Seats, 115V Auxiliary Power Outlet, 20 harman/kardon Speakers, 20 Speaker harman/kardon Sound Group, 220 Amp Alternator, 3-Channel Video Remote Control, 3-Channel Wireless Headphones, 3rd row seats: split-bench, 760 Watt Amplifier, Auto High-beam Headlights, Auto-dimming door mirrors, Automatic temperature control, Blind spot sensor: Blind Spot Detection warning, Blu-Ray/DVD Player/USB Port, Dual front side impact airbags, Emergency communication system: SiriusXM Guardian, Front anti-roll bar, Front dual zone A/C, Front fog lights, Garage door transmitter, Heated rear seats, Heated steering wheel, High Definition Multimedia Interface, High-Intensity Discharge Headlights, Knee airbag, Memory seat, Navigation System, Overhead airbag, Power driver seat, Power Liftgate, Power moonroof, Power passenger seat, Premium Leather Trim Bucket Seats, Quick Order Package 27P, Radio: Uconnect 4C Nav w/8.4" Display, Rear air conditioning, Rear Parking Sensors, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, Seatback Video Screens, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Turn signal indicator mirrors, Uconnect Theater w/Streaming, Ventilated front seats, Video USB Port, Wheels: 18" x 7.5" Aluminum Polished. 19/28 City/Highway MPG Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler Pacifica 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, Hands Free Bluetooth Capability, LEATHER HEATED & COOLED SEATS, NAVIGATION, ONE OWNER, REAR BACKUP CAMERA, Pacifica Limited, 4D Passenger Van, 3.6L V6 24V VVT, 9-Speed Automatic, FWD, Velvet Red Pearlcoat, Black/Alloy w/Premium Leather Trim Bucket Seats, 115V Auxiliary Power Outlet, 20 harman/kardon Speakers, 20 Speaker harman/kardon Sound Group, 20" x 7.5" Aluminum Wheels, 220 Amp Alternator, 3-Channel Video Remote Control, 3-Channel Wireless Headphones, 3rd row seats: split-bench, 760 Watt Amplifier, 8 Passenger Seating & 20" Wheel Group, 8-Passenger Seating, Auto High-beam Headlights, Auto-dimming door mirrors, Auto-dimming Rear-View mirror, Automatic temperature control, Blind spot sensor: Blind Spot Detection warning, Blu-Ray/DVD Player/USB Port, Dual front side impact airbags, Emergency communication system: SiriusXM Guardian, Four wheel independent suspension, Front anti-roll bar, Front dual zone A/C, Front fog lights, Garage door transmitter, Heated rear seats, Heated steering wheel, High Definition Multimedia Interface, High-Intensity Discharge Headlights, Knee airbag, Kumho Brand Tires, Memory seat, Overhead airbag, Power driver seat, Power Liftgate, Power passenger seat, Radio: Uconnect 4C Nav w/8.4" Display, Rear air conditioning, Rear Parking Sensors, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, Seatback Video Screens, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Sun blinds, Telescoping steering wheel, Tilt steering wheel, Turn signal indicator mirrors, Uconnect Theater w/Streaming, Ventilated front seats, Video USB Port. 19/28 City/Highway MPG Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler Town & Country 3.6L 6-Cylinder SMPI DOHC Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, Hands Free Bluetooth Capability, HEATED SEATS, NAVIGATION, ONE OWNER, REAR BACKUP CAMERA, Town & Country Touring-L, 4D Passenger Van, 3.6L 6-Cylinder SMPI DOHC, 6-Speed Automatic, FWD, Granite Crystal Metallic Clearcoat, Black/Light Graystone w/Leather Trimmed Bucket Seats, 17" x 6.5" Aluminum Painted Wheels, 3rd row seats: split-bench, 40GB Hard Drive w/28GB Available, 5-Year SiriusXM Travel Link Service, 6.5" Touch Screen Display, A/V remote, Anti-whiplash front head restraints, Audio Jack Input for Mobile Devices, Auto-dimming door mirrors, Automatic temperature control, Bright Door Handles, Driver Convenience Group, Dual front side impact airbags, Entertainment system, Front anti-roll bar, Front dual zone A/C, Front fog lights, Garmin Navigation System, Heated Front Seats, Heated Second Row Seats, Heated Steering Wheel, High Definition Multimedia Interface, Illuminated entry, Keyless Enter-N-Go, Knee airbag, Leather Trimmed Bucket Seats, Navigation System, Overhead airbag, ParkView Rear Back-Up Camera, Power driver seat, Power Liftgate, Quick Order Package 29J, Radio: 430N, Rear air conditioning, Rear Parking Sensors, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, Remote Proximity Keyless Entry, SiriusXM Travel Link, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Touring Suspension, Video Remote Control, Wireless Headphones. Awards: * 2016 KBB.com Brand Image Awards Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler Pacifica 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, HEATED SEATS, LEATHER SEATS, NAVIGATION, ONE OWNER, REAR BACKUP CAMERA, Pacifica Touring L Plus, 4D Passenger Van, 3.6L V6 24V VVT, 9-Speed Automatic, FWD, Bright White Clearcoat, Black/Alloy w/Perforated Leather Trim Bucket Seats, 13 Speakers, 18" x 7.5" Painted Aluminum Wheels, 1-Year SiriusXM Guardian Trial, 360 Surround View Camera System, 3rd row seats: split-bench, 8.4" Touchscreen Display, 8-Passenger Seating, A/V remote, Adaptive Cruise Control w/Stop & Go, Advanced Brake Assist, Advanced SafetyTec Group, Apple CarPlay, Auto High-beam Headlights, Auto-dimming Rear-View mirror, Automatic High Beam Headlamp Control, Automatic temperature control, Blind Spot & Cross Path Detection, Disassociated Touchscreen Display, Dual front side impact airbags, Emergency communication system: Uconnect Access, Entertainment system, For Details, Visit DriveUconnect.com, Front anti-roll bar, Front dual zone A/C, Front fog lights, Full Speed Forward Collision Warning Plus, Fully automatic headlights, Google Android Auto, GPS Antenna Input, GPS Navigation, HD Radio, Headphones, Heated front seats, Heated rear seats, Illuminated entry, Integrated Voice Command w/Bluetooth, Knee airbag, Lane Departure Warning Plus, Michelin Brand Tires, Navigation System, Overhead airbag, Parallel & Perp Park Assist w/Stop, ParkSense Front/Rear Park Assist w/Stop, Perforated Leather Trim Bucket Seats, Power driver seat, Power passenger seat, Quick Order Package 27J, Radio: Uconnect 4C Nav w/8.4" Display, Rain Sensitive Windshield Wipers, Rear air conditioning, Rear Parking Sensors, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, SiriusXM Satellite Radio, SiriusXM Traffic Plus, SiriusXM Travel Link, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Tire & Wheel Group, Touring Suspension, USB Host Flip. 19/28 City/Highway MPG Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler Town & Country 3.6L 6-Cylinder SMPI DOHC Certified. CARFAX One-Owner. DVD Entertainment, Hands Free Bluetooth Capability, LEATHER SEATS, ONE OWNER, REAR BACKUP CAMERA, Town & Country Touring, 4D Passenger Van, 3.6L 6-Cylinder SMPI DOHC, 6-Speed Automatic, FWD, Billet Silver Metallic Clearcoat, Black/Light Graystone w/Leather Trimmed Bucket Seats, 17" x 6.5" Aluminum Wheels, 2nd & 3rd Row Window Shades, 3rd row seats: split-bench, 40GB Hard Drive w/28GB Available, 6.5" Touch Screen Display, A/V remote, Anti-whiplash front head restraints, Auto-dimming Rear-View mirror, Automatic temperature control, Dual front side impact airbags, Entertainment system, Front anti-roll bar, Front dual zone A/C, Front fog lights, Garage door transmitter, Headphones, Illuminated entry, Knee airbag, Leather Trimmed Bucket Seats, Overhead airbag, ParkView Rear Back-Up Camera, Power driver seat, Power Liftgate, Quick Order Package 29K, Radio: 430, Rear air conditioning, Rear window wiper, Reclining 3rd row seat, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Touring Suspension. Awards: * JD Power Initial Quality Study (IQS) * 2016 KBB.com Brand Image Awards Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler 300 3.6L 6-Cylinder SMPI DOHC Certified. CARFAX One-Owner. Clean CARFAX. Hands Free Bluetooth Capability, LEATHER HEATED & COOLED SEATS, NAVIGATION, PANORAMIC MOONROOF, REAR BACKUP CAMERA, 300 Limited, 4D Sedan, 3.6L 6-Cylinder SMPI DOHC, 8-Speed Automatic, RWD, Ceramic Gray Clearcoat, Black w/Leather w/Perforated Insert Bucket Seats, 20" x 8.0" Polished Aluminum Wheels, Adaptive Cruise Control w/Stop, Advanced Brake Assist, Anti-whiplash front head restraints, Auto High Beam Headlamp Control, Auto-dimming door mirrors, Auto-dimming Rear-View mirror, Automatic temperature control, Blind Spot & Cross Path Detection, Dual front side impact airbags, Dual-Pane Panoramic Sunroof, Emergency communication system: SiriusXM Guardian, Exterior Mirrors Courtesy Lamps, Exterior Mirrors w/Supplemental Signals, Front anti-roll bar, Front dual zone A/C, Full Speed FWD Collision Warn Plus, Garage door transmitter, Genuine wood console insert, Genuine wood dashboard insert, Genuine wood door panel insert, Heated rear seats, Heated steering wheel, Knee airbag, Lane Departure Warning Plus, Memory seat, Navigation System, Overhead airbag, ParkSense Front/Rear Park Assist System, Power Multi Function Mirror Manual Fold, Radio: Uconnect 4C Nav w/8.4" Display, Rain Sensitive Windshield Wipers, Rear anti-roll bar, Remote keyless entry, SafetyTec Plus Group, Speed control, Steering wheel memory, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Ventilated front seats. Odometer is 6323 miles below market average! 19/30 City/Highway MPG Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler 300 3.6L 6-Cylinder SMPI DOHC Certified. CARFAX One-Owner. Clean CARFAX. FACTORY WARRANTY REMAINING, Hands Free Bluetooth Capability, ONE OWNER, REAR BACKUP CAMERA, 300 Touring, 4D Sedan, 3.6L 6-Cylinder SMPI DOHC, 8-Speed Automatic, RWD, Gloss Black, Black w/Cloth High-Back Bucket Seats, 6 Speakers, Auto-dimming Rear-View mirror, Automatic temperature control, Cloth High-Back Bucket Seats, Dual front side impact airbags, Emergency communication system: SiriusXM Guardian, Exterior Parking Camera Rear, Front anti-roll bar, Front dual zone A/C, Illuminated entry, Knee airbag, Overhead airbag, Power driver seat, Quick Order Package 22E Touring, Radio: Uconnect 4C w/8.4" Display, Rear anti-roll bar, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Wheels: 17" x 7.0" Painted Cast Aluminum. 19/30 City/Highway MPG Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler 200 2.4L 4-Cylinder SMPI SOHC Certified. CARFAX One-Owner. Clean CARFAX. Hands Free Bluetooth Capability, HEATED SEATS, LEATHER SEATS, ONE OWNER, REAR BACKUP CAMERA, 200 S, 4D Sedan, 2.4L 4-Cylinder SMPI SOHC, 9-Speed 948TE Automatic, FWD, Black Clearcoat, Black w/Cloth w/Leather Trimmed Sport Seats, 6 Month Trial (Registration Required), 8.4" Touchscreen Display, Accessory Switch Bank, Air Conditioning ATC w/Dual Zone Control, Cloth w/Leather Trimmed Sport Seats, Comfort Group, Dual front side impact airbags, For Details Visit DriveUconnect.com, Front anti-roll bar, Front fog lights, Front/Rear Climate Control Outlets, Fully automatic headlights, GPS Antenna Input, Harman Radio Manufacturer, Heated Front Seats, Heated Steering Wheel, HID Headlamps w/LED Daytime Running Lamp, Humidity Sensor, Illuminated entry, Integrated Voice Command w/Bluetooth, Knee airbag, LED Fog Lamps, Nav-Capable! See Dealer for Details, Overhead airbag, Power 4-Way Driver Lumbar Adjust, Power driver seat, Premium 7" Driver Info Display Cluster, Premium Lighting Group, Quick Order Package 28L, Radio: Uconnect 8.4, Rear A/C & Heat Ducts, Rear anti-roll bar, Rear-View Auto-Dimming Mirror w/Microphone, Remote keyless entry, Remote Start System, SiriusXM Satellite Radio, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Sun Visors w/Illuminated Vanity Mirrors, Telescoping steering wheel, Tilt steering wheel, Uconnect Access, Wheels: 18" x 8.0" Satin Carbon Aluminum. Odometer is 3905 miles below market average! 23/36 City/Highway MPG Awards: * 2016 IIHS Top Safety Pick+ * 2016 KBB.com Brand Image Awards Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler Town & Country 3.6L 6-Cylinder SMPI DOHC Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, Hands Free Bluetooth Capability, HEATED SEATS, LEATHER SEATS, NAVIGATION, REAR BACKUP CAMERA, Town & Country Touring-L, 4D Passenger Van, 3.6L 6-Cylinder SMPI DOHC, 6-Speed Automatic, FWD, Bright White Clearcoat, Black/Light Graystone w/Leather Trimmed Bucket Seats, 17" x 6.5" Aluminum Painted Wheels, 3rd row seats: split-bench, 40GB Hard Drive w/28GB Available, 5-Year SiriusXM Travel Link Service, 6.5" Touch Screen Display, A/V remote, Anniversary Edition, Anniversary Edition Floor Mats, Anniversary Edition Splash Screen, Anti-whiplash front head restraints, Audio Jack Input for Mobile Devices, Auto High-beam Headlights, Auto-dimming door mirrors, Automatic temperature control, Blind Spot Sensor, Bright Door Handles, Driver Convenience Group, Dual front side impact airbags, Dual Rear Overhead Mini Consoles, Electronic Stability Control, Entertainment system, Front anti-roll bar, Front dual zone A/C, Front fog lights, Fully automatic headlights, Garage door transmitter, Garmin Navigation System, Headphones, Heated Front Seats, Heated Second Row Seats, Heated Steering Wheel, High Definition Multimedia Interface, Illuminated entry, Keyless Enter-N-Go, Knee airbag, Leather Trimmed Bucket Seats, Mini Overhead Console, Mopar Chrome Grille, MOPAR Door Sill Guards, MOPAR Premium Addition Group, MOPAR Slush Mats, MOPAR Splash Guards, Navigation System, Overhead airbag, Overhead Ambient Surround Lighting, Overhead Storage Bins, ParkView Rear Back-Up Camera, Power driver seat, Power Liftgate, Power passenger seat, Power Sunroof, Quick Order Package 29V Anniversary Edition, Radio: 430N, Rear air conditioning, Rear Parking Sensors, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, Remote Proximity Keyless Entry, SiriusXM Travel Link, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Sun blinds, Telescoping steering wheel, Tilt steering wheel, Touring Suspension, Turn signal indicator mirrors, Video Remote Control, Wireless Headphones. Awards: * 2016 KBB.com Brand Image Awards Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Chrysler Town & Country 3.6L 6-Cylinder SMPI DOHC Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, Hands Free Bluetooth Capability, HEATED SEATS, LEATHER SEATS, ONE OWNER, REAR BACKUP CAMERA, Town & Country Touring-L ANNIVERSARY EDITION, 4D Passenger Van, 3.6L 6-Cylinder SMPI DOHC, 6-Speed Automatic, FWD, Cashmere/Sandstone Pearlcoat, Dark Frost Beige/Medium Frost Beige w/Leather Trimmed Bucket Seats, 17" x 6.5" Aluminum Painted Wheels, 3rd row seats: split-bench, 40GB Hard Drive w/28GB Available, 6.5" Touch Screen Display, A/V remote, AM/FM radio: SiriusXM, Anniversary Edition, Anniversary Edition Floor Mats, Anniversary Edition Splash Screen, Anti-whiplash front head restraints, Auto High-beam Headlights, Auto-dimming door mirrors, Auto-dimming Rear-View mirror, Automatic temperature control, Blind Spot Sensor, Bright Door Handles, Driver Convenience Group, Dual front side impact airbags, Dual Rear Overhead Mini Consoles, Electronic Stability Control, Entertainment system, Front anti-roll bar, Front dual zone A/C, Front fog lights, Headphones, Heated Front Seats, Heated Second Row Seats, Heated Steering Wheel, High Definition Multimedia Interface, Illuminated entry, Keyless Enter-N-Go, Knee airbag, Leather Trimmed Bucket Seats, Mini Overhead Console, Overhead airbag, Overhead Ambient Surround Lighting, Overhead Storage Bins, ParkView Rear Back-Up Camera, Power driver seat, Power Liftgate, Power Sunroof, Quick Order Package 29V Anniversary Edition, Radio: 430, Rear air conditioning, Rear Parking Sensors, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, Remote Proximity Keyless Entry, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Touring Suspension, Turn signal indicator mirrors, Video Remote Control, Wireless Headphones. Odometer is 4024 miles below market average! Awards: * 2016 KBB.com Brand Image Awards Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
** NAVIGATION / GPS **, ** LOCALLY OWNED **, ** BLUETOOTH **, ** REAR BACKUP CAMERA **, ** SUNROOF / MOONROOF **, ** SUPER CLEAN INSIDE AND OUT **, ** EXCEPTIONAL SERVICE HISTORY **, ** 17" ALLOY WHEELS **, ** ONLY ONE OWNER **, ** 8-Way Power Driver Seat w/Lumbar Support **, ** EST 36 MPG HWY **. CARFAX One-Owner.
Chrysler 300 3.6L 6-Cylinder SMPI DOHC Certified. CARFAX One-Owner. Hands Free Bluetooth Capability, HEATED SEATS, LEATHER SEATS, NAVIGATION, ONE OWNER, PANORAMIC MOONROOF, REAR BACKUP CAMERA, 300 S, 4D Sedan, 3.6L 6-Cylinder SMPI DOHC, 8-Speed Automatic, RWD, Bright White Clearcoat, Black w/Leather Trimmed Sport Bucket Seats, 1 Year Trial (Registration Required), 300S Premium Group, 5-Year SiriusXM Traffic Service, 5-Year SiriusXM Travel Link Service, 8.4" Touchscreen Display, Anti-whiplash front head restraints, Auto-Dimming Exterior Driver Mirror, Automatic temperature control, Dual front side impact airbags, Dual-Pane Panoramic Sunroof, Emergency communication system, Front anti-roll bar, Front dual zone A/C, Front fog lights, Garage door transmitter, GPS Antenna Input, GPS Navigation, HD Radio, Heated front seats, Illuminated entry, Integrated Voice Command w/Bluetooth, Knee airbag, Leather Trimmed Sport Bucket Seats, Media Hub (SD, USB, AUX), Navigation System, Overhead airbag, Power passenger seat, Quick Order Package 22G, Radio: Uconnect 8.4 NAV, Rear anti-roll bar, Remote keyless entry, SiriusXM Satellite Radio, SiriusXM Traffic, SiriusXM Travel Link, Speed control, Speed-sensing steering, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Uconnect Access, Wheels: 20" x 8.0" Aluminum HyperBlack. 19/31 City/Highway MPG Awards: * 2016 KBB.com Best Buy Awards Finalist * 2016 KBB.com Brand Image Awards Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Dodge Durango 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, FACTORY WARRANTY REMAINING, Hands Free Bluetooth Capability, HEATED SEATS, LEATHER SEATS, NAVIGATION, ONE OWNER, REAR BACKUP CAMERA, SUNROOF / MOONROOF, Durango Citadel, 4D Sport Utility, 3.6L V6 24V VVT, 8-Speed Automatic, AWD, White Knuckle Clearcoat, Black w/Leather Trimmed Bucket Seats, 1 USB Charging Port in Console, 12V Auxiliary Power Outlet In Console, 2nd Row Console w/Armrest & Storage, 2nd Row Seat Mounted Inboard Armrests, 3rd Row Floor Mat & Full Console, 3rd row seats: split-bench, Anodized Platinum Appearance Package, Anti-whiplash front head restraints, Apple CarPlay, Auto High-beam Headlights, Auto-dimming door mirrors, Auto-dimming Rear-View mirror, Automatic temperature control, Beats Premium Audio System, Black Headlamp Bezels, Black Roof Rails, Blu-Ray Compatible Dual Screen Video, Cargo Compartment Cover, Dual front side impact airbags, Emergency communication system: Roadside Assistance/9-1-1 Call, Front anti-roll bar, Front dual zone A/C, Google Android Auto, Heated rear seats, Heated steering wheel, High-Intensity Discharge Headlights, Illuminated entry, Illuminated Rear Cupholders, Integrated Roof Rail Crossbars, Knee airbag, Leather Trimmed Bucket Seats, Memory seat, Navigation System, Navigation system: Garmin, Overhead airbag, Platinum Badging, Platinum Chrome Exterior Door Handles, Platinum Fog Lamp Bezels, Platinum Front Fascias, Platinum Interior Accents, Platinum Mirrors Caps, Platinum Premium Grille w/Black Texture, Platinum Rear Lower Fascia, Power driver seat, Power Liftgate, Power moonroof, Power passenger seat, Premium Entertainment Group, Premium Wrapped I/P Bezel, Quick Order Package 2BP Anodized Platinum, Radio: Uconnect 4C Nav w/8.4" Display, Rear air conditioning, Rear anti-roll bar, Rear DVD Entertainment Center, Rear window wiper, Rear-Seat Video System, Remote keyless entry, Sill w/Platinum Accent, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Ventilated front seats, Wheels: 20" x 8.0" Satin Carbon Finish. Odometer is 1537 miles below market average! Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Dodge Durango 3.6L V6 Flex Fuel 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. Hands Free Bluetooth Capability, NAVIGATION, ONE OWNER, REAR BACKUP CAMERA, Durango Limited Rallye, 4D Sport Utility, 3.6L V6 Flex Fuel 24V VVT, 8-Speed Automatic, AWD, Redline 2 Coat Pearl, Black w/Leather Trimmed Bucket Seats, 3rd row seats: split-bench, 5-Year SiriusXM Traffic Service, 5-Year SiriusXM Travel Link Service, 8.4" Touchscreen Display, Anti-whiplash front head restraints, Auto-dimming door mirrors, Auto-dimming Rear-View mirror, Automatic temperature control, Black Headlamp Bezels, Body Color Front Fascia, Body Color Rear Fascia, Body Color Shark Fin Antenna, Body Color Sill Molding, Body Color/Accent Color Grille, Body Colored Wheel Lip Moldings, Delete Roof Rack, Dual Rear Exhaust w/Bright Tips, Emergency communication system, Exterior Parking Camera Rear, Four wheel independent suspension, Front anti-roll bar, Front dual zone A/C, Front fog lights, Fully automatic headlights, Garage door transmitter, GPS Navigation, HD Radio, Heated front seats, Heated rear seats, Heated steering wheel, Illuminated entry, Knee airbag, Leather Trimmed Bucket Seats, Memory seat, Nav & Power Liftgate Group, Overhead airbag, Power driver seat, Power Liftgate, Power passenger seat, Power Sunroof, Quick Order Package 23E, Radio: Uconnect 8.4 NAV, RALLYE Appearance Group, Rear air conditioning, Rear anti-roll bar, Rear Parking Sensors, Rear window wiper, Remote keyless entry, SIRIUSXM Traffic, SIRIUSXM Travel Link, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Turn signal indicator mirrors, Uconnect Access, Uconnect Voice Command w/Bluetooth, Wheels: 20" x 8.0" Gloss Black Aluminum. Odometer is 2850 miles below market average! Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Dodge Grand Caravan 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. DVD Entertainment, Hands Free Bluetooth Capability, ONE OWNER, REAR BACKUP CAMERA, Grand Caravan SXT, 4D Passenger Van, 3.6L V6 24V VVT, 6-Speed Automatic, FWD, White Knuckle Clearcoat, Black/Light Graystone w/Premium Seats w/Suede Inserts, 115V Auxiliary Power Outlet, 17" x 6.5" Aluminum Wheels, 1-Yr SiriusXM Radio Service, 2nd Row Overhead 9" VGA Video Screen, 2nd Row Overhead DVD Console, 2nd Row Stow'N Go Bucket Seats, 3rd row seats: split-bench, 40GB Hard Drive w/28GB Available, 6.5" Touchscreen Display, Air Conditioning, Anti-whiplash front head restraints, Automatic Headlamps, Black Finish I/P Bezel, Bluetooth® Streaming Audio, Bright Belt Moldings, Bright Side Roof Rails, Charge Only Remote USB Port, Dual front side impact airbags, Front anti-roll bar, Front dual zone A/C, Front Fog Lamps, High Definition Multimedia Interface, Highline Door Trim Panel, Illuminated entry, Integrated Roof Rail Crossbars, Knee airbag, Leather Wrapped Shift Knob, Leather Wrapped Steering Wheel, Overhead airbag, ParkView Rear Back-Up Camera, Power 2-Way Driver Lumbar Adjust, Power 8-Way Driver Seat, Power Liftgate, Premium Interior Accents, Quick Order Package 29P, Radio: 430, Rear air conditioning, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, Remote Start System, Remote USB Port, Security Alarm, Security Group, Single DVD Entertainment, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Touring Suspension, Uconnect Hands-Free Group, Uconnect Voice Command w/Bluetooth, Video Remote Control, Wireless Headphones. Awards: * JD Power Initial Quality Study (IQS) Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Dodge Charger HEMI 5.7L V8 Multi Displacement VVT Certified. CARFAX One-Owner. Clean CARFAX. Hands Free Bluetooth Capability, HEATED SEATS, LEATHER SEATS, ONE OWNER, SUNROOF / MOONROOF, Charger R/T DAYTONA, 4D Sedan, HEMI 5.7L V8 Multi Displacement VVT, 8-Speed Automatic, RWD, Pitch Black Clearcoat, Brazen Gold/Black w/Daytona Perforated Suede/Leather Seats, 3-Mode Electronic Stability Control, Anti-whiplash front head restraints, Auto Adjust In Reverse Exterior Mirrors, Auto-Dimming Exterior Driver Mirror, Auto-dimming Rear-View mirror, Black 1-Piece Performance Spoiler, Black Grille, Black-Edged Premium Floormats, Body Color Exterior Mirrors, Body Color Fascias, Bright Pedals, Carbonite Interior Accents, Daytona Decals Hood/Roof/Trunk, Daytona Edition Group, Daytona Front Grille Badge, Daytona I/P Badge, Daytona Perforated Suede/Leather Seats, Dodge Performance Pages, Driver & Passenger Lower LED Lamps, Dual front side impact airbags, Electronic Stability Control, Emergency communication system: Uconnect Access, Exterior Mirrors w/Heating Element, Front anti-roll bar, Front fog lights, Front Overhead LED Lighting, Fully automatic headlights, Functional Hood Scoop, Gloss Black I/P Cluster Trim Rings, Heated 2nd Row Seats, Heated Front Seats, Heated Steering Wheel, High Speed Engine Controller, Illuminated Rear Cupholders, Leather Trim Seats, Lower Bodyside Bodycolor Cladding, MOPAR Cold Air Intake System, Overhead airbag, ParkSense Rear Park Assist System, Performance Steering Wheel, Performance Suspension, Power 8-Way Driver Seat, Power driver seat, Power Driver/Passenger 4-Way Lumbar Adjust, Power Front Driver/Passenger Seats, Power Heated Memory Mirrors w/Man F/Away, Power Tilt/Telescope Steering Column, Projector LED Fog Lamps, Quick Order Package 29S Daytona 340, Radio/Driver Seat/Mirrors Memory, Radio: Uconnect 4C w/8.4" Display, Rear anti-roll bar, Rear Seat Armrest w/Storage Cupholder, Satin Black Charger Decklid Badge, Security Alarm, Split folding rear seat, Spoiler, Steering wheel mounted audio controls, Super Track Pak, Telescoping steering wheel, Tilt steering wheel, Wheels: 20" x 9.0" Forged/Painted Aluminum. Awards: * 2017 KBB.com 10 Most Comfortable Cars Under $30,000 Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Dodge Journey 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. HEATED SEATS, LEATHER SEATS, NAVIGATION, ONE OWNER, REAR BACKUP CAMERA, BACKUP SENSORS, Journey GT, 4D Sport Utility, 3.6L V6 24V VVT, 6-Speed Automatic, FWD, Pitch Black Clearcoat, Black/Red w/Leather Trimmed Seats w/Perforated Panels, 19" x 7" Painted Aluminum Wheels, 3rd row seats: bench, 5-Year SiriusXM Traffic Service, 5-Year SiriusXM Travel Link Service, Anti-whiplash front head restraints, ATC w/3-Zone Temperature Control, Auto/StickTM, Auto-dimming Rear-View mirror, Automatic temperature control, Dual Bright Exhaust Tips, Dual front side impact airbags, Front anti-roll bar, Front dual zone A/C, Front fog lights, Garmin Navigation System, Heated front seats, Heated steering wheel, High Performance Suspension, Humidity Sensor, Illuminated entry, Knee airbag, Navigation & Back-Up Camera Group, Navigation System, Overhead airbag, ParkSense Rear Park Assist System, ParkView Rear Back-Up Camera, Power driver seat, Quick Order Package 28P, Radio: Uconnect 3 Nav w/8.4" Display, Rear air conditioning, Rear Air Conditioning w/Heater, Rear anti-roll bar, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, SiriusXM Traffic, SiriusXM Travel Link, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel, Universal Garage Door Opener. Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Dodge Grand Caravan 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. Hands Free Bluetooth Capability, HEATED SEATS, LEATHER SEATS, NAVIGATION, REAR BACKUP CAMERA, Grand Caravan GT, 4D Passenger Van, 3.6L V6 24V VVT, 6-Speed Automatic, FWD, Black Onyx Crystal Pearlcoat, black Leather, 17" x 6.5" Aluminum Wheels, 2nd Row Stow'N Go Bucket Seats, 3rd row seats: split-bench, 9 Speakers, Anti-whiplash front head restraints, Automatic temperature control, Dual front side impact airbags, Electronic Stability Control, Front anti-roll bar, Front dual zone A/C, Front fog lights, Front wheel independent suspension, Fully automatic headlights, Garage door transmitter, Heated front seats, Heated steering wheel, Illuminated entry, Knee airbag, Leather Trimmed Bucket Seats, Navigation System, Navigation system: Garmin, Overhead airbag, Performance Suspension, Power driver seat, Power Liftgate, Power passenger seat, Radio: 430 Nav, Rear air conditioning, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel. Odometer is 11330 miles below market average! Awards: * JD Power Initial Quality Study (IQS) Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana.
Dodge Grand Caravan 3.6L V6 24V VVT Certified. CARFAX One-Owner. Clean CARFAX. Hands Free Bluetooth Capability, HEATED SEATS, LEATHER SEATS, NAVIGATION, ONE OWNER, REAR BACKUP CAMERA, Grand Caravan GT, 4D Passenger Van, 3.6L V6 24V VVT, 6-Speed Automatic, FWD, White Knuckle Clearcoat, Black w/Leather Trimmed Bucket Seats, 17" x 6.5" Aluminum Wheels, 2nd Row Stow'N Go Bucket Seats, 3rd row seats: split-bench, 9 Speakers, Anti-whiplash front head restraints, Automatic temperature control, Dual front side impact airbags, Electronic Stability Control, Front anti-roll bar, Front dual zone A/C, Front fog lights, Front wheel independent suspension, Garage door transmitter, Heated front seats, Heated steering wheel, Illuminated entry, Knee airbag, Navigation System, Navigation system: Garmin, Overhead airbag, Performance Suspension, Power driver seat, Power Liftgate, Power passenger seat, Radio: 430 Nav, Rear air conditioning, Rear window wiper, Reclining 3rd row seat, Remote keyless entry, Speed control, Split folding rear seat, Steering wheel mounted audio controls, Telescoping steering wheel, Tilt steering wheel. Odometer is 21817 miles below market average! Awards: * JD Power Initial Quality Study (IQS) Please CALL FOR AVAILABILITY as our inventory changes frequently (502)-855-5885. Serving Louisville Kentucky from our 4520 Shelbyville Road location as well as all surrounding areas including Lexington, Shelbyville, Elizabethtown, Clarksville Indiana and Jeffersonville Indiana. | 2019-04-20T19:22:33Z | https://www.oxmoorchrysler.com/used-vehicles/carfax-1-owner/ |
BlizzWarWorlds experienced many events in its long history. The, ages and eras would pass, and although BlizzWarWorlds eventually fell, it left a sound impact on those who were a part of it. The majority of BlizzWarWorlds was eventually lost, but fragments and lost artifacts of this bygone era survive to modern times. The history of BlizzWarWorlds is the greatest of the very few treasures that remain.
September 2003, The Founder Gandalf establishes the group soon to be known as BlizzWarWorlds. The early Republicans were afraid of a hierarchy and most specifically an autocrat who could arbitrarily make decisions and cast them aside. The early republic maintained a slow democracy to lead the group with Gandalf simply being the Guardian of the Republic.
Throughout this month BlizzWarWorlds tried to get use to its new surroundings and prepared to make maps. This is the one month that BWW was naive, underdeveloped, as total democracy ruled during this short period, and failed. Like all democracies, the BWW members of the time voted on what kind of map they wanted to do, which ended up being the RPG. Most of those initial members left thereafter. Eventually BWW would decide to drop the RPG over a year and a half later since it was decided through democracy.
On September 4 2003, Gandalf proposed a mapmaking group for Warcraft. The group was immediately popular as a Great Discussion began to take place.
On September 21, The group became known as BlizzWarWorlds and was given their own forum. After a map was voted on by those first few members, discussion for the RPG ” The Orb of Oblivion” began. (This map would never be completed, and was eventually dropped during the Silver Age due to diminishing resources, with the official scapegoat that the map was sanctioned by the early Republic and not members of the Principate (The Court of BlizzWarWorlds).
On September 23, Gandalf made the Announcement Thread. This would later be foundation for the Ministry of BlizzWarWorlds.
On September 27, The Slogan for BlizzWarWorlds was “We put the Zug in Zug Zug”. This issue was controversial and would be of future debate later.
On September 30, The Greek Mythology Tower Defense ” Battle of Mount Olympus” was given the official “go”. This map would not start immediately and was meant to be secondary map.
One of the most pivotal events in BWW history was the rise of DarkTerror. As the new High Inquisitor of BlizzWarWorlds, DarkTerror’s early reign was meant to be a public office, one lower than the Founder of BlizzWarWorlds, Gandalf. In effect BWW was still legislated as a Republic, but the powers bestowed upon the Inquistor created a de facto monarchy which we can now be labeled “The Principate”. Many people feared that his new position would bring BlizzWarWorlds into an absolute monarchy. DarkTerror quickly quelled the thoughts of rebellion legitimizing his claim with unique ties to the Founder and the Republic. Although in principle the High Inquisitor office was meant to serve the young Founder. The Reign of Terror had begun and BlizzWarWorlds was never going to be the same.
The Golden Age of BlizzWarWorlds was throughout the time that DarkTerror ruled BWW. Characterized by the excitement and innate fragility of the group, a period of art, creation of the Court of BlizzWarWorlds, would set the standard of all BWW ages.
October was a month of great change with the emergence of the High Inquisitor and his shocking rise to power. His policies would someday become the heart and soul of BlizzWarWorlds. As BlizzWarWorlds became more of a united group, than a ragtag team. This month onwards would begin the reign of BWW’s aristocracy as the Ministry and the Line of Inquisitors. At the time though, the rise of DarkTerror and the Inquisition was feared, and many viewed it to be a dictatorship. BWW would later become a true full fledged aristocracy as new members would soon join the Ministry and the formation of the Noble Court. BWW’s tiered system and those who can date their membership to the group at its earliest periods became the unspoken rule in BWW.
Negotiations of an alliance between the democratic, powerful and prosperous Starcraft mapmaking group, BlizzScums led by BSTRhino and Doom Dragoon.
On October 7, An ambitious storyliner sent Gandalf a private message that would bring about some order in BlizzWarWorlds. This member was DarkTerror.
On October 13, DarkTerror became the High Inquisitor of Departments and the “Reign of Terror” begun as BlizzWarWorlds experienced huge change in the next few weeks. The High Inquisitor’s deadline thread came up and through it; it revealed the new system that BlizzWarWorlds was going towards the system of Hierarchy.
On October 20, Plans for the alliance between BlizzScums and BlizzWarWorlds surfaced.
On October 25, DarkTerror created the Inquisitorial Quiz to check up on status of how members were feeling. This quiz became a great symbol of the early days of DarkTerror and his reign.
On October 26, DarkTerror took control over the sign up thread.
November was a slow time period in terms of progress in maps. The fledged out authority of the Inquisitor, brought about the Ministry, the Senior UnderSecretary, and the Alliance with BlizzScums,and the Greek TD. BlizzScums and BlizzWarWorlds formally signed the alliance, however only a short time afterward, BSTRhino retired from leadership.
On November 3, the second map began constuction. The TD “Battle of MountOlympus”.
On November 6, Plans for another top level manager was in the making. The Senior UnderSecretary of Supervision.
On November 16, BlizzScums and BlizzWarWorlds signed the alliance.
On November 18, Plans for DarkTerror to become a moderator was brought up.
On November 24, A Major member of BlizzScums stepped down. The member was BSTRhino who was a major component in coming up with the alliance as well as assisting DarkTerror with many tasks.
On November 26, Zero (old friend of DarkTerror) became the Senior UnderSecretary of Supervision.
December is known to be a silent period in BWW. Nothing bad really happened but because of the forums being closed down, not much happened and a great deal of information was lost. The Age of DarkTerror began to strengthen as he became a mod, but the age of BSTRhino finally collapsed in full.BlizzScums felt a decline now that BSTRhino was banned out of BlizzForums.
On December 1, the Slogan was changed to “Breaking the Bonds of Reality”.
On December 3, DarkTerror became a full Moderator. And history began to be recorded.
On December 18, BlizzForums regained a position in reality but was in tact only in its December 7th state.
BSTRhino was eventually convicted in being a major factor that caused the black out of BlizzForums. BSTRhino lost his powers, titles, and respect he had built up in the the last 6 months in only 5 days. He was then banned from BlizzForums and the end of the Rhino Era ended with him.
On December 31, A look back at BlizzWarWorld’s first thread reveals that it was Mtankha who fathered the name. It also foretold of DarkTerror’s ideals of making a map group work. All of them came true.
Janury is another period of great change in authority. With the Senior UnderSecretary’s position, Custom Creation and the Ministry being reformed. It allowed 2 other founding members of BlizzWarWorlds to help the group become more organized. Departments such as Terrain and Triggers and the new Sub Department such as Object Editting had many ranking changes to make them all more efficient.With that in mind, BlizzWarWorlds seemed to be on the road to success. But at the end of the month, BlizzWarWorlds would experience one of its first great crisises.
On January 3 2004, The High Inquisitor unified the Departments of Custom Creation creating an all powerful Universal Custom Creation Department that would serve all current maps. ShadowHawk is given the title Top Officer of Custom Creation and is given membership to the Ministry.
On January 7th, the map Supremacy has recieved recognition of being a future map. The Senior UnderSecretary Zero grants his power to Mtankha the Second Senior UnderSecretary of BlizzWarWorlds. Mtankha becomes the second Senior UnderSecretary and recieves the membership from the Ministry that comes with it.
The Competition of the Universal Signature officially takes place between the House of Supervision and its greatest rival the Universal Department of Custom Creation. (Mtankha vs ShadowHawk).
The Powers of the Senior UnderSecretary in Zero’s time was by far much more powerful than when Mtankha took over. However, between the Founder, High Inquisitor, Senior UnderSecretary and Top Officer. They made up the well grounded Ministry.
On January 13, a debate between Departments 3 and 4 occurred over the tasks in Object Editting for spells and abilities. It was decided a Sub Department of Object Editting was to be created to serve both Departments. Sargeants became a new rank for future Sub Departments.
On January 16, BlizzWarWorlds annex thread goes up in the main mapmaking group with the expansion with DarkTerror’s modship into the regular WC map development forum.
On January 18, BlizzWarWorlds was thrown into a state of Chaos by an intrusion by a pair of violent flamers. BlizzWarWorlds was never braced for such an attack, and the Ministry was hit hard. Anarchy ensued as the powers of the entire Regime, (which include the Founder, High Inquisitor, the Senior UnderSecretary, and the Top Officer of Custom Creation as well as all DepartmentHeads), was fading and most noticebly as some of the greatest symbols of BWW began to fall.
On January 21, At the doorstep of total collapse of the Ministry and all that was within its care. The members of BlizzWarWorlds responded that the Ministry should forever hold strong and instead of reverting back to the political situation of October they should keep the “Ancient Regime”. For as long as the members believe in the system, the Ministry and everything beneath it will always be powerful. The Ministry was restored along with other important icons and placed back into the peaceful days prior to January 18.
On January 24, The introduction of FieldMasters and usefulness of the rank Sargeant became more evident in the Departments of Terrain and Triggers. The Deadlines thread is changed to the House of Inquisition Thread as well as the Announcement thread is changed to Ministry Announcements.
On January 29, Former SS Zero, and Current HI DarkTerror get into a terrible argument thus ending a year long relationship in mapmaking. (Finally in February 2010, the legacy successors to DarkTerror would reconcile with those of Zero).
February was a relative quiet month for BlizzWarWorlds. Many foreign affairs took place in BlizzScums with the huge revolution that took place.The Emergence of WB also became a new founding platform for another mapmaking group for Starcraft. It would soon be known as Starchitects and founded by BSTRhino and Doom Dragoon. The system of Starchitects was planned to be very loose compared to BlizzScums and most definitely BlizzWarWorlds.
On February 7th, The Universal Signature Contest finally came to an end. ShadowHawk won the contest and his signature became Official.
On February 8th, Several mods and admins left BF to help found WB. Rhino has long been part of the Org Network which was associated with WB. DoomDragoon has decided to leave BlizzScums and help Rhino found something new at WB.
On February 17th, DarkTerror Day was celebrated. This was the High Inquisitor’s birthday, and thus he made it a “half holiday”.
BlizzScums goes under a new leader called Drakain Zeil, and a whole new regime to lead BS.
On February 22nd, BlizzWarWorlds celebrated their Bi-Annual anniversary since the founding of the group.
March was still another quiet month but was reaching prosperity again. Although Tassadar (FieldMaster of Terrain at the time) had to go on hiatus. Tassadar was able to finish the terrain for the TD. So progress was not slowed. The fourth map called Fire and Water was given the go to begin construction. The starting of Fire and Water finally epitomized that High Inquisitor DarkTerror was the unquestioned authority of BlizzWarWorlds. All remnants of a fragile, separated,and rebellious group were no more. BlizzWarWorlds began entering the peak of its Golden Age.
On March 8th, BlizzWarWorlds decides to begin construction of yet another map. The fabled map of Fire and Ice, that was the legendary goal of High Inquisitor DarkTerror and current FieldMaster Tassadar.
On March 18th, Mtankha asks DarkTerror how he knew about the Earthquake that happened in India. Did DarkTerror foresee the earthquake? The events of these 2 days were put into a comic which can be viewed in the Art Gallery.
On March 25th, BlizzWarWorlds celebrated the Black Jubillee of the half year reign of DarkTerror. A new version of the Inquisitorial Pop Quiz was given out so everyone could do.
The month of April was a very good time for BlizzWarWorlds for it centers the apex time of the Golden Age. There were many great developments as Custom Creation became the powerhouse it was meant to be, the Creation of the Noble Court of BlizzWarWorlds which would push BWW into a full aristocracy, and the construction of the website. The many fantastic pieces of art let BlizzWarWorlds have cultural advancement that made the group more unique and special. BlizzWarWorlds watched its counterpart BlizzScums and the predicaments they were in. In the early months of BlizzWarWorlds, BlizzScums was in a fantastic period. While BlizzWarWorlds struggled. The situations greatly changed a few months afterwards.
On April 4th, High Inquisitor DarkTerror gives BlizzScums their anniversary gift depicting their current declining situation and the power BlizzWarWorlds that has built up over the months.
On April 6th, The Pledge Policy of BlizzWarWorlds is set into place. The Recruitment Sign up Lobby also states the essential information for members who want BlizzWarWorlds to make their map, and if they get to govern its construction.
On April 7th, All Assistants of Cusotm Creation were promoted to Sargeants for their all their hard work And thus strengthening the power of this Department furthur.
On April 11th, the Art Gallery in the deadlines thread came into existance. Serious talk amongst the Ministry regarding a future site for BlizzWarWorlds also became a main focus as preparation for the first map was coming soon. The initial choice as WebLord was DarkTemplar.
On April 15th, the Court of BlizzWarWorlds is established. The Court is a second base level of authority in BlizzWarWorlds. FieldMasters and Department Heads are invited to join the Court, as well some members can be appointed to the Court for their special services.
In the following days the following Courtiers of BlizzWarWorlds were intiated. They were the first Courtiers to be fully initiated.
On April 17th, the Colorful Ranking Table illustrates the ranks of BlizzWarWorlds. Made by the Court Artist Slothien.
On April 21st, Serious discussions with the WebMaster Neo of BlizzScums to help create the site of BlizzWarWorlds. The next few days many discussions were held on what to do for the site. The BlizzWarWorlds site had however, a promising future.
On April 22nd, The Coat of Arms of BlizzWarWorlds was finished creation. It would known as the symbol of the Ministry and everything under its domain.
On April 29th, Mtankha released “Mtank’s Revenge”. Mtank’s Revenge was a short but hilarious cinematic of BlizzWarWorlds. Starring Mtankha, and his antics as he explores the land of BlizzWarWorlds. Mtank’s Revenge began an interesting trend that would be continued later on, as well it promoted a possible future map. The BlizzWarWorld Hero Arena.
On April 30th, Sargeant Nuker created fantastic badges for all BlizzWarWorlds members to wear. The badges were extremely useful, as well their size was perfect. The badges in effect replaced the old purpose of the Universal Signatures (which none were ever made). Thus the badge became yet another symbol of the growing fellowship within BlizzWarWorlds.
The month of May carried on the great prosperity that April enjoyed, although to a lesser extent. This month is known as the time when the BlizzWarWorlds website went up, as well the month that Tassadar came back to rejuvenate his Department of Terrain. Object Editting finally took on most of its indepedence as Nuker was appointed FieldMaster of that Department. The relationship between BlizzScums and BlizzWarWorlds strengthed under new Co-Leader Oaf of BlizzScums.BlizzWarWorlds continued to prepare itself for the completion of their first map, but at a much slower rate than in April.
On May 2nd, It became known that both Neo and DarkTemplar were WebLords to BlizzWarWorlds. Both were attempting to achieve the same goal in creating the best possible BlizzWarWorld website. And both had incredible amounts of talent and resources to accomplish this task. The Ministry and Court of BlizzWarWorlds was ready to support either side. And soon one of the 2 WebLords would become more dominant than the other.
On May 9th, Object Editting finally becomes its own Department. Thus officially having 6 Departments within BlizzWarWorlds. Object Editting would continue to be below the Top Officer of Custom Creation. However only as a mere figurehead since the new FieldMaster of Object Editting would have full control of the Department. The new FieldMaster of OE is Nuker, a very capable and long time member of BlizzWarWorlds.
This day was also very important since it was the first day that the BlizzWarWorlds site officially went up at www.blizzwarworlds.com. It was DarkTemplar’s layout that was used, as Neo fell in love with DarkTemplar’s layout However, it was Neo’s help that gave BlizzWarWorlds a .com address and a stable host.
On May 18th, FieldMaster Tassadar returns and reclaims his place amongst BlizzWarWorlds. As the single most powerful entity beneath Members of the Ministry.
On May 21st, a curious member of BS named Oaf rose up to the rank of Co-Leader of BlizzScums. Oaf implemented many BlizzWarWorld policies into BlizzScums and thus started to change the way of BlizzScums for the better. At last, the BlizzWarWorld system proved its dominance over the former BlizzScum system as BlizzScums became more and more BlizzWardian.
On May 26, the past few days the forums were blacked out. But on this day the forums came back on and thus more of the story of the curious BS member continued the next few days. Oaf agreed to the age old alliance with BlizzWarWorlds and began to embrace BlizzWarWorlds as a friend and ally in the forums. BlizzWarWorlds thus was held in higher regard as more and more BlizzWardian ideas came into BlizzScums. When the old alliance was made, BlizzWarWorlds would be the subordinate group to BlizzScums. At last BlizzWarWorlds finally asserted them into the capital position of the partnership. Oaf would always be known as a hero in BlizzWarWorlds (Like Gorbachev) for his acceptance of highly superior concepts that all others of his station and higher shunned. Renewal of the alliance made way for a future positive relationship between the 2 groups, a relationship that was very one sided for an age.
June was a slow month as everyone finished up their school year. The Golden Age is now in its twilight months.
On June 3, FieldMaster Nuker of Object Editting becomes a moderator of the Warcraft III Mods and Map developement Forums. Nuker would change his name to Heptameron and have a “semi new” outlook on the forum. BlizzWarWorlds dominance over the main map making forum solidified.
On June 17, The Ministry releases “The Return of Terror” the sequel to Mtankha’s Revenge.
On June 21, The Creator of the BlizzWarWorld website layout called DarkTemplar left BlizzWarWorlds.
The month of July was supposed to be a productive month but it wasn’t. DarkSoul became the full leader of BlizzScums at the time and so relations did improve between the 2 declining groups.
On July 20, Ambassador DarkSoul of BlizzScums becomes the Grand Ambassador as he ascends to the leadership of BlizzScums. DarkSoul became the leader of BS by winning the leadership election against Oaf. Oaf shortly left BS forever. Surely ties would finally be strengthened between the 2 groups at last.
On July 25, Grand Ambassador DarkSoul becomes a full moderator.
On July 29, Tassadar steps down FieldMaster of Terrain and he is suceeded by ArticFox. Tassadar becomes a mere Sargeant of Custom Creation.
On July 31, Oaf resigns as Co-Leader of BlizzScums.
The month of August went by quickly and quietly. No major event occured. This proved to be an all time low in the “Classical Age” of BlizzWarWorlds. Mean mouths began to question the leadership of the High Inquisitor, DarkTerror, whose personal decline had become most evident and the state BlizzWarWorlds was no longer reputable.
The month of September went by smoothy and sadly. The governing High Inquisitor (DarkTerror) announced his retirement the following month. Thus ending his reign of 1 year. BlizzWarWorlds was stirred by the loss of its first High Inquisitor, as well as Top Officer ShadowHawk who also decided to retire. Advances in the Greek TD were made as FieldMaster Heptameron geared his department of Object Editting to finish its last pieces of work. The only thing left to do was balance the map fairly, and was being done so by FieldMaster of Triggers, Gandalf. Unfortunately DarkTerror never had a map released during his reign, but he endured the hardships that his sucessor would enjoy the work and time he put into BlizzWarWorlds.
On September 6th, it became evident that DarkTerror’s Age of Gold-Iron was melting away and soon it will be over. In his thread, he made it known who the heir apparent was, the Senior UnderSecretary Mtankha. Mtankha would inherit all of DarkTerror’s resources on October 5th, the same day the year before that DarkTerror came to power. When Mtankha would become the High Inquisitor,DarkTerror would be no more.
DarkTerror had many secret projects that were not known to many until this date. Such as the Seal of Inquisitors, the epitome of all of DarkTerror’s strength. It was drawn by Court Artist Slothien and they began working on it together 2 months before.
Another such project was BlizzWarWorlds FAQ, it was created by the Founder Gandalf and the Court Artist Slothien who began working on it nearly 4 months ago. This enchanted book was going to be something special in its future.
DarkTerror had one last major surprise up his sleeve, but only time would tell if it came to fruition. All of these projects were supervised and concocted by DarkTerror, but only became reality when he used the wealth of BlizzWarWorlds. Wealth that Mtankha will be able to use at his whim.
Also on this day Top Officer ShadowHawk of Custom Creation steps down from his post, leaving his position in the hands of many respectable members in his Department that will someday soon choose a new Top Officer.
On September 9th, BlizzWarWorlds had its first anniversary. On the Anniversary thread, DarkTerror individually said goodbye to those whom he met throughout the course of the year that helped make up his reign. There was also the thread The End of the Age of Gold Iron which outlines all that DarkTerror was going to bequeath upon Mtankha.
On September 11th, Court Artist Slothien is promoted to the position of Top Officer of Custom Creation.
On September 17th, the old Custom Creation thread is taken down, and is replaced by a new one under the leadership of Slothien483. Slothien also became the first Ministry Member that was not part of the initial founding of BlizzWarWorlds, however he did hold the reputation of being a member of the “Classical Court” of BlizzWarworlds.
Slothien was most favored by the old and ailing High Inquisitor, however it was not he who gave him the title of Top Officer of Custom Creation. When Former Top Officer ShadowHawk retired, he left the decision between the future Inquisitor, Mtankha, and the lowly Court Artist Slothien who was also a Sargeant of CC. It was agreed between both of them, that ShadowHawks position would be entrusted to Slothien, who would arguably someday become the second most powerful member in BWW.
On September 18th, a feud between BlizzScum leader DarkSoul and the current High Inquisitor, DarkTerror, errupted. The feud had several layers to it, both personal feelings about each other, the covetted WoW beta whom both lay claim to , and the hostile relationship between BlizzScums and BlizzWarWorlds.
On September 30th, DarkTerror posted a last Inquisitorial Pop Quiz to see where BlizzWarWorlds stood at this point, compared to how it was one year ago. BlizzWarWorlds greatly changed in positive ways and so DarkTerror knew he did what he was able to do.
October was the last days of an Era, and the beginning of another.
On October 5th, DarkTerror retired as High Inquisitor thus ending the Reign of Terror forever. Mtankha now rose as the High Inquisitor ready to lead BlizzWarWorlds in ways never thought up yet. Thus begins the Age of True Silver.
To remember the Age of Gold-Iron, the BlizzWarWorlds Hero Arena began discussion in full force once again.
September 2004, the death of DarkTerror along with the end of Top Officer Shadow Hawk creates a power vacuum for the extraordinary powers of the Inquisitor once maintained by DarkTerror. Senior UnderSecretary Mtankha seizes the High Inquisitor office and promotes Heptameron as the new Arch Field Master of BlizzWarWorlds. The remainder of DarkTerror’s Estate falls into the command of Lord Viscount. These key events shape the most dynamic age BWW had yet to see.
March 2005, the Court of BlizzWarWorlds triumphs over Xiash, the most hated enemy of BlizzWarWorlds. As well it sparks the ascension of the new Sargeant Major, Chad, as one of the potential Heir of Inquisitors.
June 2005, Chad is crowned as the Senior Lieutenant via the resurrection of DarkTerror. The end of Mtankha would lead to the succession of the third High Inquisitor. A dark omen precedes Chad, that he would be the last of the true great leaders of BlizzWarWorlds. June was an interesting month in that it was technically an “artificial extension” of the original Golden Age.
August 2005, civil war begins over the Inquisitorial succession between rival factions of Mtankha’s House of Inquisition versus Lord Viscount’s Estate of DarkTerror. BlizzWarWorlds splits into 2 halves. And Mtankha is forced to abdicate.
The Month of October begins the Second Age, with dramatic changes in the Ministry and the Court of BlizzWarWorlds. BlizzWarWorlds accommodates the changes under its new High Inquisitor.
On the 5th of October, the Fall of DarkTerror and the Golden Age beckons the second Age. The Age of Silver commences with Mtankha as the new High Inquisitor. The House of Supervision is then upgraded into the powers of the Inquisition.The Elder House of Inquisition becomes the Estate of DarkTerror and undergoes new management of Lord Viscount, Castellan of the Estate. The Estate of DarkTerror would forever be one the last vestiges of classical BlizzWarWorlds prominence in the group.
On the 11th of November the Alliance between BlizzScums and BlizzWarWorlds ended. DarkSoul the leader of BlizzScums, felt an alliance was no longer feasible between the 2 groups, and so the alliance that was said never to fail, was broken. DarkSoul fell from Court that day.
On the 25th of November, a newbish member known as Xiash questions the BWW system after recently joining. Xiash proposes a new and improved system and the Ministry gives him a chance to prove his theories. If Xiash were to succeed, Xiash could have very well became one of the most powerful members of BlizzWarWorlds. But it was never meant to be.
On the 30th of November, the power of the Department Custom Creation considerably decreases. Top Officer Slothien loses his Ministry seat, but remains in the Court. The Ministry now focuses upon the new great department, Object Editing and it’s FieldMaster Heptameron.
December goes on with Christmas Festivities. Xiash fails to do any such progress with his “new and improved system”. Xiash then begins making ridiculous comics for BWW oddly enough. None of these comics were worthwhile to save and has been lost to time.
2. many people do not like those heros.
3. the game time fr this will be far too longfor anybody to hold together.
6. this map has done nothing so far except give me a bad rep, made two members decide to almost leave us forever and wasted a lot of time.
7. this map is not what BWW is about.
8. i will not do this map.
10. either i make a new map or its all over for this.
11. i am working on 3 new maps that are of good quality.
12. many maps sound like good ideas but turn out not to be.
13. nobody is at fault.
Still trying to get over Xiash’s bizarre antics… BlizzWarWorlds opens up the Beta Board.
On the 20th of January 2005, BlizzWarWorlds increases its border by opening up the Beta Board in anticipation of their first map.
Powerful forces in BlizzWarWorlds begin to clash as civil differences erupt behind the forums in the month of February.
On the 17th of February, A Secret war erupts between the FieldMaster of Object Editing and the Lord Castellan of the Estate of DarkTerror, over the controversial celebration of the First High Inquisitor’s birthday.
On the 21th of February, FieldMaster Heptameron of Object Editing leaves BlizzWarWorlds temporarily, thus halting Object Editings’ progress. Some wondered why.
In the month of March BlizzWarWorlds begins to enter the Silver Age’s Apex period, where the Beta Board was new, and a new map came out. Some individuals began to join the forums just to post and praise BlizzWarWorlds first map, the The Battle of Mount of Olympus Tower Defense. Unfortunately… this good time was tarnished by the start of a very unfortunate and soon to be devastating event. For within the apex of the Silver Age, comes one of the greatest crisis of all BlizzWarWorlds history.
On March 9th, BlizzWarWorlds releases its first map. The Battle of Mount Olympus Tower Defense in its beta form. Lord Viscount begins construction of the new Silver Age Crest of BlizzWarWorlds.
On March 11th, Xiash is questioned about his usefulness and helpfulness in BlizzWarWorlds. Xiash was now long known to be spammy, annoying, downright useless at this point. But what made situations worse was that Xiash now had the gall to talk back to question the authorities of some members of the Noble Court. Saying they were worthless and powerless.
On March 12th, the Founder Gandalf puts Xiash on trial. Xiash is to now attempt to complete the Hero Arena’s Object Editing within 40 days. Xiash often bragged about his “amazingly uber” map making skills, and that complained he had nothing to do. He was now put to the test.
On March 18th, former BS member, Geno tries to join BlizzWarWorlds by presenting himself to the Noble Court. At the time Geno did not have Warcraft III at all, and so that is what made the situation rather delicate. But Geno was known to have helped BlizzWarWorlds abroad in BlizzScums, and was once extremely loyal to the First High Inquisitor..
On March 19th, The administration of BlizzForums makes a great announcement to all of the Warcraft forums, and Starcraft map making forums about the completion and success of BlizzWarWorlds first map.
On March 21st, the Court accepts Geno into BlizzWarWorlds. Geno then reveals that he had recently acquired Warcraft III and was busy learning how to map make.
On March 25th,Gandalf at long last obtains MSN thus uniting the Court through a universal messenger.
On March 26th.. Viscount works on a piece called the “Damnation of Xiash”. A versed and fictional story about Xiash viewed in a better light. Although few knew this, the story would explain the events to happen soon, in a profound way.
All of BlizzWarWorlds tried to resist Xiash’s taunts, but it would never solve the problem.
Lord Viscount, nearly defeated, falls back into his comforting shadows and decides to pull strings in the darkness….. Unfortunately his dark art only provided a source of information for what would truly turn the tide.
The pivotal point during the siege was when ArchFieldMaster Heptameron returned, as Heptameron picked up where Viscount left off, defending BlizzWarWorlds in all areas against Xiash. The Noble Court was now fully restored, and led by the ArchFieldMaster, the Court finally was beginning to see the end of the Xiash problem. Aided by the Estate’s dubious insight and abilities, Heptameron was able to suppress Xiash so he would never have enough strength to threaten BlizzWarWorlds he once did.
On April 1st, “Leader for Life but I won’t do any work” Aya sells out BizzScums, by firing all BS members to once again merge with BlizzWarWorlds.
On April 2nd Yesterday was an April’s Fool’s joke.
Also on this day, Xiash, a minor Sargeant of Object Editing, who was known to have done nothing but have a big mouth, is deposed from BWW. Thus begins the travesty of the true and non-fiction “Damnation of Xiash”.
Like DarkTerror’s great tragedy in his time…. BlizzWarWorlds security and majesty, is shaken. The battle begins, as major courtiers and prestigious members alike realize that the problem will not go away by itself passively.
The battle ranged on for weeks afterward, as Xiash threatened BlizzWarWorlds with hacks, flames and spam. He began menacing major authority figures, saying they were abusing and belittling the other members. Old and powerful names like the former Senior UnderSecretary Zero were also brought up. Some believe that Zero came back to destroy BWW.
BWW was now in a confused state, as stickies mysteriously disappeared and reappeared, all the while as Xiash tries to destroy BWW’s morale. BWW did it’s best to function normally throughout all this.
On April 5th, Viscount shows the cryptic work called “The Damnation of Xiash” publicly. Only the most astute and clever individuals would realize that the story actually gave insight into BlizzWarWorlds. Some would realize what had happened in February and Heptameron, as well explain what was happening at the time. Sometimes it’s best to read the beginning, end, and then the middle of stories.
On April 8th, Xiash is officially given the well deserved title of… the Court Jester of BlizzWarWorlds. Little Xiash ever said was factual, and could be shown as true.
On April 15th, FieldMaster Heptameron returns to BlizzWarWorlds and then aids the Court in solving the Xiash problem.
On April 16th, Chad follows suit with Xiash and also leaves BlizzWarWorlds in a huff. Chad did a great deal of a work for the map Supremacy, and so his loss was a great one. Heptameron also decides to bring back the old BWW badges to help keep the group together.
On April 22th, Xiash is secretly defeated.
On April 24th, Chad is reinstated back into BWW with a full pardon from the Noble Court and is granted the title from the High Inquisitor, Sargeant Major of Object Editing for all of the work Chad did on Supremacy (He did all of it) and his great loyalty to the group. This would then make Chad virtually FieldMaster Heptameron’s second in command.
Although Chad’s shocking return was mostly left unanswered, most guessed Chad was a part of Lord Viscount’s dark agenda in getting rid of the Court Jester. In any case, Chad was not a traitor after all. Also on this day it was publicly announced that Xiash was defeated.
On April 29th, High Inquisitor Mtankha officially drops the RPG from BlizzWarWorlds agenda. The RPG was decided through democracy that fell a long time ago. And since the Ministry and all the powers that be, did not sanction the RPG, the Ministry had no obligation to finish the RPG. The Ministry still never had to drop a map that it wanted to create from the start.
The month of May shows the reemergence of BlizzScums. BlizzScums holds an election that brings out their 6th major leader named Kryok. What few expected was that Kryok sincerely wished for better relations with BWW. Unfortunately the Court of BWW was apathetic of the idea, and there were many concerns about the conflict between both group’s great hatred towards each other.
Also during this month were a few major events that helped polish BWW. This included the Silver Age Crest, the Arch Field Master title, and the prophecy of the Heir of Inquisitors.
On May 4th, New Leadership elections in BlizzScums are dicussed again. BlizzScums becomes surprisingly active in a very short period of time.
On May 17, Lord Viscount of the Estate of DarkTerror unveils the Silver Age of Crest of BWW.
On May 18th, High Inquisitor Mtankha brings out the Inquisitorial Quiz. This was the 4th time the quiz was used in BWW history.
On May 24, Heptameron receives an official promotion of ArchFieldMaster of Object Editing, as Object Editing goes into the spotlight as the jeweled department. Heptameron is now officially known to be one of BlizzWarWorlds greatest members, similar to the late Top Officer ShadowHawk and his former jeweled Department of Custom Creation.
With a powerful ArchFieldMaster, and a Sargeant Major leading the Universal Department of Object Editing, OE now stands greater than CC ever was.
Later in the day…. BlizzWarWorlds miraculously became even more powerful. The new Arch FieldMaster Heptameron was given a senior modship over all the forums. The Founder Gandalf was given a modship at long last. Geno was also given a modship. That would class 3/4 major members of Court having a modship. As well 5/9 members in BWW having a modship in general.
On May 25th, 2005, the Court of BWW assembles to discuss the future of BlizzWarWorlds. The Founder Gandalf initiates Court as the Arch Field Master Heptameron states his concern of the day. High Inquisitor Mtankha remains silent until Heptameron is done speaking and brings up a valid point of what to do. One of the main issues on this day is who will be the Heir of DarkTerror who would continue the line of Inquisitors. He would be the one candidate who could potentially succeed all four of the powerful courtiers when their power would run out.
The Court concludes as the one is decided, but given the condition that he would have to prove himself in time. The Lord Viscount, has faith in the candidate and speaks the prophecy that would spell the name of the one being that would succeed them all accordingly…and rule over the House of Supervision….
The first is fourth to Viscount.
The second is first to Heptameron.
A Sargeant Major will never rule BlizzWarWorlds.
On May 28th, Kryok becomes the new leader of BlizzScums.
On May 29th, under Kryok’s command. BlizzScums asks BlizzWarWorlds to reinstate their age old alliance. The notion of an alliance fizzled out days afterward, however Kryok, unlike other BS leaders, seemed to be very honest in that he wanted the two groups to be on better terms.
The month of June went by lazily. Instead most members of BWW began playing a game called “OGame”, a strategic slow paced game set in space. DarkTerror is resurrected and promotes Chad to Senior Lieutenant.
On June 2nd, BlizzScums opens up their Beta Board similiar to BlizzWarWorlds.
One June 15th, OGame is introduced to BlizzWarWorlds. Eventually all members start playing it.
June was a rather dynamic month as many members of Court began to take absence. The greatest one of note was High Inquisitor Mtankha, who simply needed a break from the drains of the eclipsing leadership. As other great leaders such as the Founder Gandalf and Arch Field Master Heptameron also began to take extended absences. BlizzWarWorlds was slowly beginning to meander to nothing.
What no one forsaw was the resurrection of DarkTerror, who quickly set BlizzWarWorlds back into motion. DarkTerror hand picked his chosen heir….. the new Senior Lieutenant Chad of the House of Object Editing. DarkTerror knew that by hybridizing the potency of the jewelled department and the blood of Inquisitors, he would bring forth a position of unpredecented influence and ability. The Line of Inquisitors was strengthened and BlizzWarWorlds future better insured.
Although DarkTerror quickly faded thereafter, the old House of Supervision map “Supremacy” was decided to be dramatically revamped into “Heaven and Hell”. The Heir of Inquisitors also took direct control of the maps Fire and Water and the Golden Age Hero Arena, thus making him a much more promising sucessor to DarkTerror.
During the dates July 2nd to 6th. The Founder Gandalf leaves BWW temporarily along with Arch Field Master Heptameron. Shockingly, High Inquisitor Mtankha also goes on hiatus from his normal duties.
of decline. Mtankha gave the Inquisitorial powers back to the Estate.
The dead corpse of High Inquisitor DarkTerror was revitalized.
DarkTerror had returned for a short time, which is referred to as the Extension of the Golden Age.
On July 7th, DarkTerror promoted Sargeant Major Chad of Object Editing to the Senior Lieutenant of the House of Object Editing. Chad’s powers greatly increased as both the jeweled department and the power of the Inquisitors were tied to his being. DarkTerror resurrection fulfilled the prophecy.
This new formation of power created the House of Object Editing, which dually ruled over the Universal Department of Object Editing and what was known as the “The House of Supervision”.
Chad’s enthronement would change the leadership of BWW dramatically. Like his eldest predecessor, Chad was a firm leader who was going to bring glory to BWW once again, and therefore was also known as “DarkTerror’s Pride”..
The Elder Inquisitor and the new “Heir of Inquisitors” were now about to take control over BWW once again.
On July 8th, the Supremacy beta is made public.
On July 20th, Mtankha returns and casts down DarkTerror back to the bowels of hell thus ending his reign for the second time.
On July 23rd, Senior Lieutenant Chad announces that Supremacy will have a major uplift. The map will soon have 2 races with one being angels and the other demons. The map is now known as “Heaven and Hell: The Supremacy”.
On July 24th, The Estate releases the cinematic “Rise of Nuker” for the very first time. RoN was shelved nearly a year ago since it was partly uncompleted. But it was eventually decided to show everyone the third cinematic of BWW anyways.
The months of August and September were dark months for BlizzWarWorlds as opinions clashed between the prominent High Inquisitor Mtankha, and the Ancient Lord Viscount.
On August 8th, OGame reaches higher recognition in BlizzWarWorlds since it was made known that all members played it. BlizzWarWorlds officially makes its own alliance in Universe 4 known as “The Order of Eternity” with the impressive Lord Viscount as its leader. This was OG’s highest level popularity in BWW.
On August 19th tensions strain the relationship between the House of Inquisition and the Estate of DarkTerror. This would be the beginning of the end for the Silver Age. And the pivotal point between the breaking of an old friendship.
On August 20th, Senior Lieutenant Chad goes on an extended holiday. His absence would make the oncoming conflict worse.
On August 28tth, Viscount retires from OG at rank 33 in the universe. OG slowly loses its popularity. The Founder Gandalf starts another Ministry thread in a small effort in trying to solve the approaching dilemma.
On August 31st, Court Scribe Geno posts up “Time for the Silent to Speak”, a thread criticizing the current leadership. The conflict begins as the Estate of DarkTerror and the House of Inquisition begin to argue over the running of BWW. High Inquisitor Mtankha and Lord Viscount, 2 of the most foremost members were at war over the leadership of BWW. According to the old rules of the Principate, the High Inquisitor position was a public office, which ended after a year’s term from the days of the Republic. Mtankha had finally let the power go to his head, and stewardship of the title was now a right, the façade of the Republic had turned into a “Dominate”.
This led to one of the biggest questions of controversy was who controlled the powers of the Inquisitor. Was it DarkTerror and the Estate he left behind? Or the current Inquisitor Mtankha? The Sucessor to all the Inquisitors was Chad, but was unfortunately absent. With the Founder not able to take effective action. This climaxed the “War of the Inquisitorial Sucession”.
On September 4th, BWW officially becomes a group for 2 years. Unfortunately it was not well celebrated in light of the ensuing power struggle between the Estate and Inquisition.
On September 7th, Chad returns and tries to correct the situation to no avail. The conflict hardens, as BWW becomes silent.
On September 9th, Chad releases Part I of End of Shadows. The story detailing the end of the Golden Age, and the start of Silver. This is ironic in the fact that the Silver Age was ending.
For remainder of September, there was silence.
October brings the end of the Silver Age, and the beginning of the last great age of BlizzWarWorlds. The Age of Bronze Steel.
Mtankha steps down as Inquisitor, as the Founder Gandalf now promotes the once minor member Chad, to the one of the most exalted positions of BlizzWarWorlds. However by the time of Bronze, BlizzWarWorlds was now sinking downward in a spiral. The great friendship between Viscount and Mtankha was most important to the survival of BlizzWarWorlds. With the friendship severed, BWW was now split between Mtankha’s old Silver faction and Viscount’s Gold faction. BlizzWarWorlds was now on a race to finish their goals set out two years before, and finish them once and for all.
Never again will it be the same in BlizzWarWorlds. The end of the empire is near.
October 2006, BlizzWarWorlds is forever broken by the preceding power struggle which saw the fall of two of BlizzWarWorlds most political pillars. The division within the Court of BlizzWarWorlds, with the end of former Inquisitor Mtankha and the disappearance Arch Field Master Heptameron leaves “Western” BlizzWarWorlds into ruins. Mtankha’s Silver faction grumbles at their loss of power.
However, to the East a beacon of light shines brighter than ever piercing the darkness where the last Inquisitor lives on. Led by the new High Inquisitor Chad with the support of the Founder Gandalf and the remainder of DarkTerror’s Estate, Chad centralized the remaining offices to govern the rest of BlizzWarWorlds to respond to the arising situations quickly. It was Chad’s ambitions to once again the revitalizing BlizzWarWorlds. Little did he know he was about to face the greatest crisis greater than all of the hardships of his predecessors combined.
High Inquisitor Chad rules over the House of Object Editing, the apparent assimilation of the former House of Inquisition, Supervision, the Department of Custom Creation and Object Editing. Effectively Chad had to take up all previous roles in the past. Valiant as Chad was to save BWW, the empire was doomed.
January 2006, the black plague suffocates BlizzWarWorlds into submission. Chad and the remaining vestiges of the glory of the empire fade from Bronze to Black.
By June 2006, the ancient regime that controlled BlizzWarWorlds for 3 ages finally fled into the darkness as all that was BlizzWarWorlds was lost to the destruction. The spirit of BlizzWarWorlds was lost to the Dark Ages.
From the complete capitulation of BlizzWarWorlds, many of its members scattered and communication was lost. Very few key individuals still kept in contact. But a pair safeguarded the heart of BlizzWarWorlds, one of whom was the diminished Senior Lieutenant Chad, who had since lost all the powers of the High Inquistor (The title would never be used ever again although Chad would retain his historic title Senior Lieutanant). The other was the Lord Viscount of the very diminished Estate of DarkTerror.
On December 5th, 2007, Chad decided that he would attempt to finish the legacy of BlizzWarWorlds and initiated a minor renaissance. Unfortunately the combined forces of Chad and Viscount would not be the acting catalyst to lead BlizzWarWorlds out of the dark ages. Unfortunately as valiant as the effort was, nothing would come of it.
Relations between the very few core surviving BWW members, Mtankha, Gandalf, Chad, and Viscount would grow distant. All of whom would have lost touch with each other.
While BlizzWarWorlds fell into the dark ages, the Lord Viscount of the Estate fled carrying the secrets of DarkTerror, and incidentally, the legacy of BWW. Founding a new order of Champions, to preserve and protect ancient knowledge, The Order would be the direct successor to the Estate of DarkTerror.
Led by a Grand Champion in 2008 ,this highly secretive sect, the last surviving fragment of BWW is the spiritual successor the Estate of DarkTerror and First House of Inquisition of BlizzWarWorlds. A mixture of complex systems, hidden areas, and front line defenses. BSGtips was a veritable fortress, practicing the dark , yet monetarily profitable ways behind closed doors. Unlike it’s previous incarnations, BSGTips is an actual business. Controlled absolutely by the Grand Champion and the Order of Champions.
In Nov 2008, Industry Champion Jarad begins the seed of what is called BSGTips….
By May 2010. The Grand Champion won the Crown of Glo-Bus which gave the unification of both spheres of influence.
Early 2011 Apprenticed, Grand Champion Raymond who would later make the video guide. War erupts with a new rival, BSG.org continues as BSGTips fights its first major battle. Allied with BSG Consultancy and gained Frederic, the Grand Champion of Europe as an ally who allowed the site to go into different languages.
In 2012 rival site, www.beatbsg.com is installed with a regent loyal to the Crown of BSGTips, and now acts as a subsidiary. Industry Champion Michael has joined the fold.
In early 2013, Adrian is hired to update the look of the site. Anthony, apprentice to the Champion, has now joined the order as the potential next Grand Champion. | 2019-04-20T14:20:03Z | https://bsgtips.com/bww/ |
Abstract: The texts that religious youth negotiate are often deeply embedded in their sociocultural practices, which can have profound influences on their religious literacy development, construction and manifestation of religious identities, and the development of their faith. Yet, although 85% of American youth claim a specific religious tradition, literacy research has not explored how these youth construct their views of sacred texts. In this two-year qualitative study of the literacy practices of nine Latter-day Saint youth, interviews and observations were used to explore what texts these youth considered sacred and how their views of these texts were informed by their religiocultural beliefs, values, and practices. Analyses indicate that views of sacred texts were informed by the regularity with which the youth engaged with these texts and their specific personal experiences with them. This work breaks new ground in the study of religion as social practice by exploring how religiocultural ways of doing and being influenced the development of young people’s construction of sacred texts. Implications for religious instruction are provided.
Given the importance of religion and religious texts as well as the sizable population of religious youth, attention to the place of religious texts in youths’ lives may be warranted. To date, however, precious little research has explored how religious youths’ views of sacred texts are formed by their religiocultural experiences. In the Church we often assume that youth consider certain texts sacred, such as scripture, but we have no empirical evidence about how they develop those views. This study attends to that gap by examining how Latter-day Saint youth develop their conceptions of scripture as sacred text.
To address this study’s purpose, I draw from relevant research to discuss (a) the importance of texts in youths’ experiences; (b) the critical place of religious literacies — including religious texts — in young peoples’ lives; (c) a sociocultural perspective of texts, and (d) my theorization of the sacred in relationship to the social and cultural practices of the participants of this study. The research methods section provides details on the site, participants, processes of data collection, and data analysis procedures. Following this, the findings identify the importance of scripture in Latter-day Saint youths’ lives and how the youth constructed their notions of sacred texts. I then provide implications of this work for religious instruction, and end with some concluding remarks about the importance of understanding youths’ constructions of sacred texts.
In this study, I approach texts as social and cultural constructs, which include closely connected views of what counts as texts and how texts are created. As social constructs, texts are tools created in social contexts and used for social purposes, such as developing and maintaining group connections, making sense of one’s environment, producing knowledge, [Page 42]and enacting one’s sense of self.10 Texts, from social and cultural perspectives, are created in specific contexts for specific purposes and must be agreed upon and negotiated by individuals familiar with and invested in those contexts. For example, within the Church the importance of the Book of Mormon as a sacred text has been socially constructed over time as prophets proclaim its value, as we read from it in church and at home, use it to solve problems, find peace, draw closer to God, and share these experiences with others. These and other experiences with the Book of Mormon influence how the Book of Mormon is understood as a specific kind of sacred text within the Church.
A social and cultural view of texts highlights the manner in which youth in this study constructed their views of what counts as sacred texts. Although they privileged print texts, they developed what counted as sacred, print texts in terms of their experiences with them and how they cohered with their religiocultural beliefs, histories, and practices. It is naive to assume that Latter-day Saint youth consider scripture sacred simply because it is important to the Church as a religious institution. This study interrogates this assumption, drawing upon the youths’ own experiences with scripture as set within their religiocultural contexts to explore how scripture became sacred for them. To help frame the exploration of these youths’ social and cultural construction of texts, the next section looks more closely at the literacy research that focuses on the place of texts in youths’ everyday lives.
Young peoples’ negotiation of texts can also shape their identities and give them the tools to navigate their social and cultural experiences16 as well as help them obtain and hold on to social power. Scholars have demonstrated how youth use and produce texts in their lives as a way of highlighting the value of these texts and the accompany literacy practices for specific groups of young people, such as adolescent girls,17 ethnic minorities,18 tech-savvy teens,19 and gang members or gang-affiliated [Page 45]youth.20 These studies demonstrate the ubiquity and power of texts in the lives of diverse groups of young people. But what about the place of sacred texts in the lives of religious youth?
A recent comparative study of Methodist and Latter-day Saint youths’ literacy practices found important differences in the ways in which these groups of youth read religious texts, as influenced by their social and cultural experiences, traditions, beliefs, and commitments.26 The religious literacies of the Methodist youths, for example, were informed by a culture of interpretation, which was characterized by active participation in the construction of meaning of scripture. These youth actively engaged in extended discussions about scripture with their peers and the adult leaders in their congregation. Their discussions focused on constructing possible meanings of scripture. The Latter-day Saint youths’ literacy practices were informed by a culture of listening that privileged limited and infrequent involvement during literacy events, such as reading and talking about scripture. The Latter-day Saint youth sought to find “right answers” in scripture, repeat what scripture said, read with the intention of believing what they read, and memorize scripture. As one of very few published studies of Latter-day Saint youths’ literacy practices, this research suggests that Latter-day Saint youths’ interaction with sacred text was primarily passive and limited.
A recent study seeks to extend this work by investigating how Latter day Saint youth read self-selected scripture passages.27 This research identified five ways that Latter-day Saint youth read scripture. One of the participants primarily summarized what he read by translating each phrase into a modern-day English equivalent. Another participant privileged fact-based comments as she read. A third made numerous connections between his prior knowledge and what he was reading, essentially focusing on the similarities between scripture and other things that he had read. Another youth’s reading of scripture was characterized by inferences or logical interpretations based on textual evidence and his own thinking. This young man was [Page 47]attempting to draw life lessons from his reading. The final participant engaged in a problem solving relationship with scripture by seeking to solve text based or personal problems as she read. This required her to construct on-going, conditional knowledge about what scripture might mean.
The existing literature on youths’ religious literacy practices suggests the importance of young people’s faiths and the work they do to make sense of their worlds. It also highlights the importance of religious texts in the lives of religious youth. But with the exception of the last two studies, we know very little about Latter-day Saint youths’ literacy practices and nothing about how they construct their views of sacred texts.
In his historic work with the Australian Arunta aborigines, Emile Durkheim did not equate the sacred with divinity as represented by gods or supernatural powers; rather, the sacred was sacred because it was set apart from the ordinary, what Durkheim called the profane.28 To understand what is sacred, then, is to understand what is profane, and vice versa. In The Idea of the Holy, Rudolf Otto used the Latin numinous to describe the power, presence, and majesty of the holy, or sacred.29 The numinous is not understood, nor can be understood, in terms of other experiences. It is truly “out of this world.” For Otto, experiencing the numinous produces feelings of profound unworthiness and a sense of the insignificance of everyday life. He called this the “feeling of absolute profaneness.”30 Mircea Eliade argued for the existence of sacred space, time, nature, and self.31 Using religious man and non-religious man to demonstrate how individuals might understand the sacred and profane, Eliade discussed such sacred spaces as home, temple, and cosmos, and the sacred time invoked during religious rituals.
For Eliade, Otto, and Durkheim, the sacred exists in opposition to the ordinary. Indeed, the sacred-profane polarity may be a common [Page 48]religious construct,32 yet what counts as sacred and profane can vary from one person and context to another. For some, the body, as a temple, is sacred. For others the body, as impure, is profane. For some, their responsibilities as spouses or parents are sacred as well as relationships with God and others, global issues such as climate change or food shortage, and even reading and writing.33 If the sacred is understood in opposition to the profane, then, as Durkheim states, “anything can be sacred” that is set apart from the ordinary.34 For this study, I conceptualize the sacred as that which stands in contrast to the profane. Because this may differ from one culture or individual to another, conceptions of the sacred come from the participants themselves; specifically, their conceptions of sacred texts, as influenced by their social and cultural values, experiences, and practices.
Together, these perspectives suggest that texts and the sociocultural construction of texts may be an important part of young peoples’ lives and that religious texts can have powerful influences on youths’ experiences in the world. Yet, the extant research has yet to address important questions about the intersection of youth, religion, and the construction of sacred texts. How, for example, do religious youth conceptualize sacred texts, and what influences do social and cultural experiences and commitments play in their conceptualizations of these texts? This study addresses these questions in the hope of opening a dialogue among religious educators about how youth construct their views of sacred texts, which might inform their literacy practices, including their use of scripture.
Nine Latter-day Saint youth participated in this study. I selected Latter day Saint participants because Mormonism has identifiable [Page 49]texts as part of their faith and because Latter-day Saint youth typically demonstrate moderate to high levels of religious involvement and use of texts;35 therefore, they met the key criteria of this study. Also, the limited research base on Latter-day Saint youth and their literacy practices, including how they construct their views of sacred texts, warrants additional attention.
Each participant was between 12–17 years old at the beginning of the two-year study, and all of them attended local public middle or high schools. Participants had been involved in the Church for their entire lives. During the study they regularly participated in worship services and youth-oriented activities throughout the week. All of the participants indicated that their faith was an important part of their lives and that it influenced much of what they did on any given day. A central part of their religious experiences was reading scripture. All of the participants stated that they had scripture in their homes and that it was an essential part of their lives.
This study was located in a mid-sized college town in the Midwestern United States. After receiving written informed consent from parents and religious leaders, I began observing and interacting with the youth at church and during their early morning seminary classes. In each site youth engaged with scripture in the company of their religious peers and under the direction of local religious leaders. Youth and adults interacted warmly in these environments, often talking casually before and after scheduled events. All of the youth indicated that they attended religious services voluntarily.
Data consisted of five interviews with each participant over a two-year period and one academic year of observations.
Semi-structured interviews. The questions in the five interviews developed over the course of the study and were informed by observations and conversations with the participants. The first interview gathered critical background information about the youth, such as their views of religion, their religious literacy practices, and the religious and academic activities in which they participated. The second interview explored participants’ motivations for academic and religious literacies. Throughout the interviews and observations, discourse appeared to play an important role in the youths’ experiences; therefore, the purpose of [Page 50]the third interview was to explore the role of discourse and participants’ views of what constituted the sacred in their experiences. The fourth interview focused on youths’ views of sacred texts and how they read them. In the final interview I explored participants’ views of non-religious texts, and as with the fourth interview, how youth actually read them. I made an audio recording of the interviews and transcribed them prior to analysis. Each interview lasted 45–60 minutes.
Observations. I observed the youth during their Sunday worship services, their early morning and Sunday evening classes, and church-related activities for an academic year. I used narrative description in the form of detailed field notes drawn from direct observations as the [Page 51]principle data of the observations. I took descriptive notes38 about what individuals did and said during the course of each class, meeting, or event. I made particular note of the talk, texts, and religious practices youth engaged in as part of their activities. I tried to document interactions verbatim, while also noting physical gestures, facial expressions, and to whom participants were speaking. Together, interviews and observations challenged emerging findings and helped develop a view of the youths’ notions of sacred texts and how they constructed them.
[Page 52]Closely analyzing the youths’ responses revealed that their views of scripture were often embedded within specific experiences, or stories, that helped to illustrate the value of scripture in their lives. Identification of these contextual stories and experiences was facilitated by utilizing the basic components of the “paradigm.”42 Corbin and Strauss explain the paradigm as an analytic strategy or tool for exploring the relationships between context, the conditions that influence the nature of situations, and process, the interactions that occur in response to situations.43 Specifically, the paradigm focuses attention on the sets of conditions that influence participants’ responses, the actions and emotions of the participants themselves, and the consequences of the participants’ responses to events or conditions. Using the paradigm as an analytic tool allowed me to draw out and more clearly explore the stories and experiences that the youth used to convey and contextualize their views of what made scripture sacred.
Writing relational statements about what I was observing helped me see how some of the concepts fit together, which provided clarification [Page 53]about the relationships among the data. Relational statements helped explain the what, why, where, and how of the data.
On the face of it, the data analysis process may appear to have progressed in a linear fashion; in practice, it was disjointed as subsequent analyses of the data influenced the development of existing codes and new data informed developing insights. Over time, the continual revisions of the constant comparison codes helped me identify themes that I believe explained Latter-day Saint youths’ views of sacred texts and how they constructed them, as influenced by their social and cultural experiences.
Because “thinking statistically about qualitative research”46 privileges one way of seeing how the world works without sufficient attention to the different foci and applications of different research paradigms, it may be theoretically and methodologically suspect. Judging one research method in terms of another can be like trying to fit a square peg into a round hole. For its part, qualitative research grows out of an interpretive tradition which focuses on understanding, or interpreting, actions in social contexts by attending to “how” and “why” questions rather than “how many” or “how much” questions.47 The goal of qualitative forms of research is to provide in-depth understanding of the meaning of human action through non-numeric forms of data such as interviews, observations, and the collection and analysis of relevant artifacts.48 Because qualitative forms of research are designed to produce hypotheses rather than test them, they do not demand large numbers of participants nor is there is an attempt to generalize findings beyond the target population of the study. Hypothesis-generating, qualitative research is particularly appropriate for gaining critical insights into important phenomena about which little is known, such as the manner in which youth develop their views of sacred texts.
As an exploratory qualitative study, this paper identifies and describes the processes by which nine Latter-day Saint youth constructed [Page 54]their views of scripture as sacred text through their social and cultural experiences in one Latter-day Saint community. It does not suggest that this is the only way for youth to understand scripture as sacred or even that this way represents the way other Latter-day Saint youth construct their views of scripture as sacred text. However, as one of the only empirical studies to examine this phenomenon, this study is significant because it opens up an important area in need of further research, refocuses attention on youths’ sociocultural relationship with scripture, and explores how youth can actually come to believe scripture is sacred to them. Moreover, this small-scale, qualitative study can spark conversation about the nature of LDS youths’ experiences with scripture, including how their religiocultural beliefs and practices can influence how they feel about scripture. Given the exploratory nature of the current study and the unique question that it addresses at the intersection of youth, scripture, and the sacred, this study is consistent with the focus and intent of exploratory qualitative research. Additional research may seek to verify or generalize this study’s findings, which may require a larger sample size, several research contexts, and a testable hypothesis.
Scripture was a foundational element in the youths’ lives. All of them stated that they read scripture every day and valued it as a critical part of their social and cultural religious literacy practices.49 The major assertion of this study is that Latter-day Saint youth constructed their views of sacred texts in terms of the regularity and importance of these texts in their lives. This section explores the nature of youths’ experiences with scripture and how these experiences informed their construction of it as sacred texts.
The youth in this study had grown up reading scripture. It was in their blood. Samantha said that she and her family have “always read scriptures.” Vincent stated that he had been reading scripture “as long as I can remember.” Paul said that he had been reading scripture, “probably, my whole life.” Stephen stated that scriptures were important to him because “I’ve been using them for — I guess ever since [I was] [Page 55]eight when I was baptized.” He added, “And [scripture] will probably be even more important next year because of seminary, and studying it even further.” Jonathan remembered his mother telling him that she used scripture to help him learn to read. For as long as these youth could remember, scripture was a regular part of their lives as Latter-day Saints. Scripture seemed to always be around them. During the interviews they talked about seeing scripture lying around their houses; hearing it read at home and church by peers, siblings, parents, and leaders; and reading it themselves individually and as families.
Timothy: [Scriptures] are a pretty big part of my life, mostly once again because I was raised in the Church, with the Church in my life.
Interviewer: Are there other books that are as or more important to you than the scriptures?
Timothy: I don’t know why any single book or even a series could be something as big as the scriptures in my life. Especially when … I was raised with the Church, with the Church in my life.
Interviewer: So you’re saying that the scriptures would be the most important books in your life. Did I hear that correctly?
Timothy: Didn’t we just go over the whole “raised with the Church”?
Timothy: It just kind of became a regular part of my life. And the other principles I was taught as a kid were kind of based with the Church.
In his response, Timothy stated five times that being raised in the Church or having the Church part of his life explained why scripture was so important to him. Yet he struggled to tease this apart. Even when pressed, Timothy explained that scripture was important because it had always been part of his experience as a Latter-day Saint. He could not even comprehend why, for him, “any single book or even a series [of books] could be something as big as the scriptures.” He did hesitate a moment, however, as he tried to explain this point but then returned to his “raised in the Church” response.
When I asked for clarification about why scripture was the most important set of texts for him, he raised his voice and with some frustration reminded me that we just covered that: “Didn’t we just go over the whole ‘raised in the Church’?” Careful attention to Timothy’s words suggests that although they may have sounded repetitive, he may have been making a larger point that became more salient through repeated analyses. Timothy’s words represent how being raised in the Church made scripture an important part of his life. That is, Timothy explained that as a result of being raised as a Latter-day Saint scripture became important to him because it “became a regular part of [his] life.” Scripture may not have started out as important to Timothy; in fact he said that it did not but over time and through repeated experiences with it, it had become sacred because it began to stand out from every other text in his life. Over time, the distance between sacred texts and profane texts may have become more apparent for Timothy.
It makes sense that Timothy’s experiences with scripture influenced how he viewed it because learning, from a sociocultural perspective, is a social process through which we make sense of the world around us, including what to value and why, as we interact with our environments.50 [Page 57]Christian writer and youth pastor, Kenda Creasy Dean, articulated the notion of learning as a sociocultural process for Latter-day Saints by arguing that “Mormons rigorously and unapologetically plunge teenagers into [their faith] and surround them with religiously articulate adults who demonstrate how to … enact a Mormon way of life.”51 And as most Mormons know, Mormonism is “a way of life.”52 For Timothy, his interactions with scripture at home and at church, and on his own and with family and friends over the course of his life, may have influenced how he felt about scripture as sacred texts.
Timothy did not learn about scripture or the value of scripture in a vacuum. He experienced day-by-day what it meant to his family and his faith to understand scripture as sacred. As demonstrated in his interview, Timothy struggled to articulate the details of how that happened. The best he could do was try to convey that there was something important about the relationship between being raised in the Church and scripture being a regular part of his life. From a sociocultural perspective, scripture as sacred text seemed to be part of Timothy’s religious wallpaper. Because it was all around him, he may have struggled to see how it became sacred to him because it may have happened slowly, seemingly naturally, and without his being aware of it as he grew up in the Church.
Observed these same individuals use scripture in their talks and lessons.
Samantha: We’ve always read scriptures as a family. And we used to just read them chapter by chapter, but now my parents have us ask gospel questions because when we read them chapter by chapter we weren’t really paying attention.
Interviewer: Now your parents have you ask gospel questions?
Interviewer: So, how does that work?
Samantha: Timothy made a box, so we write a gospel question down and then we draw a question out of the box each night [Page 59]and we talk about them and sometimes we look up scriptures for them.
Samantha stated that as a family they approached scripture study in different ways to try to keep everyone interested and attentive during this critical religiocultural practice. Although the question box may have been a novel approach to family scripture study, daily scripture reading was a common practice for Samantha, and Timothy, as well as the other Latter-day Saint youth in the study. It marked familial and individual adherence to an institutionally and personally important cultural experience. Because of the consistent social and institutional support of and attention to scripture study, being raised in the Church could make scripture a regular part of the youths’ lives; therefore, cultural beliefs, values, and practices could help explain these Latter-day Saint youths’ conception of sacred texts as those texts that they had grown up reading in the context of their religious traditions.
In addition to youths’ regular experiences with scripture at home, church, and seminary, they identified certain personally important experiences with scripture that helped them construct their views of it as sacred text. Their personal experiences with scripture served as evidence of the significant place scripture could have in their lives as they read it, thought about it, and tried to live what they were learning from it. Specifically, the youth said that they knew scripture was important to them because it made them feel good and helped them perform better in school.
[Page 60]I mean, I’ll take fifteen minutes, and oh man! I mean, I could just take ten, fifteen minutes, maybe even a half-hour depending on how much [time] I can [read my scriptures] that night. And I know that the next day I’m able to concentrate more. And understand the concepts that are being taught in school better. I can focus on doing my homework a lot quicker and so then I have time the next night to do my homework.
The importance of scripture in Vincent’s experience seemed clear. He was almost effusive explaining how he felt the Lord blessed him for reading scripture: He could concentrate better the next day in school, was able to understand academic concepts better, developed an improved focus on his homework that helped him complete it faster, and felt that he had more time to do his homework the day after he read scripture. Vincent said that these blessings became more apparent when he began attending seminary and reading scripture more regularly.
Likewise, Jonathan identified the blessings of reading scripture when he said that he read scripture because “I know that I’ll be blessed if I do it.” I asked him to say more about those blessings. He explained, “I’ve been doing better in school, like ever since I started reading my scriptures regularly, and so, that’s just one kind of big thing.” Jonathan said that one evidence of the importance of scripture in his life was the role it played in his academic achievement; namely, reading scripture improved his grades. This, he said, was one of the blessings of regular scripture study or “one kind of big thing” that let him know that scripture was sacred to him and different than other things that he read.
For Vincent and Jonathan scripture did things that other texts did not do by improving their school work. They both called it a blessing that the efforts they put forth to read scripture translated into academic achievement. Both young men were willing to entertain the idea that reading scripture may have improved their ability to do better in school because scripture reading was developing their reading and thinking skills; however, they still called it a blessing and gave credit to the Lord for the academic benefits they received. Both young men stated that other texts did not help them like this and that there was no other text that they would consider as or more important than scripture. It may be the case, then, that for these young people scripture’s ability to “bless” them in personal and important ways, such as academic learning, helped them see scripture as sacred text in their lives.
Well, when I decide to read I get my scriptures. I open them. I read and then the feeling comes. Not only while I’m reading, but afterwards [too]. It feels like you —. You just feel better. You feel better after you read the scriptures.
For Jonah, scripture was an essential part of his life because of the way it made him feel. When he read he felt “great.” And when he read, he felt “better” than he did before he read. These feelings were affective evidence for Jonah that scripture was sacred. No other text, Jonah said, made him feel this way. Later in the interview, Jonah explained that when he would get home from school, he would do his homework as quickly as possible so that he could read scripture. As he read, he tried to capture that “great” feeling as a way of renewing his faith and his belief that scripture was sacred text.
For Jonah and Sophia, scripture was sacred because it made them feel different than other texts. It made Jonah “feel great” and it made Sophia “feel loved.” For these youth, feeling great and loved as they read appeared to be unique to scripture and one indicator of the sacred nature of scripture. Neither of these two young people stated that other texts made them feel like this. Scripture was distinctive in this regard. For Jonah and Sophia, feeling loved and feeling great by engaging with scripture represented affective evidence that they were reading sacred texts.
The youth in this study developed their conceptions of sacred texts by how they functioned in their lives. They not only had frequent experiences with scripture that reinforced its special place in their lives and their faith, they also had deeply personal experiences with scripture [Page 62]that led them to believe that it was more than words on a page. Through these experiences, the youth in this study constructed a view of scripture as sacred text. Surprisingly, youth did not indicate that they developed their conceptions of sacred texts according to theological principles of scripture or tenets of Mormonism. For them, scripture was sacred because their regular experiences with it helped them see and feel its importance in their lives and how it was different — and did different things to them — than other texts.
Clearly, doctrinal evidence for the sacredness of scripture is important, but for these youth the heart and soul of their belief in the sacredness of scripture rested on how they interacted with it, what it did for them, and what it did for those around them. The youth talked about scripture experientially, explaining that believed that it was sacred because they had personal evidence of it in their lives.
Scripture-based instructional practices are important because they can influence the degree to which youth feel connected to the institutional practices surrounding sacred texts, which may have consequences for how youth take up these texts, textual practices, and perhaps the content of these texts. Currently, we know that youth in seminary are reading scripture,55 but the research base on the processes that Latter-day Saint youth use to navigate scripture is very small, consisting of two published studies.56 Clearly, greater understanding of how youth read and understand scripture would be valuable for teachers and parents who seek to improve youths’ scripture reading practices. Therefore, it may not be enough to focus on what youth in the Church are taught. More attention may need to be paid to how it is taught and how youth learn it. And that means focusing on the processes that youth use to read and construct knowledge and testimony of the truths in scripture. The textual practices that parents and teachers in the Church model for youth, give them time to practice in class, and encourage them to use on their own may matter just as much as the doctrine itself because the doctrines of the gospel can only do their work on youths’ hearts and minds when youth understand them, embrace them, and live them. And that happens in part through the manner in which youth are taught to read scripture. As a Church, we cannot get away from the methods of scripture literacy instruction if we hope to foster youths’ deep and transformative learning of gospel truths.
For those who seek to develop youths’ commitments to specific religious beliefs and practices as contained within scripture, first understanding youths’ views of these texts may have tremendous consequences for [Page 64]the development of their faith. For example, knowing that youth value scripture for what it has done — and can do — in their lives, may make religious educators in the Church more sensitive to the experiences that youth are having with scripture in religious classrooms. This can change the focus from telling youth what scripture means — which often puts the intellectual, emotional, and spiritual responsibility for learning on the teacher — to helping youth develop the tools to discover personally important truths in scripture for themselves — which helps youth take on more of the responsibility for developing their gospel knowledge and their faith. When we understand that youth construct their views of scripture as sacred text through repeated and important experiences with it, then we may be more attentive to the nature of the experiences that they have with scripture, especially those experiences that they have in our classrooms. Failure to understand and attend to youths’ experiences with scripture and their views of scripture may leave them feeling alienated from the very religiocultural practices and experiences that appear to mean so much to them.
Given that this study demonstrates the sociocultural development of Latter-day Saint youths’ conceptions of scripture as sacred texts, religious educators may seek to help youth see how their experiences with scripture are influencing their understanding of it as sacred text. This can occur as religious educators encourage youth to be more attentive to their experiences with scripture: namely, how they read it, why they read it, where they read it, what they get out of it, what it does to them, how they feel about it, what they say about it, what role it plays in their lives, and so forth. Regularly devoting a few minutes each class period for students to share their experiences with scripture, not just what they learned from it, may help attune students’ hearts and minds to the role of scripture in their lives and the experiences that they are having with it as they read it, ponder it, and talk about it. This can be a small, but effective way to help youth begin to see that they are developing a view of scripture as sacred text as they interact with it.
Drawing on the conception of the sacred as that which stands in opposition to the profane,57 another way to help youth understand the sacredness of scripture is to draw their attention to the differences between scripture and other texts. This can be done, for example, by helping youth see how [Page 65]reading scripture does things to their hearts and minds that other texts do not; helping them see how thinking about scripture draws them to Heavenly Father, connects them to the Savior, and invites the Holy Ghost into their lives in a way that other texts do not; and helping them see how scripture, unlike other texts, contains “principles of truth that will resolve every confusion and every problem and every dilemma that will face the human family or any individual in it.”58 The differences between scripture and other texts may act as evidence for youth of the sacredness of scripture because they can highlight the difference between what scripture can do to them, and what other texts, by comparison, cannot.
The current study contributes to a finer-grained understanding of how social and cultural factors influence young peoples’ notions of texts. For the Latter-day Saint youth in this study, scripture was not necessarily sacred because it was written by prophets, spoken by God, or because reading it would get them to heaven. For them, scripture was sacred because of how it functioned in their lives and how well it aligned with important religiocultural values, such as the experiential quality of religious truth. In the end, we may be able to do a better job of developing youths’ religious literate practices, such as reading scripture, if we have a clearer understanding of how their lived experiences help them construct their notions of scripture as sacred text.
1. See Jeff Sharlet, The Family: The Secret Fundamentalism at the Heart of American Power (New York: HarperCollins, 2008).
2. See R. Laurence Moore, Touchdown Jesus: The Mixing of Sacred and Secular in American History (Louisville, KY: Westminster John Knox Press, 2003); and Diane Winton, Small Screen, Big Picture: Television and Lived Religion (Waco, TX: Baylor University Press, 2009).
3. See Koichi Mori, “President Bush’s Discourse on War against ‘Terrorism,’” Journal of Interdisciplinary Study of Monotheistic Religions [Special issue, Discourse on Violence and War in the Islamic and Christian World, The 19th World Congress of the International Association for the History of Religions (IAHR)], http://www.cismor.jp/uploads-images/sites/3/2006/02/President-Bushs-Discourse-on-War-Against-Terrorism.pdf; and Barak Obama, “A New Beginning,” speech presented at Cairo University, Giza, Egypt, June 4, 2009, https://www.whitehouse.gov/the-press-office/remarks-president-cairo-university-6-04-09.
4. See Nila Banton-Smith, American Reading Instruction (Newark, DE: International Reading Association, 2002); and Douglas Jacobsen and Rhonda Hustedt Jacobsen, The American University in a Postsecular Age (New York: Oxford University Press, 2008).
5. See Peter Manseau and Jeff Sharlet, Killing the Buddha: A Heretic’s Bible (New York: Free Press, 2004); Moore, Touchdown Jesus.
7. See Christian Smith and Melinda L. Denton, Soul Searching: The Religious and Spiritual Lives of American Teenagers (New York: Oxford University Press, 2005).
8. See A. Jonathan Eakle, “Literacy Spaces of a Christian Faith-based School,” Reading Research Quarterly 42/4 (2007): 472–510; Shirley Brice Heath, Ways with Words: Language, Life, and Work in Communities and Classrooms (New York: Cambridge University Press, 1983); David Poveda, Ana Cano, and Manuel Palomares-Valera, “Religious Genres, Entextualization and Literacy in Gitano Children,” Language in Society, 34, no. 1 (2005): 87–115; Eric D. Rackley, “Motivation for Religious Literacy Practices of Religious Youth: Examining the Practices of Latter-day Saint and Methodist Youth in One Community” (PhD diss., University of Michigan, 2010); Eric D. Rackley, “Scripture-Based Discourses of Latter-day Saint and Methodist Youths,” Reading Research Quarterly 49, no. 4 (2014): 417–35; and Loukia K. Sarroub, “In-Betweenness: Religion and Conflicting Visions of Literacy,” Reading Research Quarterly 37/2 (2002): 130–48.
9. See Gloria Ladson-Billings, The Dreamkeepers: Successful Teachers of African American Children (San Francisco: Jossey-Bass Publishers, 1994); and Elizabeth Birr Moje and Kathleen Hinchman, “Culturally Responsive Practices for Youth Literacy Learning,” in Adolescent Literacy Research and Practice, ed. Tamara L. Jetton and Janet A. Dole (New York: Guilford Press, 2004), 321–50.
10. See Jacque Derrida, Of Grammatology (Translated by Gayatri C. Spivak) (Baltimore: Johns Hopkins University Press, 1976); Heath, Ways with Words; Sylvia Scribner and Michael Cole, The Psychology of Literacy (Cambridge, MA: Harvard University Press, 1981); Brian V. Street, Literacy in Theory and Practice (Cambridge, MA: Cambridge University Press, 1984); and Brian V. Street, Social Literacies: Critical Approaches to Literacy in Development, Ethnography and Education (London: Longman, 1995).
11. See Patricia A. Alexander and Tamara L. Jetton, “Learning from Text: A Multidimensional and Developmental Perspective,” in Handbook of Reading Research, Vol. 3, ed. Michael L. Kamil (Mahwah, NJ: L. Erlbaum Associates, 2000), 285–310; Donna E. Alvermann and Elizabeth Birr Moje, “Adolescent Literacy Instruction and the Discourse of ‘Every Teacher a Teacher of Reading,’” in Theoretical Models and Processes of Reading, ed. Donna E. Alvermann, Norman Unrau, and Robert B. Ruddell, 6th ed., (Newark, DE: International Reading Association, 2013), 1072–103; Glynda A. Hull and James G. Greeno, “Identity and Agency in Nonschool and School Worlds,” in Learning in Places: The Informal Education Reader, ed. Zvi Bekerman, Nicholas Burbules, and Diana Silberman-Keller (New York: Peter Lang, 2006), 77–98; Elizabeth Birr Moje, Darin Stockdill, Kathryn Kim, and Hyun-Ju Kim, “The Role of Texts in Disciplinary Learning,” in Handbook of Reading Research, Vol. 4, ed. Michael L. Kamil, P. David Pearson, Elizabeth Birr Moje, and Peter P. Afflerbach (New York: Routledge, 2011), 453–86; Darin Stockdill and Elizabeth Birr Moje, “Adolescents as Readers of Social Studies: Examining the Relationship between Youth’s Everyday and Social Studies Literacies and Learning,” Berkeley Review of Education 4/1 (2013): 35–68; and Suzanne E. Wade and Elizabeth Birr Moje, “The Role of Text in Classroom Learning,” in Handbook of Reading Research, Vol. 3, ed. Michael L. Kamil, Peter B. Mosenthal, P. David Pearson, and Rebecca Barr (Mahwah, NJ: Lawrence Erlbaum Associates, 2000), 609–27.
12. See Glynda A. Hull and Katherine Schultz, School’s Out! Bridging Out-of-School Literacies with Classroom Practice (New York: Teachers College Press, 2002); David E. Kirkland and Glynda A. Hull, “Literacy Out of School: A Review of Research on Programs and Practices,” in Handbook of Reading Research: Vol. 4, ed. Michael L. Kamil, P. David Pearson, Elizabeth Birr Moje and Peter Afflerbach (New York: Routledge, 2011), 711-725; Elizabeth Birr Moje, “Powerful Spaces: Tracing the Out-of-School Literacy Spaces of Latino/a Youth,” in Spatializing Literacy Research and Practice, ed. Kevin M. Leander and Margaret Sheehy (New York: Peter Lang, 2004), 15–38; Elizabeth Birr Moje, “‘To be Part of the Story’: The Literacy Practices of Gansta Adolescents,” Teachers College Record 102/3 (June 2000): 651–90; and Jennifer C. Stone, “Popular Websites in Adolescents’ Out-Of-School Lives: Critical Lessons on Literacy,” in A New Literacies Sampler, ed. Michele Knobel and Colin Lankshear (New York: Peter Lang, 2007), 49–66.
13. See Elizabeth Birr Moje, Melanie Overby, Nicole Tysvaer, and Karen Morris, “The Complex World of Adolescent Literacy: Myths, Motivations, and Mysteries,” Harvard Educational Review 78/1 (Spring 2008): 107–54; and Eric D. Rackley, “Religious Youths’ Motivation for Reading Complex, Religious Texts,” Teachers College Record (in press).
14. See David Barton and Margaret Hamilton, “Literacy Practices,” in Situated Literacies: Reading and Writing in Context, ed. David Barton, Margaret Hamilton, and Roz Ivanic (London: Routledge, 2000), 7–15; Barbara J. Guzzetti, and Margaret Gamboa, “Zines for Social Justice: Adolescent Girls Writing on their Own,” Reading Research Quarterly 39/4 (2004): 408–36; Cynthia Lewis and Bettina Fabos, “Instant Messaging, Literacies, and Social Identities,” Reading Research Quarterly 40/ 4 (2005): 470–501.
16. See Alfred W. Tatum, “Toward a More Anatomically Complete Model of Literacy Instruction: A Focus on African American Male Adolescents and Texts,” in Theoretical Models and Processes of Reading, 6th edition, ed. Donna E. Alvermann, Norman J. Unrau, and Robert B. Ruddell (Newark, NJ: International Reading Association, 2008/2013), 611–35.
17. See Margaret J. Finders, Just Girls: Hidden Literacies and Life in Junior High (New York: Teachers College Press, 1997); Margaret J. Finders, “Queens and Teen Zines: Early Adolescent Females Reading their Way toward Adulthood,” Anthropology & Education Quarterly 27/1 (March 1996): 71–89; Barbara J. Guzzetti, “Lessons on Literacy Learning and Teaching: Listening to Adolescent Girls,” in Handbook of Adolescent Literacy Research, ed. Leila Christenbury, Randy Bomer, and Peter Smagorinsky (New York: Guilford, 2009), 372–85; and Josephine P. Marsh and Elizabeth P. Stolle, “Re/constructing Identities: A Tale of Two Adolescents,” in Reconceptualizing the Literacies in Adolescents’ Lives, ed. Donna E. Alvermann, Kathleen A. Hinchman, David W. Moore, Stephen F. Phelps, and Diane R. Waff (Mahwah, NJ: Lawrence Erlbaum Associates, 2006), 47–63.
18. See Carmen M. Martínez-Roldán and María E. Fránquiz, “Latina/o Youth Literacies: Hidden Funds of Knowledge,” in Handbook of Adolescent Literacy Research, ed. Leila Christenbury, Randy Bomer, and Peter Smagorinsky (New York: Guilford, 2009), 323–42; and Na’ilah S. Nasir, “‘Points ain’t Everything’: Emergent Goals and Average and Percent Understandings in the Play of Basketball among African American Students,” Anthropology and Education Quarterly 31/3 (2000): 283–305.
19. See Rebecca W. Black, “Digital Design: English Language Learners and Reader Reviews in Online Fiction,” in A New Literacies sampler, ed. Michele Knobel and Colin Lankshear (New York: Peter Lang, 2007), 115–36); Lewis and Fabos, “Instant Messaging”; Stone, “Popular Websites”; and Phillip Wilder and Mark Dressman, “New Literacies, Enduring Challenges? The Influence of Capital on Adolescent Readers’ Internet Practices,” in Reconceptualizing the Literacies in Adolescents’ Lives, ed. Donna E. Alvermann, Kathleen A. Hinchman, David W. Moore, Stephen F. Phelps, and Diane R. Waff (Mahwah, NJ: Lawrence Erlbaum Associates, Publishers, 2006), 205–29.
21. See Caroline Zinsser, “For the Bible Tells Me So: Teaching Children in a Fundamentalist Church,” in The Acquisition of Literacy: Ethnographic Perspectives, ed. Bambi Schieffelin and Perry Gilmore (Norwood, NJ: Ablex, 1986), 55–71.
22. See Poveda, Cano, and Palomares-Valera, “Literacy in Gitano Children”; and Alison Skerrett, “Religious Literacies in a Secular Literacy Classroom,” Reading Research Quarterly 49/2 (2013): 233–50.
23. See Patricia Baquedano-López, “Narrating Community in Doctrina Classes,” Narrative Inquiry 10/2 (2000): 429–52.
27. See Eric D. Rackley, “How Young Latter-day Saints Read the Scriptures: Five Profiles,” The Religious Educator, 16, no. 2 (2015): 129-148.
28. See Emile Durkheim, The Elementary Forms of Religious Life (New York: Free Press, 1957).
29. See Rudolf Otto, The Idea of the Holy: An Inquiry into the Non-Rational Factor in the Idea of the Divine and Its Relation to the Rational (London: Oxford University Press, 1923).
31. See Mircea Eliade, The Sacred and the Profane: The Nature of Religion (San Diego: Harcourt Brace, 1959).
32. See Durkheim, The Elementary Forms of Religious Life, 37.
33. See Brian J. Zinnbauer and Kenneth I. Pargament, “Religiousness and Spirituality,” in Handbook of the Psychology of Religion and Spirituality, ed. Raymond F. Paloutzian and Crystal L. Park (New York: Guilford Press, 2005), 21–42.
34. Durkheim, The Elementary Forms of Religious Life, 52.
35. See Smith and Denton, Soul Searching.
36. . Jonah and Sophia are siblings. They grew up in the same home and at the time of the study lived together with their parents and younger sibling.
37. . Samantha and Timothy are siblings. They grew up in the same home and at the time of the study lived together with their parents and younger sibling.
38. See Robert M. Emerson, Rachel I. Fretz, and Linda L. Shaw, Writing Ethnographic Fieldnotes (Chicago: University of Chicago Press, 1995).
39. See Anselm Strauss and Juliet Corbin, Basics of Qualitative Research (Los Angeles: Sage, 2008); and Anselm Strauss and Juliet Corbin, Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (Thousand Oaks, CA: Sage, 1998).
40. See Strauss and Corbin, Basics of Qualitative Research.
41. See Kenda Creasy Dean, Almost Christian: What the Faith of our Teenagers is Telling the American Church (New York: Oxford University Press, 2010).
42. See Strauss and Corbin, Basics of Qualitative Research.
46. Jim Vander Putten, “In Peer Review, It’s Time to Stop Thinking Statistically about Qualitative Research,” Teachers College Record (July 24, 2006), www.tcrecord.org.
47. See Erin Horvat and Mary Lou Heron, The Beginner’s Guide to Doing Qualitative Research: How to Get into the Field, Collect Data, and Write Up Your Project (New York: Teachers College Press, 2013).
48. See Thomas A. Schwandt, Dictionary of Qualitative Inquiry (Thousand Oaks, CA: Sage, 2001).
50. See Lev Vygotsky, “The Genesis of Higher Mental Functions,” in The Concept of Activity in Soviet Psychology, ed. James V. Wertsch (Armonk, New York: Sharpe, 1981), 44–188; and James V. Wertsch, “The Need for Action in Sociocultural Research,” in Sociocultural Studies of Mind, ed. James V. Wertsch, Pablo Del Rio, Amelia Alvarez (New York: Cambridge University Press, 1995), 56–74.
51. Dean, Almost Christian, 60.
53. See Jenny L. Small, “College Student Religious Affiliation and Spiritual Identities: A Qualitative Study,” (PhD diss., University of Michigan, 2008).
54. Linda D. Pearce and Melinda L. Denton, A Faith of their Own: Stability and Change in the Religiosity of America’s Adolescents (New York: Oxford, 2011), 127.
55. Jenny Poffenbarger, “Seminary Students Rise to Challenge to Elevate Learning,” Church News, September 18, 2015, churchofjesuschrist.org/church/news/print/seminary-students-rise-to-challenge-to-elevate-learning.
57. See Durkheim, The Elementary Forms of Religious Life; Eliade, Sacred and Profane; and Otto, The Idea of the Holy.
58. Boyd K. Packer, “Teach the Scriptures,” in Charge to Religious Educators (Salt Lake City: The Church of Jesus Christ of Latter-day Saints. 1994), 89.
Posted in Article and tagged scripture, scripture study on March 11, 2016 . Bookmark the permalink.
Eric D. Rackley (PhD, University of Michigan) is an Assistant Professor of Education at Brigham Young University-Hawai’i. His research focuses on the literacy practices of disciplinary experts and novices, religious youths’ literacy practices, and religious youths’ motivations for reading religious texts. His recent publications include “Scripture-Based Discourses of Latter-day Saint and Methodist Youths” (Reading Research Quarterly), “How Young Latter-day Saints Read the Scriptures: Five Profiles (The Religious Educator), and “Religious Youths’ Motivations for Reading Complex, Religious Texts” (Teachers College Record). He and his wife, Michelle (Jenkins) Rackley, are the parents of seven children: Josie, Joshua, Adam, Isaac, Jacob, Jared, and Anna-Sophia. | 2019-04-25T22:31:09Z | https://www.mormoninterpreter.com/latter-day-saint-youths-construction-of-sacred-texts/ |
IL-1 is a get good at cytokine of neighborhood and systemic irritation. and sustained decrease in disease intensity. In common circumstances such as center failure and gout pain joint disease, IL-1 blockade could be effective therapy. Three IL-1blockers have already been authorized: the IL-1 receptor antagonist, anakinra, blocks the IL-1 receptor and for that reason reduces the experience of IL-1 and IL-1. A soluble decoy receptor, rilonacept, and a neutralizing monoclonal anti-interleukin-1 antibody, canakinumab, will also be authorized. A monoclonal antibody aimed against the IL-1 receptor and a neutralizing anti-IL-1 are in medical trials. By particularly blocking IL-1, we’ve learned a good deal about the part of the cytokine in swelling but equally essential, reducing IL-1 activity offers lifted the responsibility of disease for most individuals. = 40), 5% of individuals randomized to anakinra created center failing whereas 30% had been affected in the placebo arm (= 0.035) . 5.2. Center failure Despite many treatment regimens, center failure is still a significant medical issue with significant financial and interpersonal burdens. Poorly paid out individuals with remaining ventricular ejection portion significantly less than 40% and raised serum CRP higher than 2 mg/L Prostaglandin E1 (PGE1) IC50 had been treated with anakinra and put through controlled workout performance screening. Physiologically, after 2 weeks of anakinra, air consumption more than doubled from baseline, skin tightening and retention reduced and workout overall performance improved . Serum IL-1 amounts dropped by 89%, CRP by 88% and IL-6 by 90%, but there is no switch in degrees of TNF . Since IL-1 induces IL-6, a fall in IL-6 is usually indicative of the reduction in the natural activity of IL-1 itself, assisting the idea that center failure can be an autoinflammatory disease. These data in human beings with center failure act like rheumatoid arthritis sufferers who had been treated for thirty days with anakinra where time still left ventricular function improved . Within a related research, an individual subcutaneous dosage Prostaglandin E1 (PGE1) IC50 of anakinra led to increased blood circulation 3 h afterwards . General, these improvements in center function may Prostaglandin E1 (PGE1) IC50 also be consistent with prior studies in individual atrial center strips ex girlfriend or boyfriend vivo for the reason that IL-1 suppresses contractile power which Prostaglandin E1 (PGE1) IC50 preventing IL-1 restores reduced function after ischemia-reperfusion . Many animal models present that IL-1 suppresses the myocardium (analyzed in ). With just a 14-time span of anakinra in sufferers getting current treatment criteria, a greater length of time of blockade may create a better come back of function. Although center failure is certainly often connected with reduced still left ventricular ejection quantity, some 50% of sufferers with hemo-dynamically described center failure have regular still left ventricular systolic function but with impaired still left ventricular diastolic filling up. This sort of center failure can be called diastolic center failure and sufferers with arthritis rheumatoid exhibit signs of the form of center failure. Furthermore, anakinra treatment of arthritis rheumatoid sufferers with center failure restored still left ventricular diastolic function . Within a double-blind, placebo-controlled, cross-over trial, sufferers received 2 weeks of anakinra 100 mg each day or placebo. Before and following the treatment schedules, workout assessment was performed. Anakinra led to improved in top oxygen intake (= 0.009) and a 75% reduction in CRP . For sufferers with arthritis rheumatoid as well as the co-morbidity of diastolic center failing, anakinra treatment for the joint disease would offer an improved treatment choice since no various other anti-cytokine treatment for arthritis rheumatoid reduces center failure, and regarding TNF, blockers, there’s a risk for sufferers with center failing. 6. Diabetes 6.1. Type-1 diabetes In 1986, the Danish researchers Mandrup-Poulsen and co-workers published their results that picomolar concentrations of IL-1 had been selectively dangerous for the insulin-producing pancreatic beta-cell (analyzed in ). These research led to a paradigm alter for the pathogenesis of Type-1 diabetes for the reason that a macrophage item rather than cytotoxic T-cell became the mark for salvaging the beta-cell. In the nonobese diabetic mouse stress, the model for Type-1 diabetes, IL-1 blockade decreases spontaneous diabetes but also within a rat style of spontaneous diabetes . After ARHGEF2 25 years of analysis on IL-1 in diabetes, studies of IL-1 blockade possess begun. Within a 28-time longer trial of anakinra in kids within seven days of the starting point of diabetes, insulin make use of after one and four a few months Prostaglandin E1 (PGE1) IC50 from diagnosis had been.
Integrin v is necessary for melanoma cell success and tumor development in various versions. activity in 3D-collagen, whereas inhibition of MEK1 activity induced apoptosis. Remarkably, MEK1 and ERK1/2 actions had been restored in integrin v-negative melanoma cells by suppression of p53, whereas concomitant stop of MEK1 induced apoptosis. This shows that integrin v settings melanoma cell success in 3D-collagen through a pathway including p53 rules of MEK1 signaling. Intro Integrins play crucial functions for the rules of tumor development and invasion (Hood and Cheresh, 2002). For instance, manifestation of integrin v3 continues to be associated with malignant melanoma development, where the vertical development stage of dermal malignant melanoma shows high expression degrees of integrin v3 in comparison with horizontally developing melanoma in the skin (Albelda et al., 1990; Van Belle et al., 1999). Moreover, in 465-39-4 IC50 vivo gene delivery of integrin 3 promoted invasive melanoma growth from the skin in to the dermis in three-dimensional (3D) skin reconstructs (Hsu et al., 1998). Consistently, integrin v controls melanoma tumorigenicity (Felding-Habermann et al., 1992), by promoting melanoma cell survival as shown inside a 3D collagen gel model in vitro, and completely thickness human skin in vivo (Montgomery et al., 1994; Petitclerc et al., 1999). Importantly, block of integrin v3 by an antagonistic anti-integrin v3 mAb induced melanoma cell apoptosis and thereby prevented melanoma tumor growth in mice, whereas reconstitution from the integrin v subunit into v-negative melanoma cells rescued cell survival in 3D-collagen aswell 465-39-4 IC50 as with human dermis and thereby restored melanoma tumor growth in vivo (Montgomery et al., 1994; Petitclerc et al., 1999). However, it really is unclear how integrin v may promote melanoma cell survival within 3D microenvironments. Integrin-mediated cellCmatrix interactions trigger a number of signaling pathways (Giancotti and Ruoslahti, 1999). Signal transduction in cells within 3D-matrices is apparently markedly not the same as signaling events in cells attached onto two-dimensional (2D) substrates (Cukierman et al., 2002). For instance, tyrosine phosphorylation of FAK and EGF-receptor signaling was different in response to cell adhesion within 3D-matrices in comparison with attachment to 2D substrates coated onto tissue culture plates (Wang et al., 1998; Cukierman et al., 2001). The integrin-induced MAPK kinase (MEK)-extracellular signal-regulated kinase (ERK) MAPK cascades are fundamental signaling pathways mixed up in regulation of adhesion-dependent cell growth and survival (Howe et al., 2002). In melanoma cells, MEK and ERK1/2 could be activated by active mutations of BRAF in 2D cultures (Satyamoorthy et al., 2003). Considering that BRAF is mutated generally in most melanomas, BRAF-dependent MEK activation may be connected with oncogenic behavior of melanoma (Smalley, 2003). However, the role from the RafCMEK1CERK1/2 pathway in the regulation of melanoma growth and cell survival isn’t well characterized. Furthermore, although cell anchorage is necessary for activating ERK1/2 in melanocytes (Conner et al., 2003), it really is unclear if integrin v may regulate melanoma cell MEK1CERK1/2 activity within 3D environments and if this might are likely involved for the control of melanoma cell survival. p53-induced 465-39-4 IC50 apoptotic cell death plays a central role for suppression of tumor growth (Schmitt et al., 2002). Upon activation by numerous kinds of stress stimuli, p53 transcriptionally regulates target genes, including PUMA, Apaf 1, Bax, and Bcl-2, which critically regulate mitochondrial apoptotic cascades (Vousden and Lu, 2002). p53 could also induce apoptosis by directly affecting mitochondria (Mihara et al., 2003). Furthermore, p53 continues to be connected with death receptors and activation of caspase-8 (Ashkenazi and Dixit, 1998). In angiogenesis, ligation of integrin v3 inactivated vascular cell p53, whereas p53 null mice were refractory for an integrin v-antagonist that blocked angiogenesis in wild-type (wt) mice (Str?mblad et al., 1996, 2002). Interestingly, the p53 gene is rarely mutated in melanoma, although p53 is mutated generally in most human cancers (Geara and Ang, 1996; Jenrette, 1996). Therefore, melanoma cells typically express wt p53 protein and would as a result of this be expected to become sensitive to DNA-damaging agents. However, most melanoma cells are really CYFIP1 radio resistant and irradiation of melanoma cells expressing wt p53 leads to accumulation of p53 however, not to apoptosis (Satyamoorthy et al., 2000). Similarly, overexpression of wt p53 by adenovirus in melanoma cells didn’t induce apoptosis (Satyamoorthy et al., 2000). However, it really is unclear why melanoma cells harboring wt p53 can still form tumors and survive. Predicated on our previous.
The Na+/Ca2+ exchanger in mammalian heart muscle (NCX1) may be the central transporter protein that regulates Ca2+ extrusion in the heart cell. NCX1-mediated ion-currents (INCX) and cytosolic Ca2+-extrusion had been detected by a combined mix of patch-clamp and confocal microscopy under circumstances of which the purified NCXIF was straight loaded in to the cytoplasm of patched cardiomyocytes. It had been showed that cytosolic NCXIF blocks the Ca2+-turned on NCX1 inward current as well as the associated Ca2+-extrusion in the cell with high efficiency. A constant small percentage of NCX1 inhibition was noticed under circumstances of which the cytosolic [Ca2+]we was mixed at fixed dosages of NCXIF, recommending that the amount of inhibition is normally managed by NCXIF dosage rather than by cytosolic Ca2+ concentrations. NCXIF blocks similarly well both Ca2+ extrusion and Ca2+ entrance settings of NCX1, in keeping with thermodynamic concepts anticipated for the working of the bidirectional carrier-type transportation system. We figured NCXIF interacts using a putative regulatory domains in the cytosolic side and therefore, may play a significant regulatory function in managing Ca2+ signaling in the center. This might represent a fresh potential device for developing book remedies for cardiac Ca2+ signaling dysfunction. Protein from the NCX gene family members donate to Ca2+ legislation in lots of cell types (1C4), with three genes in charge of expression, specifically, NCX1, NCX2, and NCX3 with multiple splice variations (2,5C7). In center, the electrogenic Na+/Ca2+ exchange (8) is because of the gene item of NCX1.1 and, even though the molecular and biophysical properties have already been broadly studied (2C7), endogenous regulation is incompletely recognized (9C13). Nevertheless, it really is very clear that adjustments in NCX1 proteins expression accompany the introduction of varied diseases such as for example heart failing and arrhythmia (2C4,9). There is certainly, however, considerable doubt regarding the part performed by NCX1 in these illnesses and, furthermore, to date, there is certainly neither evidence how the NCX1 activity may be the reason behind such illnesses nor are mutations of NCX1 associated with any particular disease. However, NCX1 proteins levels may modification and certainly donate to Ca2+ transportation and signaling dysfunction, although the facts remain poorly realized (2C4,9). The Na+/Ca2+ exchanger turnover price is clearly suffering from the intracellular Ca2+, Na+, and H+ ions, which connect to the regulatory cytosolic f-loop of NCX proteins (3,4,10C13). Various other cellular elements (ATP, PIP2, and lipids) can also modulate NCX1, but their physiological relevance continues to be unclear (11,12). No phosphorylation from 1001645-58-4 the cardiac NCX1 proteins has been 1001645-58-4 showed either or and arrows suggest the retention situations of blood sugar and sucrose, respectively (assessed on a single column beneath the similar chromatographic circumstances). Aftereffect of NCXIF over the Ca2+-entrance and Ca2+-leave modes from the Na+/Ca2+ exchanger in unchanged cardiomyocytes The Ca2+-entrance and Ca2+-leave settings of NCX1 had been monitored in unchanged cardiomyocytes under circumstances of which the SR Ca2+ fluxes had been completely obstructed by pretreatment of cardiomyocytes with ryanodine and thapsigargin (33,34). To measure the Ca2+-entrance via NCX1, extracellular Na+ was abruptly taken out (changed by TMA) for 20 sec and Ca2+ entrance was supervised by measuring adjustments in [Ca2+]i using fluo-3. Amount 3A implies that Na+ removal leads to the elevation of [Ca2+]i (world wide web Ca2+-entrance). Following removal of extracellular Na+, the come back of extracellular [Na]o on track levels led to decreased [Ca2+]we and reflects the web leave of Ca2+ via the Na+/Ca2+ exchanger. Two consecutive group of Na+-abrupt shows in the same cardiomyocyte (separated by five minutes) created comparable adjustments in the amplitude and prices from the [Ca2+]i (Fig. 3A). As a result, the inhibitory ramifications of NCXIF could be reliably examined in the same cardiomyocyte through the second Na+-abrupt event (the initial Na+-abrupt could be used being a control). The bidirectional Ca2+-fluxes through NCX1 had been analyzed by transient superfusion of cadiomyocytes with extracellular NCXIF (50 systems/ml for 5 min). NCXIF considerably reduced the speed and magnitude from the 1001645-58-4 adjustments in [Ca2+]i (Fig. 3B). NCXIF leads to a slowing from the price of Ca2+-entrance and of the Ca2+-leave (Fig. 3C). Furthermore, NCXIF decreases the amplitude of [Ca2+]i elevation (to 15.0 4.8% from Rabbit polyclonal to EBAG9 the control, p 0.001) and lowers the speed of Ca2+-entrance (11.9 7.2% from the control, p 0.001) and of Ca2+-leave (5.6.
Neutrophil (PMN) infiltration and associated discharge of serine proteases donate to epithelial damage during active stages of mucosal disorders such as for example inflammatory colon disease. PMN get in touch with and clogged PMN transepithelial migration. Basolateral, however, not apical, PAR-1 and -2 activation with selective agonists also reduced TER. PAR-1 and -2 had been localized intracellularly and near lateral areas beneath limited junctions, and manifestation was improved in colonic mucosa from people with Crohns disease. Mixed, but not specific, transfection with little interfering RNAs targeted against epithelial PAR-1 and -2, avoided the fall in TER induced by PMN get in touch with. Furthermore, basolateral PAR-1 and -2 activation induced phosphorylation of myosin L string kinase and regulatory myosin L string. Finally, epithelial PAR-1 and -2 knockdown reduced the pace of PMN transepithelial migration. These outcomes claim that protease-mediated epithelial PAR-1 and -2 activation, by migrating PMNs, induces signaling events that increase epithelial permeability thereby facilitates PMN transepithelial migration. Neutrophil (polymorphonuclear leukocyte; PMN3) accumulation at intestinal mucosal surfaces is a characteristic hallmark of several inflammatory conditions from the intestine. Epithelial injury, disease activity, and patient symptoms have already been proven to correlate using the histological finding of extensive PMN migration over the epithelium (1). Furthermore, studies have indicated that high-density PMN flux buy LY 303511 across epithelial monolayers mimicking active inflammation, in either the MSN buy LY 303511 apical-to-basolateral direction or the more physiologically relevant basolateral-to-apical direction, leads to disruption of epithelial permeability (2) and produces multifocal wounds (3). Consequently, the increased loss of epithelial barrier function leads to increased luminal Ag penetration and subsequent perpetuation from the inflammatory response. Conversely, low-density PMN migration, which occurs during immune surveillance, is normally thought to be an instant process that will not damage the integrity of epithelial monolayers (4, 5). Indeed, interactions between your transmigrating PMN as well as the epithelium bring about signaling events which could be amplified and prolonged during high-density PMN transmigration (5, 6). These observations claim that buy LY 303511 under physiological conditions, intercellular junctions transiently loosen to permit passing of circulating cells, while at exactly the same time maintaining barrier function. However, the mechanisms that regulate epithelial permeability during low- and high-density PMN transmigration remain poorly defined. Previously, we’ve demonstrated that high-density PMN transmigration increases paracellular permeability inside a contact-dependent manner and activates signaling events in epithelial monolayers inside a polarized manner before transmigration in the physiologically relevant basolateral-to-apical direction (6). However, the PMN and epithelial receptors that mediate these contact-dependent signaling events and alter epithelial permeability have remained to become elusive. Among the candidate PMN surface proteins that may initiate such epithelial signaling events, several structurally similar serine proteases that possess antimicrobial activity (serpocidins) and so are contained inside the azurophil (primary) granules, have already been proven to undergo limited exocytosis and mobilize towards the cell surface upon activation (7, 8). Indeed, PMN serpocidins have been recently proven to activate protease-activated receptors (PARs; Refs. 9-12), a distinctive class of G-protein-coupled signaling receptors which have been reported to induce epithelial cell apoptosis (10, 13) and regulate epithelial barrier function in vitro and in vivo (13-15). Cleavage from the PAR extracellular N terminus by proteases such as for example thrombin, trypsin, and tryptase (16) has been proven to permit an exposed tethered ligand to bind and activate the cleaved receptor. Despite these observations, the role of leukocyte proteases and PAR signaling in the regulation of epithelial barrier function at sites of inflammation remains incompletely understood but still remains to become an intriguing hypothesis that should be further elucidated. With this study, we determined that basolateral activation of PAR-1 and -2 increases epithelial permeability and that event regulates the disruption in epithelial barrier function induced by PMN contact and subsequent PMN transepithelial migration. Materials and Methods buy LY 303511 Reagents Abs were from Invitrogen/Zymed Laboratories (occludin, claudin-1, claudin-4, and actin), Santa Cruz Biotechnology (phosphorylated myosin L chain kinase (MLCK; Tyr464), and Cell Signaling Technology (dually phosphorylated myosin L chain; Thr18 and Ser19). The goat polyclonal Ab to thrombin receptor or PAR-1 (C-18) was from Santa Cruz Biotechnology, as well as the rabbit polyclonal Ab to PAR-2 (B5/A5) was kindly supplied by Dr. Morley Hollenberg (University of Calgary, Calgary, Canada). The serine proteases human neutrophil elastase and proteinase-3 were from Elastin Products. Human cathepsin G, the broad spectrum metalloproteinase inhibitor galardin (mix. The reaction mixtures were put through cDNA synthesis for 30 min at 58C and denaturation.
Hepatitis B trojan (HBV) X proteins (HBx) is known as to are likely involved in the introduction of hepatocellular carcinoma (HCC) during HBV infections. therapy. INTRODUCTION Extended infections with Hepatitis B trojan (HBV) continues to be clearly named a significant etiological aspect for hepatocellular carcinoma (HCC) (1). HBx, a virally encoded proteins of 154 proteins, has been proven to possess multifunctional activities highly relevant to HBV-mediated oncogenesis (2). HBx is certainly involved with neoplastic change in cultured cells and will induce liver cancer tumor in transgenic mice. Although HBx will not bind to double-stranded DNA, it regulates transcription of a number of mobile and viral genes by getting together with mobile proteins and/or the different parts of indication transduction pathways. HBx provides been proven to connect to transcriptional factors such as for example RPB5 of RNA polymerase (3), TATA-binding proteins (4), basic area/leucine zipper (bZIP) protein (5) as well as the tumor suppressor p53 (6). Besides, additionally, it may associate with serine protease TL2 (7) and mobile DNA repair proteins (8). The relationship of HBx with these proteins network marketing leads to activation of sign transduction pathways like the Ras/Raf/mitogen-activated proteins kinase, proteins kinase C, Jak1-STAT and nuclear aspect B pathways (9C12). Nevertheless, the intracellular signaling pathways where Hbx is certainly involved aren’t completely elucidated. Estrogen was proven to suppress HBV replication in male athymic mice transplanted with HBV-transfected HepG2 cells (13). The actual fact that HCC is certainly more frequent in guys than in females shows that estrogen may play a significant role in the introduction of HCC (14C17). Estrogen exerts 905281-76-7 its function through its two nuclear receptors, estrogen receptor and (ER and ER) (18C21). ER and ER talk about structural similarity seen as a several useful domains. Two distinctive activation function (AF) domains, AF-1 and AF-2, located on the N-terminus as well as the C-terminus, respectively, donate to the transcriptional activity of both receptors. The DNA-binding area (DBD) of both receptors is certainly well conserved and located. Activation of ERs is in charge of many biological procedures, including cell development, differentiation and apoptosis. ER continues to be well characterized in individual liver organ (22). ER is certainly portrayed in the liver organ of both healthful individuals and sufferers with HCC, without distinctions in the design of appearance (23,24). On the other hand, the mutant type with the complete exon 5 removed (ER5) is certainly preferentially portrayed in sufferers with HCC weighed against patients with regular livers (25). The current presence of the liver organ ER5 transcript in the tumor was the most powerful harmful predictor of survival in operable HCC (26C28). Its existence also correlates with an increased Slc2a4 clinical aggressiveness from the tumor in comparison to tumors seen as a wild-type 905281-76-7 ER (wt ER) transcript. Great prices of ER5 appearance have been proven to present in guys at 905281-76-7 high-risk for HCC advancement. ER5 encodes the hormone-independent AF-1 area, aswell as the DBD. Although ER5 was proven coexpressed with wt ER in HCC, the function of ER5 in ER signaling continues to be to be looked into. Based on and useful relevance from the estrogen/ER axis and HBx in the introduction of HCC, we hypothesized that HBx may are likely involved in ER signaling. Right here, we present that ER5 includes a prominent harmful activity in hepatoma cells when portrayed as well as wt ER. HBx reduces ER transcriptional activity, and HBx and ER5 possess additive influence on inhibition of ER transactivation. We further present and proof that both HBx and ER5 connect to ER. HBx inhibits 905281-76-7 ER signaling perhaps through recruitment of histone deacetylase 1 (HDAC1). Components AND Strategies Plasmids The reporter constructs ERE-Luc (29), C3-LUC (30,31), pS2-LUC (32) and pS2ERE-LUC (33), and appearance vector for ER have already been defined previously. For the era of FLAG-tagged full-length HBx, individual HBx DNA was amplified by PCR using pHBV3091 being a design template (34). The amplified HBx DNA was cloned into pcDNA3 vector harboring FLAG epitope series (pcDNA3-FLAG). The deletion mutant.
may be the causative agent of African sleeping sickness. demonstrate that the initial regulatory subunit of AdoMetDC is certainly an essential component of this legislation. The info support ODC and AdoMetDC as the main element control factors in the pathway as well as the most likely rate-limiting guidelines in polyamine biosynthesis. Writer Summary Individual African trypanosomiasis (Head wear) can be an essential vector-borne pathogen. The Globe Health Organization quotes that a lot more than 50 million folks are in danger for the condition, which takes place focally, in remote control regions, and regularly reaches epidemic amounts. Untreated HAT is certainly always fatal, as well as the obtainable drugs bargain toxicity and rising resistance. The just secure treatment for late-stage disease can be an inhibitor of an important metabolic pathway that’s mixed up in synthesis of little organic cations termed polyamines. Within this paper, we make use of genetic methods to demonstrate the way the parasite regulates this important PCI-24781 metabolic pathway. By modulating the proteins degrees of a trypanosome-specific activator of polyamine biosynthesis, the parasite is rolling out a mechanism to modify pathway result. We also demonstrate that pathway PCI-24781 activator is vital to parasite growth. Our data fortify the genetic and chemical validation of an integral enzyme within this pathway being a drug target in the parasite, plus they provide new insight into parasite-specific approaches that might be used to create novel drugs from this deadly disease. Introduction Human African trypanosomiasis is a neglected disease of sub-Saharan Africa due to the protozoan parasite and also have been reported for many from the polyamine and trypanothione biosynthetic enzymes demonstrating they are needed for growth C. Genetic studies never have been reported for AdoMetDC, however several promising trials show that AdoMetDC inhibitors cure infections in mice, providing chemical evidence that AdoMetDC can be an important drug target from this pathogen ,. Open in another window Figure 1 The polyamine biosynthetic pathway in will not may actually encode the genes for antizyme nor for the trunk conversion of polyamines, and it lacks the overall transcriptional control mechanisms within other eukaryotes , leaving open the question of how polyamines are regulated in the parasite. Recently, we found that AdoMetDC is activated 1,200-fold (on kcat) by dimerization having a catalytically dead paralog we termed prozyme . This mechanism for controlling AdoMetDC activity is exclusive towards the trypanosomatid parasites, as well as the finding raised the chance that regulation of prozyme expression could give a parasite-specific Rabbit Polyclonal to CDC25A mechanism to regulate polyamine homeostasis in trypanosomatids. To be able to study the prospect of AdoMetDC or prozyme to operate as regulators in polyamine biosynthesis we utilized RNA interference (RNAi) or regulated knockout approaches in blood form parasites to deplete the cells of the proteins. Lack of AdoMetDC or prozyme leads to decreases in spermidine and trypanothione also to cell death. A big compensatory induction in the expression degrees of prozyme and ODC was observed after either genetic depletion or chemical inhibition of AdoMetDC. Our data support a translational control mechanism for the regulation of the proteins plus they supply the first demonstration that polyamine biosynthesis is regulated in parasites, we generated a well balanced cell line with an inducible AdoMetDC targeted RNAi. This line contains a tetracycline (Tet) inducible stem-loop vector with 620 bp fragments of AdoMetDC in opposite orientations built-into the rRNA gene locus (Figure S1). Addition of Tet leads to production of the double stranded stem-loop RNA targeting AdoMetDC mRNA for degradation. Uninduced AdoMetDC RNAi cells grew at the same rate as the parent 90-13 cells (data not shown). Induction from the AdoMetDC RNAi (+Tet) leads to a decrease in AdoMetDC protein that was maintained before cells die (Figure PCI-24781 2A and 2B). Cell growth arrest was observed within 4 days of induction, accompanied by cell death (day 11). Exogenous spermidine (0.1 mM) restored normal growth towards the induced cells, demonstrating the AdoMetDC RNAi specifically targeted spermidine biosynthesis (Figure 2A). Open in another window Figure 2 The consequences of AdoMetDC knockdown by RNAi on blood form was evaluated from the generation of the prozyme conditional knock out (cKO) cell line. is a diploid organism, thus to create the KO line the first prozyme allele was replaced with T7 polymerase and a G418 selectable marker, a Tet responsive FLAG-tagged prozyme gene was built-into the rRNA locus, and lastly the next prozyme allele was.
Using a mix of wild-type (WT) and caveolin-2 (Cav-2) knockout along with retroviral reexpression approaches, we offer the data for the negative role of Cav-2 in regulating anti-proliferative function and signaling of changing growth matter (TGF-) in endothelial cells (ECs). evidenced by three unbiased proliferation assays: 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT), cell count number, and bromodeoxyuridine incorporation and correlated with a lack of TGF–mediated upregulation of cell routine inhibitor Rabbit polyclonal to PAI-3 p27 and following Rebastinib reduced amount of the degrees of hyperphosphorylated (inactive) type of the retinoblastoma protein in Cav-2 reexpressing ECs. Mechanistically, Cav-2 inhibits anti-proliferative action of TGF- by suppressing Alk5-Smad2/3 pathway manifested by reduced magnitude and amount of TGF–induced Smad2/3 phosphorylation aswell as activation of activin receptor-like kinase-5 (Alk5)-Smad2/3 target genes plasminogen activator inhibitor-1 and collagen type I in Cav-2-positive ECs. Expression of Cav-2 will not may actually significantly change targeting of TGF- receptors I and Smad2/3 to caveolar and lipid raft microdomains as dependant on sucrose fractionation gradient. Overall, the negative regulation of TGF- signaling and function by Cav-2 is independent of Cav-1 expression levels and isn’t due to changing targeting of Cav-1 protein to plasma membrane lipid raft/caveolar domains. (56, 57) and (4). Cav-2 in addition has been proven to modify endocytosis and trafficking from the M1 muscarinic receptor in Madin-Darby canine kidney cells (45) and apical lipid trafficking in the intestine of (35). Addititionally there is evidence for a job of Cav-2 in regulating proliferation and STAT3 signaling in rat fibroblast cell line Hirc-B (19, 21, 22). Recently, we’ve shown that Cav-2 also regulates proliferation in lung ECs (55). Transforming growth factor- (TGF-) is a multifunctional dimeric polypeptide growth factor with the capacity of regulating proliferation, differentiation, migration, extracellular matrix production, and survival of varied cell types. Cell responses to TGF- are mediated through specific transmembrane type I and type II Ser/Thr kinase receptors (26, 48). The signaling pathway is set up by TGF- binding towards the TGF- type II receptor (TR-II). Upon ligand binding, TR-II recruits and phosphorylates TR-I, also called activin receptor-like kinase (Alk), which transduces the signal towards the nucleus through members from the Smad family (16, 28). Most cell types express a kind of TR-I referred to as Alk5. ECs also coexpress yet another TR-I referred to as Alk1. Interestingly, activated Alk5 induces the phosphorylation of Smad2 and Smad3, whereas activated Alk1 has been proven to induce the phosphorylation of Smad1 and Smad5 (10, 32, 33). The results caused by the activation of the two major Smad-mediated signaling pathways differs. The activation of Alk5-Smad2/3 pathway leads to inhibition of cell proliferation and it is associated with an adult endothelium with an increase of expression of genes such as for example plasminogen activator inhibitor-1 (PAI-1), collagen type I (Col 1), or fibronectin. Conversely, Alk1-Smad1/5 activates cell proliferation and migration and it is more linked to the angiogenic state using the expression of inhibitor of DNA binding 1 (Id-1) and endoglin, amongst others (3, 9, 11, 54). There are many reports suggesting that some the different parts of TGF- signaling could localize to caveolae or connect to Cav-1 (6). However, no data linking Cav-2 to TGF- signaling and function can be found. Thus the purpose of today’s study was to determine whether Cav-2 expression regulates TGF–mediated signaling and function in ECs. We’ve centered on EC proliferation since it is vital for angiogenesis and may be regulated by TGF-. Our data claim that Cav-2 negatively regulates TGF–Alk5-Smad 2/3 pathway manifested from the reduced amount of an anti-proliferative aftereffect of TGF- in ECs. Since both Cav-2 and TGF- functions are cell/tissue and context specific, our data should help further advance knowledge of the mechanistic basics of the specificity. MATERIALS AND METHODS Antibodies and reagents. Antibodies against total Cav-2, Cav-1, and Hsp-90 were from BD Transduction. Phospho-serine 23-Cav-2 antibody once was generated and characterized for immunofluorescence staining inside our laboratory (47). Antibodies to cdk inhibitor p27Kip1 and total Smad1/5/8 were from Santa Cruz Biotech. Phospho- and total Smad2 and 3, phospho-Smad1/5/8, phospho-(serine 780) Rb, Rebastinib phospho-(threonine 202/tyrosine 204) ERK1/2, total ERK1/2, phospho-Akt, and total Akt were from Cell Signaling Biotech. TGF-1 was from Peprotech, and SB-505124 (SB-5), an inhibitor of Alk4/5/7 (13), was from Sigma. Cells. Mouse lung endothelial cells (MLECs) were isolated from 2- to 3-wk-old wild-type (WT) and Cav-2 KO mice as previously described (55). Usage of animals because of this study was approved by the University of Missouri as well as the Thomas Jefferson University Animal Care and Use Committees. Briefly, mice were euthanized with an overdose of ketamine-xylazine, as well as the lungs were Rebastinib excised, minced, and digested with 0.1% collagenase in RPMI medium. The digest was homogenized by passing multiple times through a 14-gauge needle, filtered through 70-m cell strainers, as well as the cell suspension plated on 0.1% gelatin-coated dishes. After 2-3 3 days, cells were immortalized by two rounds of infection with retrovirus encoding the polyoma middle T antigen. Cells were permitted to recover for 24 h, and MLECs were isolated by immunoselection with PECAM-1-conjugated magnetic beads. When cells reached confluence, another round. | 2019-04-26T00:54:56Z | http://a-443654.com/category/blogging/ |
JINING, Shandong - A statue highlighting an upcoming dialogue between the world's two predominant civilizations, Confucianism and Christianity, is to be erected in the birthplace of China's great philosopher, Confucius, as a monument to the Chinese people's growing initiatives in the new century to engage with overseas civilizations.
Zhang Xiao'an, vice-president of the United Nations Association of China, called the monument "a new landmark" in the Nishan Mountain, the Confucian holy land boasting ancient cultural heritage sites under state protection such as the Confucius Temple and Nishan Academy. He made the comments while speaking at a press conference here on Saturday.
Some 35 kilometers to the southeast of Qufu in East China's Shandong province, the mountain will be the venue for the opening ceremony of the first Nishan Forum on World Civilization on Monday (September 27, 2010), morning.
Zhang said that domestic and overseas scholars would draw upon the wisdom of ancient sages Confucius and Jesus, who lived more than 2,000 years ago, to broaden the possibilities for peaceful solutions of daily living issues while the forum will climax with the issue of the Nishan Declaration of Harmony.
"The declaration will be the first of its kind on human harmony in the world and a significant achievement of the first Nishan forum," said the executive director of the Presidium of the Forum's Organization Committee.
According to Zhang, the monument, about 9.6 meters long and 1.5 meters high, will be unveiled Monday morning in the square at the Shengyuan Academy of Nishan, where Robert Schuller, the Crystal Cathedral's founding pastor from California, USA, will open the forum's first dialogue with Chinese scholars to discuss human crisis and dialogue between civilizations.
On Wednesday (September 29, 2010), more than 170 people, including former national leaders of Indonesia and Hungary, local Confucian scholars, Buddhists, Taoists as well as more than 30 foreign scholars and Christian personalities from the United States, the United Kingdom, Germany, Italy, Australia, Japan, the Republic of Korea and Thailand, will exchange thoughts during 14 topical seminars to explore the way toward a harmonious world with diversified cultures.
With its preparation work started almost three years ago, the forum crystallized the initiatives of the Chinese people to facilitate the communications between civilizations at a significant historical period, Zhang said.
To call on the world to quicken the rapprochement of cultures, secretary-general of the United Nations Ban Ki-moon warned in a message to the world earlier this year that the globe was beset by prejudice, hatred and unresolved challenges.
"Often, extremists demonize other cultures and traditions, and target them for violence. And at this time of economic turmoil, when there are fewer jobs to go around, people often blame minorities," said Ban Ki-moon. Zhang said that the forum was "a solemn commitment of China in fulfilling the UN's initiative to facilitate dialogues among civilizations".
"In this academic, non-governmental, open and international event, participants are welcome to share their disparities and utter different voices," said Zhang.
In one seminar, for instance, participants are expected to explore alternative solutions under the influence of Confucianism-Christianity dialogues.
According to the schedule, participants are also encouraged to examine the moral deficiency, excessive material desires and other pernicious habits in the two civilized cultures which run counter to ancient sages' doctrines and brainstorm on how to enhance human flourishing for the world's six billion population in peace and harmony.
Dwight N. Hopkins, professor of theology at the University of Chicago, passionately examined the common points between Confucianism and Christian civilizations in his thesis. "To understand the tradition of the West, one must engage Christianity. Likewise, to appreciate the rich heritage of China, one is obligated to take seriously the way of life of Confucianism...At the dawn of the 21st century, we have ample ethical and cultural resources from the East and the West to forge together a more peaceful, prosperous, and harmonious world," he wrote.
Many thanks for your very valuable information that I published under the title "China’s Leadership in World Harmony 2010" on our site "Peace from Harmony": . It confirms once again that China, since 2006, with the proclamation of building a harmonious society in the country, holds the position of global leader in world harmony, and now aims for harmony of Christian and Chinese (Confucian) civilizations, i.e, almost for the two-thirds of humanity. Chinese Harmony Forum September 27-29 is another fact of a birth of a harmonious civilization. This Forum was ahead the Forum in Astana, which has the same focus on the harmonious civilization and its new spiritual culture. But both of those forums are the necessary steps of becoming a harmonious civilization, which moves in different ways towards one common goal of global social harmony. GHA can only admire these facts, which confirm our prediction for this civilization and for a new historical trend of global harmonization. We all see that such events are increasing with the acceleration of a snowball. In it appears rapid growth of a harmonious civilization, born in 2009 on the GHA definition.
Of course, a great pity that the Chinese organizers of the Nishan Forum do not know GHA and its "Universal Declaration of Harmonious Civilization" 2009 (http://www.peacefromharmony.org/?cat=en_c&key=383), which is the first declaration of "human harmony in the world." Therefore, the Declaration of Nishan Forum is the second after the GHA Declaration (July 2009).
Could you please send this information to the organizers of the Nishan Forum? Or: could you tell me of email Zhang Xiao'an, vice-president of the United Nations Association of China? We would be very grateful for this information. This will allow the Chinese Forum of Harmony to enrich by the GHA projects of global harmony.
I am very guilty before you, that I detained my response you on 12 days. Please, excuse me. It was very difficult time for me: I was fully engaged in preparation and discussion with my foreign friends (more than 200) the Statutes of new International organization, which we create: Global Harmony Association. Besides I was sick. I also much thought how to make your page on our site.
Recently I received from you a delightful gift with a kit of materials about your unique troupe. I looked one and with the wife and with my friends your brilliant books and disks. All of us were in delight from creativity of your incomparable, sole in the world troupe. I very highly appreciate your work and very grateful you for your generous gift and for your kind words. I am also very grateful you for the invitation to visit troupe, but in December and January I can not on many reasons: operation of the wife, a lot of work on the site and with the new Association etc. I hope I can visit you later, if you invite us with the wife.
I shall be happy to cooperate with you. I am admired with aspiration of China, including your troupe, to a harmonious society. We share with you one aspiration to this society, to which I devoted my international site "Peace from Harmony" (www.peacefromharmony.org) and which for three years united more than 240 scientists and artists from 39 countries of the world and is published in 17 languages. I am 66, the social philosopher, who devoted to scientific understanding of harmony more than 30 years. My mission is collection from all world of the information about harmony and its synthesis in my books and on the site to make harmony accessible for children and youth of the world.
Now let my concrete offers and actions, on which you inspired me.
1. I shall publish on our site your three minute video-roller with the reference to your site: www.mydream.org.cn and your email: [email protected]. Do you permit it?
2. I shall publish on our site main page in a line of varying images of harmony your Tai Lihua with 42 hands.
3. I want to create on our site a separate page of your troupe with such about title: "Liu Xiaocheng: harmonious society of the children disabled troupe in China". This title is your excellent words from your letter: "the disabled children in the troupe where I feel harmonious society". But you can edit this title, change it, add in it the names of your chiefs: Wang Honghai or Pufang Deng or Jigang Zhang (I am do not mistaken?) etc. I shall welcome all your changes. But I want that in it my two favourite words were kept: harmony and children. on this page I want to publish some texts and photos from your brochure: "Welcome to our beautiful world with disabilities. My dream." Do you permit to publish it on our site? I shall do it at first in English, and then we can make this page in other languages of our site. As you understand it is the very large and laborious work, which will require the help of many assistants and translators. The creation of the English page, which should not be translated, will require the USD400-700. Translation it on other languages: Russian, French, Spanish etc. will require in addition the USD200-500. The prices for translation of different languages are different. In Russia the translation price of a standard page (1800 marks with blanks) change in limits from 20 up to 40 USdollars.
4. I want to offer you (your Federation and/or your Troupe) in future (in the beginning of the next year) to become co-founder of the Global Harmony Association, which first project will be creation of the World Academy of Harmony. In it you could create the Department with such approximate title: "Harmonious art troupe for the disabled children/youth of the world". For each country of the world you could prepare on one troupe, similar to you, for the appropriate payment of governments of these countries. If you are interested with this idea, I could send you the Statutes of our Association and in more details discuss the project of Academy in the future.
5. If the cooperation with our Association is interesting for you I offer you enter its Board.
6. If you want, I could help you to bring your remarkable troupe in St.-Petersburg on the concert tour.
I have some more offers of cooperation for you, but let while to be limited by these.
Please, look our site: www.peacefromharmony.org and the page about Beijing Cultural Forum, on which I was in July 2007: http://www.peacefromharmony.org/?cat=en_c&key=295.
Thank you for your prompt reply. I am a man of efficiency. I have not thought that you replied so quickly. I really appreciate you and thank you very much.
I really appreciate the idea of harmony in your book. We have the common wish to pursue a harmonious society. We would like to cooperate with you in this aspect.
We will send you a kit of materials of our troupe for your better understanding us, including a DVD of our film which has not been publicly distributed (note: please do not link it to internet), some books in English, Chinese and Japanese. We will produce new books at the end of this year.
I am 63. I used to be the leader of Ministerial level in charge of the work for disabled people in China. I quitted the job and began to stay with the disabled children in the troupe where I feel harmonious society. The aim of our troupe is to let more and more people understand the human diversity.
We would like you to open a separate page for us in you website. Please send us your website address for our reference. Could you please tell us how much it will cost for translation, say how much per thousand words?
If you are have time after December 5th, we welcome you to visit our troupe. We provide you the accommodation.
Thank you very much for your kind response. I looked your wonderful site and admired as in China the disabled people are capable to build the harmonious and happy world. I am very grateful you for your great contribution to harmony of the world. I shall be happy to publish on our site your 3 minute clip of your film My Dream and link your site to our site.
We also could open for you separate page with text translation on Russian and other languages of our site (our site is published in 17 languages). But this very large work of our experts, which require payments. If you have opportunity of its payment, we could discuss this question separately.
My Address: Dr Leo Semashko, 7/4-42 Ho-Shi-Min Street, St. Petersburg 194356, Russia.
I am writing on behalf of Ms. Rosa Dalmiglio. We are China Disabled People’s Performing Art Troupe.
Yesterday, Ms. Rosa Dalmiglio visited our troupe and introduced you, your achievement, and your website and presented your books to Mr. Liu Xiaocheng, the Adviser of our troupe, and other leaders in the troupe.
We fully support your career for harmony for the world. If we have opportunity, we would like to involve in the career.
If you want to know more about us, please visit our website www.mydream.org.cn . You may link our website to your website.
Rosa told us you hope to put some visual materials on your website. We can provide you a 3minute clip of our film My Dream co-produced by China Disabled People’s Performing Art Troupe and Beijing Film Academy.
We want to send you some materials from our side by post. Please give us your postal address and telephone number.
The letter written by Rosa is attacged.
China Disabled People’s Performing Art Troupe.
Already in 2005 helping to promote world peace, China introduced the concept of the "harmony of society" to law professionals from more than 60 countries attending an international law conference in Beijing.
More than 1,500 delegates gathered in the past two days for the 22nd Congress on the Law of the World. A new session will start today in Shanghai.
The theme of the congress is known as "The Rule of Law and Harmony of International Society," which was suggested by Chinese delegates, according to Xiao Yang, chief grand judge of China.
Xiao said that China advocates harmony of the international society in order to safeguard peace in the world.
Harmony is the precondition and basis for peace, while conflicts and disputes will occur with the lack of harmony, said Xiao, also president of the Supreme People's Court.
Chinese have been familiar with the concept of "harmony of society" since the Communist Party of China introduced the phrase last fall.
President Hu Jintao described a harmonious society as one featuring fairness, justice, and democracy, rule of law, stability and vigour.
Realizing the rule of law in the world and building a harmonious international society should depend on the joint efforts of the legal professionals, said Xiao.
Since the mid 1980’s, the issue of community construction in China has been put on the agenda for governments of various levels. The shift from community service to community construction witness the development of community management as well as the Chinese social reform. The harmonious community construction has become the cornerstone for social reform, and also an important practice to Chinese harmonious society. In the future social and economic frame, the grass-root level self-government organizations, community organizations, social organizations will contribute to most nongovernmental, nonprofit social institutions. Neither is it a sheer governmental behavior, nor is a sheer civil activity. The community construction consists of various community actors and community forces. The process is a trinity of the government, nongovernmental organizations and the residents. The nongovernmental organizations, especially the voluntary and self-governmental organizations, will promote the participatory democracy in the community management. The cultivation of nongovernmental organizations and the self-governmental institutions would be translated into the future government management pattern of Chinese society.
Since the mid 1980’s, the issue of community construction in China has been put on the agenda for governments of various levels. Since 1996, most of the large cities in China have witnessed an extraordinary fashion of community construction, which is followed by a relatively amazing passion. The Shanghai Municipal Government, which acted as the bull werther, put forward the reform scenario concluded as “Bi-level government with tri-level administration” in the Shanghai Municipal City Work Meeting, and later that scenario was readjusted as “Bi-level government with tri-level administration and quadruple-level networks” in 1998, therefore, Shanghai initiated the reform of the city administration system. In the end of 1998, Beijing and Guangzhou put the assumption that the work of neighborhood administration system was the essential issue for the promotion of the city administration by modern means . Both the community service in the elementary period and the community construction of the present period reveal the deepening of our comprehension of the community issue in China, as well as that of the social reform in China. The construction of harmonious community should be linked with the social reform in China. At present, the harmonious community construction has functioned as the starting point of the general social reform in China, even an important move towards the construction of a harmonious society in China. In Hu Jie’s points of view, community is the basic organizational form of civil society, which includes three meanings : first of all, community is the structural base for civil society, and locality is an important feature of a community, but the common value views are crucial to a community, which has raised so much attention gradually, only to lead the emergence of spiritual community and mental community, such as associations and league. From this point, civil society is composed of communities of various forms. Second, community is the origin of energy for civil society; on the contrary, work unit is the basic organizational form in the traditional planned economy society in China. In civil society, work unit has gradually transformed into as a workplace, only to make the position of a community more and more obvious. The entire citizen activities operate in the society level, and a citizen’s interests is liked to the community closely. In addition, community is an important political resource for the civil society. In civil society, community woks as the footstone for the regime construction, therefore, becomes an important part of the state regime frame. The competition and development of various political forces embark on from the community.
The major work areas for the NGOs are social grass roots, to serve the common people, esp. the social groups in disadvantage, therefore, the self-help commonalties and community organizations will become the most important relying forces for the common people. Both the self-help commonalties and community organizations are non-profit organizations, therefore, they share the similarity with the NGOs in this point. Since the 1990’s, along with the deepening of China’s reform and open-up as well as the gradual expanding of the social and economic activities, there has emerged a more and more urgent need for both the self-help commonalties and community organizations, which were established one by one automatically or guided and supported by the government. In the future social and economic system frame in China, self-help commonalties, community organizations and social organizations will be the important organizational forms of a non-governmental and non-profit social system . The reform and open-up enhance the democratization process of social administration, only to provide the community organizations with a more and more important in the management and administration of the social public affairs, displaying more and more powerful vitality. The upsurge of the harmonious community construction is the first wakeup of a democratic, independent and autonomous participation into the administration for the city people in China. The consequence of the call for self-interests is as follows: after the shift from work unit to individual in terms of interest actor, the shift from tradition to modernity in terms of cities, and the shift from control to service in terms of administration, the government will transform itself actively to seek after the new conjunctive point among work unit, citizen and government. The government will give more and more power to those communities that are liked to the citizens more closely, and readjust the city administration system actively. The emerging “citizens” and “citizenship” in the cities make the real sense. The individuals that detached from the work unit come to express their concerns over the municipal issues related to their individual interests. At the grass-root level, the “civil society organizations” has emerged as the cluster of individual’s comprehensive interests. At the medium level, government-background NGOs evolved from the neighborhood committees and street offices are organizing all kinds of activities, providing all sorts of services and setting the norm for the appropriate behavior by strengthening the interactions and mutual help between individual citizen, to cultivate the modern citizen awareness such as participation, environmental protection, and common virtues .
The harmonious community construction is neither a simple governmental action nor a simple civil activity; rather it is a process which involves various community actors and community forces. In the whole process of the harmonious community construction, government, the NGOs and residents are a trinity, which is combined to closely to separate from it. The government will operate the macro leading of the harmonious community construction, and set up the plans for it; the NGOs will act as the runner and organizer for the harmonious community construction, working as a bridge between the government and the residents, which are the important carrier to separate the government from the public affairs; the residents are the base for the harmonious community construction, and their wills are the fundamental driving force for the enhancement of harmonious community construction. In the harmonious community construction, the NGOs’ participation into the community affairs can facilitate the development towards modernization and professionalization for the harmonious community construction; it also can realize the NGOs’ functions fully to encourage the residents to participate into the distribution of the community resources and construct it hand by hand. The NGOs’ participation into the community affairs, esp. the development of those voluntary and self-rule organizations, provides a practical approach for the broadening of the resident participation and the promotion of democratic politics in community administration .
Along with the reform in fields such as enterprise system, housing system, social security system and medical care system gradually in China, the interests have been separated from the their work units for most of the resident, rather these systems are more and more professional. The residents’ committees and villagers’ committees established among urban and rural residents are typical Chinese community organizations. In terms of public security, environment and sanitation, the reconciliation of conflicts and disputes, family plan, and the administration of the migrant residents, the community enjoys an advantage rather than the government. The community members participate into the cultural, medical, sports and sciences activities in the community, advocate a civilized and healthy lifestyle, and construct the community culture, therefore, they are the most important relying factors for the spiritual culture construction. Based on the common needs, with the characteristics of self-administration, self-development, and self-service, the members of these communities manage the community affairs by means of the social groups, the NGOs and volunteer’s organizations within these communities, which displaying the features of by all members, for all members, and of all members. With the promotion of the citizens’ capability to manage the social affairs, the tight tensions between governments and the public because of the complex public affairs can be mitigated. The construction and development of the harmonious community facilitate the promotion of the residents’ life quality, encourage the members to help each other, strengthen the defense and management abilities of the community, and nurture the community sense and social responsibility. In those countries with mature community development, the governmental administration is relatively neutral. Governments set up the policies and rules for the community development, while the administration within the community itself is exercised by itself . The harmonious community construction provides the construction of civil society in China with a fine opportunity. The fundamental target for the community construction is to establish modern civil society; viz. the skeleton administration form in cities in China conformed to the democratic politics and market economy system. In addition to the governmental forces in the harmonious community construction, a powerful civil society is needed to shoulder the enormous social affairs, which can promote the development of the Chinese society and encourage the city community in China to realize self-rule gradually . The development of civil society in China is a long and hard process, and there is a long way ahead. But starting with the NGOs’ participation into the community affairs, there is no denying the fact that the harmonious community construction in China is a perfect cut-in point into the construction of civil society in China.
Meanwhile, civil society will pay much attention to the harmonious community construction. The organization, system and ideas of civil society are necessary to the harmonious community construction, and will put positive influences upon it. The NGOs, as the nuclear elements in civil society, can play an important role in the harmonious community construction.
The connotation of the harmonious community construction is the withdrawal of government forces from the communities. The government consciously cultivates all kinds of community organizations to shoulder the responsibility of community management, which are civil-society-based and self-governing. From the reform and change within the city community administration forms, we can conclude that in the market economy system, the city governments should realized the importance of civil society rather than get out of the social affairs or leave all of these affairs to market, esp. in the condition of the wakeup of the citizens in China. Under the condition that the governments respect the citizens’ interests, they should link the interests of various parties together to establish an organized and systematic community administration network and diverse cooperative partnership relations, so that we can set up a new democratic community administration form. Then we can combine various interests groups together along with the sought for community interests. In the process of a new readjustment and combination, governments can exercise its guidance, reconciliation, organization and service by those media groups’ participation into the communities to realize the community reconstruction, by means of the separating government from public affairs and the separating government from social affairs .
According to Juergen Habermas, the healthy development of the autonomous and non-political social organisms is the way to get out of the legitimacy crisis for the contemporary capitalist countries. In some sense, that means the re-design of a society. Habermas’ scenario to cure the legitimacy crisis for the contemporary capitalist countries enlightens the project of civil society in China. The construction of a civil society in China is an interactive process between the state and the civil society. on one hand, the state should withdraw from the social, economic fields to change the government function along with its headway for reform; on the other hand, the social actors should take the advantage of the reform, organize the NGOs, and press ahead the construction of civil society from the bottom. This process rushes into the economic field at first and then gradually into the public fields. The social members participate into and influence the state decision-making with the assistance of the NGOs, and develop a benign dynamic relation with the state . The combination between the NGOs’ participation into the community affairs and the civil society will push the social reforms in China effectively, and these two factors will supplement each other and facilitate each other mutually. The democratization process in China will have to start from the grass roots, therefore, the democracy construction in the residents’ committees and villagers’ committees established among urban and rural residents are grassroots democracy and grassroots politics with China’s characteristics, which displays profound meanings for the social development in China. We must pay enough attention to the western countries’ social experiences. In the western market economy society, generally speaking, there is no community government, but the community is the base for the state regime and the basic work unit for the state politics. Therefore, each political force pays much attention to the unique but indispensable political resources within the communities. The NGOs’ participation into the harmonious community construction will provide China’s political from-bottom-to-top reform with a special notion. The comprehensive public social participation is the essence for civil society and harmonious community construction, as well as one of its terminal aims. The harmonious community construction can promote the participation passion among the general public, realize the self-rule of the communities through the comprehensive participation of the public, facilitate the harmonious community construction in turn, and enhance the establishment and development of civil society to play a positive role in China’s social reforms .
The vitalization of civil society brings many influences to China’s social, political and economic life, changes the condition of social administration to some extent, improves the good administration of the society, and is very important for the citizen’s political participation, political publicity, self-rule, probity and effectiveness, and the democratization and scientification. Game theory proposes that everybody can enjoy the public goods such as pure air and secure neighborhood, regardless of their contribution. Therefore, generally speaking, nobody has the intention to provide the public goods of this kind, only to find that few people are likely to produce them . This is the paradox within a collective act, which takes the meaning that non-cooperation is a kind of balance faced with public goods. Through the case study of community autonomous administration in Haishu District, Ningbo City, Chen Weidong and Li Xueping reveal the reciprocal actions among the residents and public goods resulting from their cooperation can overcome the paradox of collective act, which is the major meaning of community administration and the essence of civil society. To transcend the paradox of collective action go to the heart of community governance and civil society. The essence of pure democracy and civil society is the process of voluntary organization, constant bargaining, majority decision or unanimous agreement, representative implantation, mutual supervision and arbitrament. The community governance structure is a new civic participatory network in which the trust and cooperation are co-related to the network density . From the perspective of economics, market mechanism is the best one to provide the private goods, while the public goods should be provided by the public organizations. In certain sense, a well-developed social media system can promote the state act, civil society and market economy to develop into a benign dynamic relationship. In short, that social media system is a kind of public good . As a democratization practice to participate into the civil society and a systemic institution to curb the excessive expansion of state power, the NGOs have to participate into the community affairs through the participation and influences of the educated group, under the previous condition, it’s possible for us to make the real moral community come into existence, which has been fully revealed in modern democratic societies .
The development of the NGOs is under the particular historical and social context, and the diversification of interest bodies is an important base upon which the original system begin to change and the NGOs emerge from and develop in. In recent years, China has seen many autonomous and spontaneous right-defending and participation activities, which reveal the growing of civil society in China, and the strengthening of the public’s autonomy and self-rule view. A newly-adjusted interest relation has come into being, which is guided by the semi-executive mechanism, realized by the community administration and service institutions, and composed of the enterprises and governmental work units, social groups, as well as the individual resident. But the particularity of the Chinese social transition determines that the Chinese civil society should be different from the western road and style. With a short history, the Chinese civil society encounters many problems, both in the political and economic environment it exists and its internal structure and functions. In accordance with the review on the “civil society” emerging from the contemporary economic reforms in China carried out by Gordon White in 1993, the NGOs in China maintains at the elementary period. Rather than the big amount of the NGOs, they can’t function as the principal part of social administration, as a result of the prevailing executive feature, unhealthy mechanism, innormative service, low quality of the members, poor external supervision. Therefore, it’s necessary for us to reshape the current social administration form in which the government and society are combined closely and complexly. In addition, it’s also necessary to define the essence, goal, function, obligation, power and interest of the NGOs.
Although the emergence of civil society is an autonomous process of molding, it needs the active fostering by the political countries, especially for those underdeveloped market-driven society. on one side, the government should keep in touch with the public, give ear to their voices in the decision making process to minimize the gap between public need and the government capacity; on the other side, the government should control the participation in case of participation explosion in the political system. The development of NGOs is a good option because it could not only give public voices but also integrate the participation enthusiasm. It’s necessary for the government to broaden the channels to participate into the political life for the citizens, create favorable conditions for the development of the NGOs (e.g. the NGOs’ participation into the administration of public affairs), and assist the NGOs (human resources, goods) and guide their development in the proper time; but in a mature time, government should get out of the operation of the NGOs voluntarily in case of the NGOs’ excessive reliance upon the government, which may lead to the governmentalization of the non-governmental organizations; government should supervise the NGOs’ action, and enrich the operation means and functional mechanism of the NGOs; it’s urgent to perfect the laws, enhance the legislation on the NGOs, and clarify the NGOs’ obligations and standard operation forms to make them shoulder the relevant responsibilities resulting from their illegal actions. In addition, the government had better establish a system of laws and rules about the NGOs, to make sure that they administer the public affairs and serve the communities in accordance with the laws . The development and improvement of the NGOs in China needs both the gradual maturity of the civil society and the gradual development of market economy; it also needs both the active fostering and guidance and the generous support and participation from the general public. As a kind of organization with obvious voluntarity, self-rule and non-profitability, the NGOs can only rely on the society and the individuals. Therefore, in order to maintain a longtime development, the NGOs should establish and develop civil society beyond the states and markets. The NGOs express the will of the public, reveal the interests of citizens and invite opportunities for participation, the development of NGOs is sure to get the public support, including economic support. The fostering of civil society promotes the capability of the society and the individuals to shoulder their own responsibility and exercise their own functions, to set up the base for the NGOs to obtain its economic independence .
In the market-driven society, the political state should establish the civil society actively so as to pursue the economic development and political reform at the same time, and to ensure the benign operation of the whole society. To display the effectiveness, efficiency, responsiveness and responsibility, the social administration must realize network. The so-called network administration is a three-dimensional and hierarchical administrative means in which involves various administration institutions and forces together with the readjustment of the social resources. It is not a simple and straightforward functional process of power, but an indirect and penetrative linking dynamics of multi-power, in order to obtain the effect of moistening everything with thinnish sound. What’s important is that, as the carrier of shaping the civil society in China, the NGOs should exercise their administration function when penetrating into the network. In theory, this social administration form of network consists of the interaction of three actors in three layers, in other words, the government, market organizations (enterprises), and the NGOs are all the driving forces for the melodic function and gradual development, and these three actors mobilize the political, economic and social (cultural) resources and forces by means of executive approaches, management and self-rule, to form a management system which puts influences upon the society . As an important part within the civil society, the existence and operation of the NGOs represents certain social assets, and plays a positive role in the development of the Chinese society and economy. In a society in which the NGOs are very active, both the state and market will function more effectively. The NGOs endeavor to strengthen the self-management capability of the social members, therefore, they can promote the development of civil society and realize the increment of the social assets in terms of human rights, education, governmental participation, information circulation, etc .
Along with the in-depth development of the economic globalization, and the further engagement between China and the international society, the social structure has undergone certain transformations, stratification within the classes and stratum in the Chinese society has emerged, and a diverse interest structure has come in being in the society. The civil society with the contract relationship as its medium has grown gradually; therefore, the Chinese government should pay more attention to the fostering and development of the NGOs, together with the establishment of social administration system upon the right base of the social bodies, which will be the important practice direction for the transition of the Chinese government administration mode. Through the fostering and development of the NGOs, we can realize the following targets: further reform of the government administration system and the correspondence between the governments and society; the further reform of the institutions; the promotion of the government’s ability to manage the economy, with the aim to readjust the relation between the governments and enterprises and the relation between the governments and market; full use of the NGOs’ self-management, and the strengthening of that of the society . In the process in which the state releases certain rights to the society, both the free-flowing social energy and the free-moving social space are expanding, only to realize the emergence of China’s own civil society. Although it is still very small and faced with many obstacles, its development and growth is inevitable. There are reasons to believe that with the maturity of civic awareness comes the increasing number of NGOs. The autonomous and self-government organizations will contribute to civil interest protection and civil will expression. Democratic participation, civil self-rule in addition to the privatization of the organizations will push the NGOs in the Chinese society to develop forward more and more healthily, so as to play an active role in the forging of good administration and the great goal to fulfill the overall well-off society in China.
Promote the Reform of the Street Administration System, Enhance the Modern Administration of the Cities”, Beijing Daily, December 7,1998; Guangzhou Deepens The City Administration System Reform”, Guangzhou Daily, December 29,1998.
Huang Jie, Civil Society and Community Construction, Discovery, June 2002.
Zhao Liqing, Issues on the NGOs in China, Jiangsu Social Sciences, April 2000.
Zheng Anyun, Dai Yaling,“An Assumption on the NGOs’ Roles in the Community Construction”, Journal of Humanities.
Wang Yuming,” The NGOs and their Social Administration Functions”, Journal of the Party School of the Jujian Province, July, 2001.
Zhang Lirong, Jin Honglei, Incentives to the Vitalization of the NGOs—A Bi-dimensional Perspective, Journal of Hubei Administrative College, April, 2003.
Robert Putnam, Making Democracy Work, translated by Wang Lie, Nanchang, Jiangxi People’s Publishing House, 2001, p.191.
Chen Weidong, Li Xueping, “Community Administration and The Upgrowth of the Civil Society”, Journal of the Huazhong Normal University (Arts and Social Sciences), January 2003.
Li Hengguan, Develop the NGOs and Promote the Executive Reform of the Government, March 2002.
Xiong Yueyin, “The Development of the ‘Third Sector’ in the Transitional Countries---An Analysis of China’s Reality, Sociological Studies, January 2001.
Wu Qin, Gu Wen, “The Development of the NGOs in the U.S. and its Reflections to China’s Executive Reforms”, Journal of Nanjing University of Aeronautics and Astronautics (Social Sciences), April, 2001.
Li Yongjun, Lu Jinliang, “The Vitalization of the Third Sector in the Western Nations and its Reflections to China’s Development of the Third Sector”, Chengdu Administrative College, May 2002.
Jin Jiahou, “The Social Administration Under a Transition Period: the Development Positioning and Form Projection of the Organizaitons”, Yun’nan Social Sciences, May 2003.
Zhao Liqing, Robert Putnam, Civil Society and the NGOs, The Foreign Social Sciences, January 1999.
Luo Hailin, “Develop the NGOs---An Important Step to Promote the Government Reform”, Journal of Anhui Institute of Education, May 2002. | 2019-04-25T14:15:55Z | https://peacefromharmony.org/?cat=en_c&key=273 |
Ashbury Hill Fort lies about 1 mile northwest of Week St. Mary and consists of two concentric ovals. It has diameters of approximately 150 metres on the short axis and 210 metres on the long axis. The ramparts are surrounded by an outer ditch and stand over 3 metres high. There are two entrance ways aligned NW and SE and associated earthworks about 200 metres away to the southeast.
Bake Rings Settlement Enclosure is located about a mile west of Pelynt. The circular one metre high rampart has a diameter of 90 metres with an outer ditch and dates from the Late Iron Age.
The remains of a Bronze Age cemetery on the cliffs at Newquay. Only three of the original eighteen bowl barrows remain and they are in a poor state of repair, resembling low mounds.
Berry Castle is roughly rectangular in plan lies on a hilltop about one mile northeast of St. Neot. With dimensions of 110 metres long x 82 metres wide x 1.5 metres high. Not in the best of preservation, the bank appears as a tumble of stones enclosing the sites of eight Neolithic or Early Bronze Age round houses.
Bishop's Wood Iron Age Hill Fort lies on a hillside within Idless Woods, part of St Clement Forest, just north of Truro. The oval shaped fort has diameters of 167 metres by 150 metres surrounded by a three metre high rampart. This is surrounded by a ditch some 1.5 metres deep with the ramparts cut neatly into thirds by entrances at the west, southeast and northeast sides.
Black Head Cliff Castle lies on the south Cornwall coast between Portpean and Pentewan. The finger like headland exhibits three ramparts defending the interior across its narrowest point. The Iron Age ramparts have an average height of over 5 metres and are best preserved on the eastern side.
Black Tor Round House Settlement lies on Bodmin Moor near the village of Temple. Thought to date from the Bronze Age the settlement covers a wide expanse of open moorland and encloses no fewer than 80 round houses. The houses range in size between 5m and 11m diameter, with walls on average 1 metre high. The majority of the dwellings have south or southeast-facing entrances.
Named after the legendary giant of St. Agnes, Bolster Bank is a linear earthwork dating from the 5th or 6th Century. It curves away from the town of St. Agnes passing through Bolster Farm and just to the north of Goonvrea Farm folowing the contour of St. Agnes Beacon. Originally over 2 miles long, the bank has been cut through in a number of places by modern roads and associated settlements. The earthwork attains a height of almost three and a half metres over an infilled ditch about 1 metre deep. When complete the bank is thought to have stretched all the way from Chapel Coombe to Trevaunance Coombe, encircling quite a large tract of land and would have surely been very impressive.
A pair of Bronze Age Barrows lie on the summit of Brown Willy. The northern barrow is 25 metres in diameter and stands over 3 metres high, the barrow on the southern side has a diameter of 19 metres and stands 1.8 metres high.
Burnt Hill settlement of roundhouses lies on the north coast of the Scillonian island of St. Martin's. The two low lying houses date from the Iron Age.
Bury Castle lies near Higher Treslea about one and a half miles northeast of Cardinham. This Iron Age hill fort is almost circular with a diameter in excess of 140 metres in the north-south axis. The ramparts are quite impressive, as in places they rise to about 4.3 metres.
Bury Down Iron Age Hill Fort lies in aprominent position on the western flank of a hill about 2 km north of Lanreath. The fort consists of two oval ramparts, quite widely spaced with diameters of 170m and 195m. The outer rampart is now very indistinct but the inner retains much of its original structure with a maximum height of 4.5 metres.
Sitting on top of Buzza Hill above St. Mary's Isles of Scilly, this Chambered Entrance Grave dates from the Neolithic. The cairn was one of a pair on this site, but the building of the Buzza Tower sadly obliterated its partner. The cairn, about 7 metres in diameter has an inner chamber 5.5 metres long but no visible entrance. Only one of the original capstones remains in situ.
Cadson Bury Hill Fort lies on the crest of a hill overlooking the Lynher Valley, near St. Ive. Dating from the Iron Age, the oval shaped fort has dimensions of 275 metres by 170 metres. The rampart has a height of 2 metres on the inside. The outer height of the rampart is exagerated by the slope of the hill.
The Iron Age Hill Fort of Caer Dane lies near the hamlet of Carnkief near Perranzabuloe. It lies atop a low wooded hill just east of the A3075. Roughly oval in shape, it has diameters of 100 metres by 89 metres. The outer bank achieves a height of 1.5 metres formerly surrounded by a ditch. The inner enclosure also has a rampart some 1.8 metres high with a 0.5 metre outer ditch. Both ramparts have entrances on their western side. There is no public access to the site.
Two Inscribed Stones lie close to the hamlet of Cardinham. Both are from the Post Roman era. The first lies within the churchyard and has the words 'RANOCORI FILI MESGI' written upon it. This translates from the Latin as RANOCORUS, SON OF MESGUS. The stone lies about 2 metres tall and is thought to be buried to a depth of approoximately 1.5 metres.
The second stone lies near the settlement of Welltown. The following words are inscribed along its length: 'VAILATHI FILI VROCHANI', translated as 'VAILATHUS SON OF UROCHANUS'. The Welltown stone lies 1.5 metres tall.
The remains of over 30 Bronze Age barrows lying to either side of the A30 trunk road at Carland Cross. The largest barrow known as Warren's Barrow, lies to the west of the roundabout and has a diameter of 24 metres by 1.8 metres high.
Carne Beacon, near Veryan is one of the largest Bronze Age barrows in the country. It has a diameter of about 33 metres and stands over 6 metres high. When excavated in the mid nineteenth century, a stone kist was found, containing ashes and charcoal.
Carvossa is an almost square earthwork located beside the Probus to Grampound road. It is thought to date from the Late Iron Age and to be in use at the time of the coming of the Romams.
Artifacts found at the site include products from the 'celtic' Durotriges people of Dorset as well as products from the mediterranean and Samian Ware used by the Romans.
Castilly Henge is an oval some 66 metres in its long axis. It lies beside the A391 near its junction with the A30 trunk road at Innis Downs, near Lanivet. The earthwork is surrounded by a bank 1.8 metres high and an internal ditch measuring 2.1 metres deep by 5.5 metres wide. The earthwork is aligned north south with an entrance at the northern end and is thought to date from Neolithic times.
One of Cornwall's best preserved hill forts, Castle an Dinas dates from the Iron Age and is truly outstanding. Approximately 220 metres in diameter the almost circular structure consists of twin ramparts set atop a 200 metre high hill. The impressive inner rampart is over 7 metres high and is cut in six places to fom entrance ways.
Castle Canyke Hill Fort is rather impressive. From the air it can be seen to be a slightly squashed circle, with a diameter of almost 350 metres at its greatest extent by just over 300 metres along the other axis. It is the largest hill fort in Cornwall and is in a prime location in the middle of Cornwall. The 1 metre deep ditch surrounds ramparts 3 metres high. Some sources speculate that nearby Callywith is actually the Kellywic recorded in Arthurian texts.
An Iron Age fort thought to have been built around about 200 BC and used at several times throughout its 2000 years in existence. It is situated beside a minor road about two miles north of Fowey. Almost circular, the twin ramparts reach a height of almost five metres, surrounded by an outer ditch.
Castle Dore is quite well known in Arthurian texts as it was said to be the 6th century home of King Mark of Cornwall. Where history ends and legend begins is clouded by time. There was however a King of the Dumnonii around this time known as Mark Cunomorus or Mark Cynvawr. He was the father of Tristan (Drustans) whose name appears near Fowey on an inscribed stone. The fort was also occupied to some extent during the seventeenth century in the English Civil War.
Castle Down on the north of Tresco, Isles of Scilly is an area of rough moorland and stony outcrops. Located here are no fewer than 78 cairns. The majority simply appear as lowish mounds but some retain parts of their original kerbing and structure. Traces of field boundaries complete this ancient landscape.
An Iron Age Hill Fort situated just to the northwest of Lanteglos near Camelford. The original earthwork has a diameter of roughly 80 metres and is bounded by a 0.8 metre ditch surrounding an earth rampart some 3.5 metres high. Subsequently more ramparts were added to the west of the structure but these have been largely lost over time.
Castlewich Neolithic Henge lies on a hillside about one mile southeast of Callington. It has a diameter of about 90 metres.
Chapel Down Cairn lies on the northeast coast of the Scillonian Island of St. Martin's. The site contains a prehistoric field system, a number of Bronze Age cairns, an entrance grave (chambered cairn) and a 0.6 metre high statue menhir. Close by lies remnants of a chapel dating from the 8th-10th century. The three foot stone "idol" was discovered early in the last century, lost and found again in 1989 when the bracken caught fire. Seems to be the top half of a statue-menhir similar to those found in Brittany and the Channel Islands.
Chapel Down Statue Mênhir lies on the northeastern coast of the Scillonian island of St. Martin's. Less than a metre tall, this stone 'idol' is believed to have been broken off from a larger standing stone. It was discovered early in the last century, lost and then found again in 1989 when the covering bracken caught fire. Possibly Iron Age.
Clapper of Works Chambered Cairn lies about 500 meters to the south of The Old Man of Gugh and Obadiah's Barrow. A Scillonian entrance grave, it dates from the Neolithic Age. Four capstones still remain, with the chamber apparently extending the whole 9 metre diameter of the mound. Records state that there are also two round cairns here but thay are not easily distinguished. The whole of the south end of Gugh has about 20 cairns and 2 entrance graves, the other being the Carn of Works.
Condolen Barrow dates from the Bronze Age and sits on a hill near Tintagel. The barrow has a diameter of about 26 metres and stands almost 3 metres high. A wide ditch once surrounded the barrow, traces of which remain in the present day.
Craddock Moor Stone Circle lies on Bodmin Moor almost a mile northwest of the Hurlers at Minions. The circle originally thought to number 28 stone now displays just seventeen and, all but one of these lie on the ground. There is a line of sight alignment between Craddock Moor Stone Circle, Stowe's Hill and Tregarrick Tor, indicating quite accurately the position of mid-winter sunset and midsummer sunrise.
Crowpound Enclosure stands beside a crossroads about half a mile west of St. Neot. Roughly rectangular in shape with dimensions of 52m x 40m, with the long axis aligned roughly north-south. It is hard to date accurately due to the lack of any associated archaeological evidence.
Cruther's Hill Barrow Cemetery lies near the southern coast of St. Martin's in the Isles of Scilly. The hill has three summits, with a cairn on each, aligned northwest-southeast. The northwestern barrow is the largest with a diameter of 12 metres, the central cairn has a diameter of 8 metres whilst the two conjoined cairns of the southeastern summit have diameters between 4.5 metres and 6 metres. They date from the Neolithic or wearly Bronze Age.
Located about a mile north of Cubert lies the Bronze Age Cubert Round Barrow. It has a diameter of over 30 metres and stands allmost 3 metres high.
Cubert Inscribed Stone lies built into the west wall of the church at Cubert, near Newquay. It is thought to date from the late sixth century and has the following inscription: CONETOCI FILI TEGERNOMALI - Conetocus son of Tegernomalus.
Cubert Round is an ancient circular earthwork, some 70 metres in diameter just outside of Cubert Village. The site is in a poor state of repair with the village road cutting straight through the site from northwest to southeast.
Cuby Inscribed Stone lies built into the corner of Cuby Church near Tregony in Mid Cornwall. Its inscription reads: 'NONNITA ERCILIVI RICATI TRIS FILI ERCILINCI' which is translated as 'Nonnita, Ercilius, Ricatus, the three children of Ercilincus'. The stone is thought to date from the late sixth century.
Otherwise known as 'The Rounds', Delinuth Camp Hill Fort near Camelford is an Iron Age Hill Fort. It has a diameter of about 150 metres. Its former rampart and ditch are just visible after years of plough damage.
Over 100 metres in diameter, Dingerein Castle Hill Fort is almost circular and has twin ramparts ranging between 2.7 and 3.0 metres high. Its name is thought to come from the Cornish Dyn gerens - which means castle or fort of Gerens (or Gerent). It is situated on the eastern side of the A3078 near Gerrans village.
Like most Cliff Castles, Dodman Cliff Castle makes excellent use of the landscape. The headland at Dodman Point is surrounded on three sides by the sea with its landward access across its 'neck' controlled by large earth ramparts. In some places the bank attains a height of over six metres with the total area enclosed by the rampart almost 50 acres (20 ha).
Duloe Stone Circle lies just of the B3254 in Duloe Village. This rather small monument, a squashed circle of eight stones, approximately 12 metres diameter is still quite impressive due to its dazzling stones of white quartzite. Its tallest stone is 2.7 metres in height.
Located on a flat area in the saddle of land that separates Rough Tor from Brown Willy, lies the Bronze Age Stone Circle of Fernacre. The circle consists of over fifty stones, with about two-thirds still standing. A birds eye view of Fernacre can be gained by looking southwest about threequarters of a kilometre from the summit of Rough Tor.
The four Bronze Age round barrows at Silverwell, near Chiverton Cross lie on either side of the A30 trunk road. One three metre high barrow lies to the north of the road whilst the other three, all similar in size, lie to the south.
Garrow Tor Roundhouses lie near St. Breward about 500 metres from King Arthur's Hall. Mainly on the eastern slope of the Tor, the settlement exhibits numerous round houses and field structures. Archaeological work here has provided many artifacts including pottery, beads and bangles as well as quern stones dating from the Middle to Late Bronze Age.
The Giant's Castle, at Porth Hellick lies to the east of St. Mary's airport on the southeast of the island. The headland is protected by no less than four lines of defence, the outer rampart 1 metre high, the next rampart stands 1.2 metres high whilst the third stands 1.6 metres high. The inner rampart makes full use of the terrain and has a rampart 2 metres high. Artifacts found at the site date Giant's Castle to about 300 BC - the middle of the Iron Age.
The Giant's Hedge is a massive earthwork lying between Lerryn and Looe, a distance of almost 10 miles. Sadly now broken into sections, the longest being the 5.5 miles between Lerryn and the hamlet of Muchlarnick. The earthwork is thought to date from post Roman times and may have been the boundary of an ancient tribal kingdom.
Goodaver Stone Circle lies on the top of a hill near Bolventor. Dating from the Bronze Age, it has an approximate diameter of 32 metres. Threequarters of the original stones remain upright.
Great Arthur Cairns lie on the Scillonian island of Great Arthur, part of the Eastern Isles. Situated on the top of the hill lie three entrance graves and two cairns. The entrance grave is situated on the highest point. The 7.3 metre diameter cairn has a chamber 3.6 metres long. Three of the original capstones still remain.
Situated on Great Hill at the northern end of the Scillonian island of Tean lies a Neolithic Chambered cairn measuring 7.6 metres in diameter. Its chamber, 3.3 metres long has none of its capstones remaining. Nearby lies another Chambered Cairn, 6.7 metres in diameter.
Gweal Hill Cairns lie on the Scillonian island of Bryher, just to the west of the Hell Bay Hotel. The cairns, probably dating from the Bronze Age are in a poor state of preservation and are indistinct on the ground. Nearby lies a ruined entrance grave.
lies on the northwestern coast of the Scillonian Island of St. Mary's. Thought to date from the Iron Age, Halangy Down Village lies just below the Bronze Age Bant's Carn making visiting both sites a possibility. In a picturesque position overlooking the sea, this settlement resembles the mainland village at Chysauster, near Penzance. Thought to overlay an earlier Bronze Age settlement, there is one courtyard house and other interconnected oval houses with a probable occupation period of 500 years.
Hall Rings Iron Age Hill Fort lies almost a mile northeast of Pelynt Church. Like many forts Hall Rings stands on a spur of land overlooking a valley. Not in the best state of preservation, only the southwestern section remains visible. The fort comprises two concentric rings of about 145 metres diameter, surrounded by external ditches. Lies nea to the Bake Rings Settlement enclosure.
The Iron Age Helsbury Castle Hill Fort lies just over 2 miles to the south of Camelford in North Cornwall. The fort is roughly oval in shape with its long axis being about 170 metres long. On the east side an entrance exists leading to a rectangular earthwork, also with an eastern entrance. Ramparts surrounding the fort attain a height of 4.0 metres. In the middle of the fort lie the ruins of a medieval chapel known as St. Syth's Chapel.
Hensbarrow Round Barrow lies almost two miles southeast of Roche deep in China Clay Country. It stands 312 metres up on the highest point of the surrounding land and has been used as a beacon in the past. The Bronze Age structure is quite impressive in itself, standing 5.4 metres high and with a diameter in excess of 35 metres.
Possibly one of the most well known ancient monuments in Cornwall. Situated just to the northwest of the moorland village of Minions on Bodmin Moor. Dating from the Bronze Age the three circles lie close to each other and are aligned in a NNE direction. The northernmost circle has 15 stones present out of an original 24, although four are not upright. The circle, approximately 35 metres in diameter is the most circular of the three rings.
The middle ring is less circular and has diameters varying between 41 and 43 metres. Only half of the original 29 stones remain standing.
The southernmost circle has less than a third of its 29 stones remaining in a circle of 33 metre diameter. Nearby lie the Pipers, a pair of 2 metre tall standing stones of unknown date and origin.
The are two Entrance Graves at Innisidgen overlooking Crow Sound on the northeast coast of St. Mary's, Isles of Scilly. Dating from the Bronze Age, the upper cairn is in a good state of preservation. It has an overall diameter of 8 metres with a chamber 5.5 metres long. Five capstones cover the chamber which is aligned towards the southeast, winter solstice sunrise.
Kelly Rounds also known as Castle Killibury is an Iron Age Hill Fort situated about one and a half miles northeast of Wadebridge. Roughly circular in shape, the fort has a diameter of over 220 metres. The best preserved section lies on the northern side, with ramparts up to 3.0 metres high.
Kelsey Head Cliff Castle lies on the northern section of Kelsey head near Holywell Bay. The headland is bounded by a V-shaped rampart standing 1.5 metres high with an external ditch. The rampart encloses an area of almost 2.5 acres (1 Hectare) and is appoximately 220 metres long.
King Arthur's Downs Stone Circles lies to the south east of King Arthur's Hall earthwork. This pair of Bronze Age stone circles have diameters of about 23 metres. The more complete western circle has about ten stones of which only two are still standing. The eastern ring has only six of its former stones still standing.
King Arthur's Hall is a large rectangular earthwork on Bodmin Moor. The structure, thought to date from the Neolithic, has dimnsions of 48 metres by 21 metrea and has a North-South orientation. It is best reached by footpath from St Breward.
King Doniert's Inscribed Stone lies on moorland at Redgate near St. Cleer. The walled area offers a chance to inspect the pair of stones here at your leisure. The intricately carved stones resemble parts of a tall cross: A shaft and a base. The base is inscribed DONIERT ROGAVIT PRO ANIMA which translates as 'Doniert ordered this (memorial) for (the sake of) his soul'. Doniert is thought to be synonymous with Dungarth, a 9th century king of Cornwall.
Kittern Hill on Gugh has the remains of three Neolithic chambered cairns. Not in the best state of preservation, they are still worth a visit if in the area.
Knackyboy Chambered Cairn lies near the southern coast of the Scillonian Island of St. Martin's. Situated just to the south of Middle Town, the cairn is in a poor state of preservation. Measuring over 15 metres in diameter, the cairn was first excavated in 1912 when over 200 kg of pottery including Bronze Age urns was discovered.
Lancarffe Inscribed Stone lies a mile northeast of Bodmin. Dating from the 5th or 6th century AD, the stone is part of a farm building. The inscription reads DVNOCATI HIC IACIT FILI MERCAGNI, translating as Dunocatus lies here,son of Mercagnus.
Located within the churchyard of Lanteglos by Camelford. Its Saxon inscription reads: AELSELD 7 GENERED WOHTE DYSNE SYBSTEL FOR AELWINES SOVL 7 HEYSEL which translates as 'Aelseth and Genereth wrought this memorial stone for Aelwine's soul and for themselves'. The stone dates from the 10th century.
Situated within Largin Wood on a spur of a hill above the Fowey River. It has twin ramparts and an internal diameter of about 100 metres by 70 metres. The inner rampart attains a height of almost 3 metres in places and has an entrance way on its southern side.
Near St Breward on the northwestern flanks of Bodmin Moor, Leaze Bronze Age Stone Circle lies about 250 metres southeast of King Arthur's Downs Stone Circle. Originally the circle is thought to have consisted of 22 stones, now only 14 remain in a circle with a diameter of just under 25 metres.
A pair of stone circles lying just to the west of Bolventor. The southern circle has a diameter of just over 30 metres. However, of the 22 former stones only one remains upright and that is little more than a stump. Approximately 300 metres to the northwest lies another circle with at least 18 stones still visible.
This ruined quoit or dolmen lies beside a minor road off the B3269 near Trebyan, Lanivet. Otherwise known as the Lanivet Quoit or Trebyan Quoit, the structure is recorded as fallen as early as 1858. The five metre long capstone lies propped up against an upright almost two metres tall.
Situated on Macfarland Downs, at the northern end of St. Mary's, Isles of Scilly, the Long Rock Menhir or standing stone is not immediately apparent. It lies in woodland to the east of Bant's Carn and stands 2.5 metres tall. It has been dated to the Bronze Age.
Otherwise known as the Menevegar Mnhir, this Bronze Age standing stone used to be situated on Longstone Downs, St. Austell but was moved due to the expansion plans of a china clay pit. It now stands on a green at the junction of Fore Street and Harmony Road, Roche. Its plaque states that it was moved in August 1970.
Louden Hill Stone Circle lies to the southwest of Rough Tor on the outskirts of Camelford. This Bronze Age circle lay undiscovered until the mid 1970s. Currently the circle exhibits one standing stone in a ring of sixteen fallen or broken others. Research indicates that the stone circle may have originally consisted of up to 39 stones in a roough circle of about 45 metres.
The are two Entrance Graves at Innisidgen overlooking Crow Sound on the northeast coast of St. Mary's, Isles of Scilly. The lower chamber is in a poor state of preservation. It has an oval mound of about 8 metres in diameter with just two of the original capstones remaining. The chamber is aligned facing south.
Otherwise known as Men Gurta, this standing stone, originally 5 metres high, is set in countryside in a field next to the the turbines of St. Breock Wind Farm. Access is at any reasonable time. Location: St Breock Downs, 3.75 miles SW of Wadebridge off the unclassified road to Rosenannon.
Another long stone located about 500 metres to the east at grid reference SW973683 stands 2.1 metres high on the hills of St Breock Downs. The views from this windswept spot are amazing and panoramic. The stone is made from the same felspar as Men Gurta. Further west along the Saints Way coast to coast footpath, is a barrow cemetery that is now open to the public thanks to a new access initiative.
A cairn lies on this tiny island, on the south east of the Eastern Isles, at Grid Reference SV9553 1366.
There are two entrance graves situated on the top of the hill. Quite well preserved, the northern site consists of a cairn 6.1 metres in diameter, with its chamber 4 metres in length and one metre in width. It is aligned to the southeast, to face the winter solstice sunrise.
Fifteen metres to the south lies another cairn some 3.2 metres in diameter with a chamber 2.4 metres long and 1.2 metre wide. This site was excavated in 1953 and a female skeleton was unearthed along with some pottery.
The 3 metre tall Moorgate Menhir stands in a field near the hamlet of Moorgate, southeast of Camelford. This thin granite stone is thought to be early Bronze Age.
Mount Charles Menhir lies in the grounds of School on the A3061 near St. Austell. Otherwise known as 'The Longstone', this Bronze Age granite Menhir stands 3.5 metres tall on the former Gwallon Downs prehistoric site.
Mount Flagon Mênhir or standing stone lies beside an X-shaped shipping daymark adjacent to the Tudor fortifications known as Harry's Walls above Porthmellon beach at St. Mary's, Isles of Scilly. The 2.8 metre stone is thought to have previously had a cairn surrounding it.
Nanscowe Inscribed Stone lies near Nanscowe Farm at Whitecross just west of Wadebridge. The stone stands 1.3 metres high and bears the inscription ULCAGNI FILI on one side and SEVERI on the other - translating as 'Ulcagnus son... (of) Severus' The stone dates from the 6th Century AD.
Formerly thought to have been the only Roman Fort in Cornwall, Nanstallon Roman Fort lies at Tregear Farm near Bodmin. Measuring 97 metres by 87 metres, the fort is orientated north-south. Excavated between 1965 and 1969, the fort was surrounded by ramparts and a ditch as you would expect but much of the archaeology has been obscured by modern field walls. Artifacts recovered suggest that the fort was occupied between 60-80AD.
Nine Maidens Stone Row lies on the eastern side of the A39 Atlantic Highway, just north of the Padstow roundabout at Winnard's Perch. The site was once thought to be the only stone row in Cornwall, prior to others being discovered on Bodmin Moor. As expected, the row consists of nine stones aligned southwest to northeast, with six remaining upright. The stones range in height from 1 metre to 1.9 metres although the northernmost fallen stone is 3.0 metres long. The site is aligned to a former longstone or menhir some 500 metres away to the northeast.
Nine Stones Stone Circle lies near North Hill, on the eastern flank of Bodmin Moor. The circle has a diameter of about 15 metres, its eight remaining stones ranging from 1.0 metre to 1.3 metres high. It is thought to date from the Early Bronze Age.
The Scillonian island of Nornour, lies at the northern extremity of the Eastern Isles, just to the south of St. Martin's. A settlement of roundhouses was discovered here in the 1960's and is believed to date from the middle of the Bronze Age. The site was excavated between 1968 and 1970, unearthing over 250 brooches, Roman coins, glass beads, bronze bracelets and rings amongst the 11 houses. The finds indicating a prolonged period of occupation.
There are seven cairns and nine Entrance Graves on North Hill on the northern end of the Scillonian island of Samson to the west of St. Mary's. The best preserved is an Entrance Grave, first excavated in 1930. It has a diameter of 8 metres and is 4.5 metrs in length. Its entrance faces due east the direction of the equinox sunrise.
Northwethel Entrance Grave lies on a hill on the southeast end of the Scillonian island of Northwethel. It has a diameter of 5.5 metres with a chamber 3 metres by 1.4 metres wide. Its entrance faces due east, the spring equinox sunrise.
Obadiah's Barrow is better described as a chambered cairn or entrance grave. It lies on the southwestern side of Kittern Hill on the Scillonian island of Gugh. The barrow has a diameter of 7.3 metres with a passage measuring 4.9 metres by 1.5 metres. The barrow formerly had six capstones but two have sadly fallen into the chamber. Its entrance is aligned to the southeast, where the midwinter solstice sun rises. Excavations carried out in 1901 unearthed parts of a male skeleton as well as cremated ashes and 12 inverted urns. The barrow dates from the Neolithic Age and is named after local farmer Obadiah Hicks.
The Old Man of Gugh is a Bronze Age standing stone situated about 300 metres east of Obadiah's Barrow on Gugh. The longstone or menhir stands 2.4 metres tall and leans to the northeast. The area below the stone was excavated in 1900 but nohing was found.
Situated near Doddycross, Menheniot, this Iron Age hill fort has an outer diameter of approximately 130 metres. Its ramparts and bank form a structure almost 3 metres high with a small entrance on the eastern side.
Situated two miles south east of Wadebridge, Pawton Quoit liess in a field near Haycrock Farm. Dating from the Neolithic, the Quoit or Dolmen consists of a massive capstone sitting atop nine uprights. The enclosed chamber has dimensions of 2.3 metres by 1.1 metre.
Pelynt Round Barrow Cemetery lies just to the south of Pelynt. Consisting of at least ten Bronze Age bowl barrows, there are faint traces of others discernible as crop marks from the air. The largest barrow has a diameter of 24 metres and a maximum height of 1.5 metres. Several barrows were opened in the mid-nineteenth century with finds including a greenstone axe, urn cremations, a bronze dagger and a Mycenean dagger originating in the eastern Mediterranean and dating from about 1500BC.
A 90 metre diameter central area is surrounded by a rampart approximately 3.4 metres high. Another, slightly more oval rampart surrounds this area, some 115 metres in diameter and 3.0 metres high. The whole structure is surrounded by a ditch about 1.6 metres deep.
Penhale Point Cliff Castle lies to the south of Holywell Bay in North Cornwall and is best approached along the coast path. The interior is defended by Iron Age ramparts some 2.5 metres high. To the south of the castle the structures have been obscured or obliterated by mining activities of more recent times.
Penhargard Castle lies about 2 miles north of Bodmin. The structure has a diameter of just under 90 metres at its widest point. The west of the Hill Fort lies on a steep slope overlooking the Camel Valley. Its ramparts are in relatively good preservation and range between 1.6 metres and 2.3 metres in height. They are cut by the entrance way to the southwest.
A group of eight cairns situated on Porth Hellick Downs on the east coast of St. Mary's, Isles of Scilly. The largest and best preserved of them is the 'Great Tomb', 12 metres in diameter with a 3.7 metre passage. The chamber is covered with four capstones. Its entrance is aligned to the Long Rock Menhir on Macfarland Downs. it has been dated to the Late Neolithic/Early Bronze Age period.
Prideaux Castle Hill Fort is a quadrivallate Iron Age hillfort situated atop a 133 m (435 ft) high conical hill near the southern boundary of the parish of Luxulyan. It is best reached via a footpath from a minor road leading off the A390 at St Blazey. Two of a possible three ramparts still survive surrounding the oval-shaped fort. Dimensions: 235 x 160 metres with ramparts between 1.3 and 2.7 metres high.
Rame Head Iron Age Cliff Castle lies in the far east of the county. The narrow neck of the headland displays a well defined ditch with an entrance way cut in its centre, generally though the cliff castle is in a poor state of repair. A 14th Century chapel dedicated to St. Michael lies in the middle of the headland.
Redcliff Castle, an Iron Age cliff castle overlooks Bedruthan Steps near Padstow. Two ramparts, approximately two metres high guard the headland and have associated ditches. The castle area has been reduced over the years by erosion, its original size now unknown.
Only discovered in 2007, Restormel Roman Fort lies about a quarter of a mile southwest of Restormel Castle near Lostwithiel. The fort has the usual rectangular plan surrounded by a rampart and ditch. Artifacts discovered indicate that the fort was home to Legio II Augustus throughout the Roman occupation of Britain. It measures 77 metres by 64 metres.
Resugga Castle is an almost circular Iron Age hill fort near St. Stephen. Measuring 116m by 100m, there is an entrance way on the northwest section. It is surrounded by a rampart three metres high with an external one metre deep ditch.
Rillaton Round Barrow lies on Bodmin moor about half a mile northeast of the Hurlers Stone Circle at Minions. Situated on the crest of a slope, the barrow contained a stone cist with a skeleton inside along with a ceremonial dagger. It has achieved fame as the excellent Bronze Age Rillaton Gold Cup was found here in 1818. The barrow has an approximate diameter of 37 metres and stood 2.4 metres high. A copy of the Rillaton Gold Cup can be seen in the Royal Cornwall Museum in Truro.
At Rough Tor, above Camelford lies a tor enclosue thought to date from the Bronze Age. The stones surround the twin summits of both Rough Tor and its north eastern neighbour Little Rough Tor.
Just on the western flank of Rough Tor, near Camelford lies a large concentration of Bronze Age Round Houses. The settlement runs southwards from the car park for over half a mile (1km) and contains field boundaries, pounds and numerous roundhouses making up an extensive settlement. On average the roundhouses have a diameter of approximately 4 to 6 metres and several are relatively intact.
One of the most visited Iron Age Cliff Castles in Cornwall, the Rumps near Padstow has twin headlands resembling the tail of a fish reached via a narrow neck of land protected by three distinct ramparts. The structures are thought to have been built in two phases with the Castle occupied between 400BC and 100AD.
Situated atop Samson Hill on Bryher, a ruined chamber cairn lies surrounded by ten kerb stones. Nearby, on the southern slopes of the Hill lies Works Carn. An oval shaped chambered cairn built out from the side of Samson Hill. Utilising the rock outcrop, it is revetted with large orthostats. The chamber is made from slabs set on edge with additional walling.
Shipman Head lies on the nortern end of the Scillonian island of Bryher. Quite dramatic in its own right, the headland is made more interesting by the existence of the ramparts of an Iron Age Cliff Castle. The wall just under a metre high is in the region of 5 metres thick. To the south and east of the castle lie a large number of ancient cairns.
Situated about 400 metres northeast of the summit of Rough Tor, a natural formation of granite rocks is surrounded by a large man made ring of piled stones with a diameter of about 30 metres, standing almost 1.2 metres high.
South Hill Cairns lie on the southern end of the Scillonian island of Samson to the west of St. Mary's. The are four Entrance Graves situated on the ridge of the hill. They are aligned north-south. The northernmost cairn has a diameter of almost 6 metres with a chamber measuring 3.5 metres long by 1 metre wide. Its entrance like that of its neighbours faces SSE.
St. Piran's Round lies beside the B3254 to the west of Goonhavern. Almost circular, the 45 metre diameter enclosure is bounded by a 2.5 metre high rampart with an external ditch 1.5 metres deep. The earthwork is thought to date from Iron Age times and has been used in modern times as a venue for the meeting of the bards at the Cornish Gorsedd as well as 'miracle plays.
A line of more than 90 Bronze Age barrows line the top of a ridge near St Breock Downs. Stretching for almost seven miles, the best example is located at grid reference SW971681. This 18 metre diameter barrow stands 2.4 metres high and is quite well preserved. The number of ancient monuments in the locality making the area well worth a visit.
St. Clement Inscribed Stone lies within St. Clement churchyard and stands ovr three metres high. Its 6th century inscription reads: VITALI FILI TORRICI, which translates as 'Vitalus, son of Torricus'.
St. Dennis Hill Fort surrounds St. Dennis church atop a conical hill near Indian Queens. Located just to the south of the A30 trunk road, its position effectively controls all the land north across Goss Moor to Castle an Dinas and indicates how the Iron Age people used high points in the landscape to control this ancient trade route through Cornwall. Circular in shape the twin ramparts are about 113 metres in diameter.
Otherwise known as the Brocagnus Stone, this 6th Century Inscribed Stone stands 1.5 metres tall at a cross roads of the B3314 roughly midway between St Endellion and Port Quin. The stone has recently been replaced here after spending many years at Doyden Point. The inscription reads BROCAGNI IHC IACIT NADOTTI FILIVS, which translates as 'Brocagnus lies here, son of Nadottus'.
A rarity in Cornwall, the St. Kew Inscribed stone has inscriptions in both Latin and Ogham (Old Irish). It reads IVSTI or Justus and is thought to be part of a larger inscription. It is situated within St. Kew church.
St. Warna's Well lies on the west coast of the Scillonian Island of St. Agnes. Dating from celtic times the well was later 'christianized'. It is approached by three steps leading down into its stone chamber and is located on rocks above St. Warna's Cove. Incidentally, St. Warna is the patron saint of shipwrecks.
Stannon Stone Circle lies on the slopes of Rough Tor, adjacent to the southern boundary of the Stannon China Clay Works. There are approximately 80 stones of which half remain standing. The circle has an average diameter of just over 40 metres dates from the Bronze Age and the proliferation of ancient sites makes the whole Rough Tor area well worth a visit.
Taphouse Ridge Round Barrows lie alongside the A390 road just under a mile west of West Taphouse. The Bronze Age barrows have an approximate W to E alignment and consist of two groups of four barrows. The western section have diameters of between 15 metres and 22 metres, whilst the eastern section are slightly larger with diameters of between 17 metres and 28 metres. Both groups exhibit the effects of treasure hunters and have robbed out centres.
The Devil's Coyt is situated near to the Trekenning roundabout on the A39 near St. Columb Major. Resembling the Quoits at Chun and Mulfra in the far west, records show that the Quoit or Dolmen was still erect until the 18th century. Its enclosed chamber measuring 2.1m x 1.8m x 2m high, covered with a large capstone. A support stone was removed from the western side in the early 1800's, with the quoit partially collapsing in the 1840's. Some thirty years later the quoit was broken up and remained lost until 1977 when its fragments were discovered during pipe-laying operations.
The Roman Altar stands within Tresco Abbey Gardens on the Scillonan island of Tresco. It is reputed to have been originally found at the site of the Pilots Gig Cafe on St. Marys. The altar stands 0.8 metres high and is 0.5 metres square. It is the only altar stone of its type in Cornwall.
The Trippet Stones Stone Circle lies near Blisland on Bodmin Moor and dates from the Early Bronze Age. Almost a true circle some 33 metres in diameter, only twelve of the original 26 stones remain. Eight still stand. The stone in the middle of the cicle is a modern boundary stone.
Standing within the south transept of Tintagel parish church, this inscribed stone measures 1.5 metres tall and is inscribed with IMP C G VAL LICIN, which translates as 'to the Emperor Caesar Gaius Valerius Licinus', which dates the inscription to about 250AD.
Tintagel Island is now a well known visitor attraction managed by English Heritage. Its main feature is the Castle thought to date from the 13th Century when it was the stronghold of Earl Richard of Cornwall. Prior to this the area was likely to have been an Iron Age Cliff Castle now sadly lost to erosion followed by a Post Roman settlement on level ground at the top of the island. Other walled enclosures on the ledges below the main path around the island may be medieval reworking of former Post Roman buildings. Associated structures here include a 12th century chapel, a pair of wells, a kiln and a tomb or shrine. It is thought that the island may have been the home of the Dumnonian royalty between 400 and 700 AD - still leaving open the possibility that (King) Arthur may have been concieved or born here.
A little to the north of Castle Down on the southern slope of Tregarthen Hill, on the north of Tresco, Isles of Scilly lie five chambered cairns or Entrance Graves, aligned NE-SW. The best preserved lies at SV88641626. This Entrance Grave has a diameter of about 7.3 metres with a chamber 4.6 metres long. It retains two of its original capstones and its inner kerb of 11 stones.
Tregeare Rounds Iron Age Hill Fort lies just to the SE of the B3314 to the northeast of Pendoggett. It consists of two circular ramparts surrounded by ditches. The height of the outer rampart reaches 2.5 metres with an outer ditch of 2.4 metres and an inner ditch of 1.7 metres. The smaller inner rampart encloses an area of about 90 metres and is about 1.2 metres high in places.
An inscribed granite pillar, formerly used as a gatepost and now situated on the roadside by St. Piran's, a former monastery now a private residence. The inscription reads: C DOMI N GALLO ET VOLUS – ‘For the Emperor Caesars our lords Gallus and Volusian.’ Trebonianus Gallus and Antoninianus Volusianus reigned from 251-253 AD.
Two Bronze Age bowl barrows, approximately 26 metres in diameter lie close to the cliff edge near Zachry's Islands, Trevelgue. The stand 3.7 metres tall and stand proud of the landscape. On excavation, the easternmost barrow was found to have contained a stone cist complete with human skeleton, currently on display at the Royal Cornwall Museum in Truro.
Situated as it is close to the summer holiday resort of Newquay, Trevelgue Head Cliff Castle is usually overlooked by all but a handful of interested visitors. The castle is thought to date from the Iron Age although two Bronze Age barrows have been located indicating that the area has been utilised for even longer. Seven ramparts, ranging from 2 metres to 4 metres high, protect the interior making it probably the best defended cliff castle in Cornwall. Excavations in the mid twentieth century discovered at least fourteen roundhouses as well as Roman coinage.
Warbstow Bury Iron Age Hill Fort lies on the side of a hill just to the northwest of the North Cornwall village of Warbstow, near Launceston. Oval rather than circular it has diameters of 340 metres and 270 metres. The impressive ramparts are widely spaced and reach up to 5.8 metres in places. Their outer ditches are 2.7 metres in depth. There are entrances to the east, northwest and southwest sides.
White Island Chambered Cairn lies on the Scillonian island of White Island, just off the northern coast of St. Martin's. In a good state of preservation, the cairm has a diameter of over 6 metres. Its chamber is almost 5 metres long and is aligned SSE to NNW. Two of its original capstones remain. Nearby, to the southeast, lie a number of smaller cairns. Access is by foot from St Martins for just one hour either side of low tide. Please be aware of the state of the tide.
Willapark Iron Age Cliff Castle lies on the prominent triangular shaped headland just to the southwest of Boscastle in North Cornwall. It is accessible via the coast path. The 110 metre long single rampart runs NE-SW across the neck of the headland and reaches a height of 1.8 metres. It is fronted by a 0.8 metre deep ditch. A modern footpath cuts through its southwestern end.
An Iron Age Cliff Castle protected by a single 48 metre long bank and ditch. The site can be reached along the coast path from Tintagel or by a public footpath from the B3263 at Bossiney.
Wingletang Down is described as a cairn cemetery. Over 40 simple cairns lie on the moorland on the southern end of the Scillonian island of St. Agnes. In various states of preservation, they resemble low circular mounds and are thought to date from the Bronze Age.
A Neolithic long barrow just to the east of the A39 some three miles north of Kilkhampton. The Woolley Long Barrow is one of the best preserved examples in Cornwall. It has dimensions of 62m (long axis) by 21m wide. It stands 2.5 metres high. | 2019-04-20T02:54:08Z | http://www.cornwallinfocus.co.uk/history/ancientsites.php?r=IOS |
If not gotten rid of at an early stage, termites can cause a lot of damage to woodwork as well as the furnishings in your home. Research has shown that in some countries a loss of up to 10% the cost of buildings may be caused by termite destruction. For this reason as a homeowner you need to prevent termites from invading your property and in case they have already invaded your home, you will need to get rid of them in the most effective method.
So how can you identify presence of termites in your home or property? In case you suspect there is presence of termites in your home, there are a number of methods you can use to detect them.
Use of well-trained sniffer dogs to locate the existence of termites.
Using a special gas detector to detect the gas expelled by termites of a specific composition.
Using special instruments to listen for the distinct sound of termites that are feeding on your home.
Getting rid of all the stumps, roots and other debris that may attract termites from your home. This is especially very effective when getting rid of subterranean termites. Getting rid of these materials will interfere with the normal functions of the termites since they will have nothing to feed on. The materials that have been removed should also be destroyed so as to completely get rid of the termites that may still be there.
Another thing you may consider doing is deep digging. This can make it possible to destroy the termite colonies that may be in the underground. You will also need to destroy any wooden mulch that may be in your compound. This is because mulch is normally infested with termites within a very short time especially in termite prone areas. Therefore the only way of getting rid of such termites is to destroy them. It is also recommended that you avoid using any other type of wooden mulch if you cannot obtain cedar mulch. If you have identified a region in your compound infested with termites you can also flood that region so as to get rid of them. This can be one of the most effective methods of killing the termites because the flooding will drown them.
Other ways of getting rid of termites includes use of bio-blast. This methods involves using a fungus to infects and kill those with fungal spores. It is however very important to note that use of chemicals to get rid of termites should be undertaken with extra care. This is why it is best to contact a pest control expert. At A1 Pest Control we have a team of experts who are always ready to help our clients. Call us today and we will come to your rescue.
If you are from Australia you must be aware that the Australian bush is a very dynamic. Every day there are trees that die and there are new ones that regenerate. In addition to these fallen trees and dropped limbs, a number of places are filled with shed barks and leaves which end up creating a layer of litter on the woodland floor. All this litter is attracts a common pest in Australia, the termite, which feeds on this cellular material. This has also led to these termites invading Australian homes and destroying property worth a lot. Some of the gardens in our homes have recreated the bush, and this makes a perfect termite habitat. Since the damage caused by termites can be tremendous, it is very necessary to protect your home from these destructive pests.
A pest control expert that you would need to contact is one who specialise in termite detection and control. What is surprising about these pests is the fact that a king and queen are able to live for around 70 years and the colony is able to be well established even before it is detected. One way that may be used to eradicate an unwanted nest of termites is by pumping a controlling agent into the nest and sealing the hole. It can also be a good idea to have a pest control expert lay termite traps on your property if by any chance you suspect there is termite activity in the area. These are inspected regularly for any activity, and as soon as termites are detected a large bait box is installed to concentrate the termite numbers. the contents of the bait box contains can be cells of wood, and this can be kept in place for up to eight weeks, after which the whole colony may be treated with a range of contact insecticides. This should be carried out only by an authorised pest controller. Even though you may be very vigilant in termite detection in the garden, it is still possible for them to enter your house. The first and easiest indicator to spot may be some slight discolouration of the surface of a wall, mostly followed by warping in case the wood panelling is used to line the wall.
There is a specials meter that can be used to show if there is high moisture content behind the wall. If that is the case, this is enough indication that there is termite activity in that location. Since termites are tropical insects, they normally create their own high humidity in the places they live. There is a simple way of monitoring whether you have termites in your home. This is done by burying toilet rolls in the ground in various places in the garden. Each one is marked and since they are made from good cellulose material which is highly absorbent, they are attractive to termites. You will need to dig them up from time to time, and if there are termites then you may have cause for concern. There is no denying that termites are a great natural part of the Australian landscape, but they become problematic when they are in close proximity to your house. It is however rash to get treatment for a problem before it exists. The first step should be setting up the baits so as to establish whether there are termites in the vicinity. The expert is the one who need to properly identify them and establish a control program.
At A1 Pest Control we have well trained experts who are always quick to respond to termite problems. The best solution for your termite problem would be to call us today and we will act as soon as possible.
Even though buying a home is normally one of the biggest investments to most people, the worst thing about it is that it could be going on right now without your even knowing it. It can even be possible that it has been going on for a number of years right under your feet. This is because termites can be very sneaky.Termites have been known to be the silent killer of countless houses all over the world. One thing that makes a termite infestation scary is the fact that it can sometimes take up to five years before the termite damage is even noticeable. Generally, the most visible sign of a termite damage are the holes in wood and/or sagging floors.
When the damage gets to this point, the cost in terms of damage will start accumulating very fast. You may be lucky if you were clever enough to perform termite inspections or if you realized early enough that were maybe just lucky enough to realize what was going on before that sort of serious damage had been inflicted. But whatever the extent of your termite problem, this article can help you.
The first and most important thing you need to do to control termites is to look for evidence of their presence. Even though the termite damage can be a bit difficult to find, looking in the right places can give you an idea of any termite infestation in your property. You can try tapping on floor beams, support beams, pillars, wall boards, etc. In case it is wooden, you need to tap it, and in case you find a hole in the wood, try sticking something like the tip of the screwdriver in it. If the screw driver easily goes in, you could very well have a termite problem. You can also try looking for mud tubes, termite droppings, and insect wings. Termite problems always require fast action and it is advisable that if you can’t tell whether or not you have termites, you need to get an inspector in there.
This is the reason why a very simple phone call could really save you a lot of money. In case you are very sure you have termites, avoid wasting any time. Even though it is easily possible to get rid of termites from your home, a very important step in termite control is to make sure they can’t re-invade your home once you’ve gotten rid of them to begin with. The first step would be to make their food unavailable. Termites eat wood and if you can get rid of any wood debris out in the yard, or random logs laying around, you can be on your way to getting rid of them.
Since the best way of getting rid of termites from your property once and for all is by the help of pest control professionals, you should contact them as soon as you suspect you have termites. At A1 Pest control, we have a dedicated team of well-trained experts who are always ready to come to your rescue. We will come and inspect your entire home for these destructive pests and if they are there, we will use the best method that will not be harmful to your family and to your pets to eliminate them completely. Contact us today and we will get to you as soon as possible.
Almost every home owner who encounters possums in their compound finds them a great nuisance. Possums are known to rummage through garbage cans and steal the food you leave for your pets. Even though it can be a bit tricky to get rid of possums, with a little perseverance you can be able to convince the backyard possum to move elsewhere.In order to effectively get rid of opossums, it is always important to first understand their habits. Even though they prefer wooded areas or open fields near streams, opossums will easily create a home in abandoned burrows; tree crevices; brush piles; or areas beneath steps, decks, and outbuildings.
Being nocturnal animals, possums will be very active at night and sleep throughout the day. This is why they can be difficult to spot when they are attacking your garden. If you are keen you will be able to spot signs of their presence such as their droppings, tracks, over turned pet food dishes or garbage cans and damaged plants. Backyard possums are also considered to be omnivores since they feed on fruits, nuts, insects, eggs and small animals such as frogs and mice.
The most common control methods that are used for backyard possums include opossum repellents, trapping and fencing.There are very many products that are available on the market which target repelling these wild animals. The problem with these products is that they only provide a short time solution. Apart from these methods, other possum control methods include using motion-activated sprinkler systems. These will startle the creatures and frighten them off.Use of traps on opossum is also another commonly used method employed for possum control. Even though it is challenging to know how to trap a possum, getting to know what to do with one after you have captured it is the biggest challenge. This is because a captured possum needs to be relocated by an authorized wildlife expert in most areas.
It is illegal to kill these animals in most states and hence it should be the last resort. Trapping them in a box or cage-like trap can be easy and the trap should measure approximately 10 by 12 by 32 inches. The best places to place the traps includes along trails and known travel routes. A bait should be included and a trap can be baited with fruit such as over ripe melons, grapes, or bananas.Use of fences such as putting up woven wire or electric fences is also a great possum control method. The fence that is put up around garden areas needs to be approximately four feet high, with the top foot or so facing outward and away from the garden. This is to prevent the possums from climbing over. You can also add an electric fence that is about 3-4 inches over the top so as to keep the possums away.
In general, the best method to ensure your home is free of possums is making sure the area is less appealing to opossum. If there are any overgrown trees and shrubs in your compound, make sure you have them pruned. Any fallen fruit from trees should be removed from the compound. In case you have any garbage cans in your compound, ensure they have tight-fitting lids. Any pet food that remains should not be left out at night. Finally ensure that you close or block off any entrances or openings that may be under or near the home such as porches, decks, buildings, etc.
Once you suspect your home has been invaded by possums, it is recommended that you immediately contact a pest control company. Something that a lot of people don’t know is that possums travel with their mate. You therefore need to get the help of a pest control company whose price will include trappings for 2 possums. At A1 Pest control we are a registered pest control service and our possum control cost includes trappings for 2 possums. Contact us today and we will act immediately.
In Australia, one of the most commonly found pests on commercial and domestic buildings are ants. Even though there are hundreds of ant species that are known to man, they are broadly divided into two main groups, Black Ants and Brown Ants.
The food preferences of these pests are varying, and they are constantly scavenging for something to feed on. In order to control an ant infestation in your home or commercial premises, there are a number of contributing factors that should be considered, including; species of ants, seasonal conditions, life cycle stage and colony requirements.
The main places where ants like to build their nests are inside cavities between building levels, inside walls, roof voids and moisture affected timber. They may however be difficult to get rid of since they like to track great distances from a colony in a neighboring property. There are a lot of cases where people find carpenter ants in their home and mistake them for termites. This is because unlike other species of ants, the carpenter ant is large and mostly lives in rotting and damp wood.
Most Australian home owners have had experience with these ants in some way, whether it’s outside in the garden or inside of the house. They are normally spotted eating at night, and for this reason they may be a bit difficult to see them. There are a lot of things that these ants feed on, including insects, sweets, and even meat that may be found in a kitchen.
A good sign of their presence is piles of sawdust near wood. The main objective of any ant control in your home or commercial premises is to locate and treat the nest. In most cases this can be a very tedious and time consuming task that may involve drilling holes into walls and voids, such as inaccessible ceiling cavities, to reach the nest.
In case you discover presence of ants in your home, you should consult a professional pest control expert. There are a number of ways that a pest control expert can help you get rid of ants, depending on the severity of the infestation, the amount of ants, and the location of the nest. There are also a number of different treatments that can be used, including baiting, dusting, aerosol pesticide spray or a barrier insecticide outdoors.
There are a number of things you can do to prevent carpenter ants from entering your home, and this includes repairing tap and pipe leaks quickly, sealing spaces that allow ants to enter your home, and making sure that shrubs are away from the outside walls of your home. In case you are not sure whether you have carpenter ants or termites, you should seek the help of a professional pest control company to help classify and appropriately treat the insects.
At A1 pest control, we have a team of well-trained pest control experts that can help you get rid of carpenter ants. Feel free to contact us for questions or interest in pest control services for ants and we will be happy to assist you.
For professional pest control use in external and internal situations around buildings, and other domestic and commercial environments.
Biflex AquaMax was the origninal professional strength insecticide and termiticide. This pesticide is effective on all common household and commercial pests, as well as all termite species in Australia.
This unique water-based formulation is non-staining & odourless, without sacrificing efficacy or residual longevity. Biflex aqua has the highest active ingredient (100g/L bifenthrin) and yet is extremely safe when applied according to the label.
Biflex repels termites for at least 10 years in good soil conditions. Its a long-term residual insecticide, binds to soil and organic matter, is UV stable, non-soluble, and non-systemic (doesn’t get drawn out of soil by plants).
Looking for information about Bi-Flex, a powerful termiticide? If you’re concerned about the damage that can be wrought on your home or property by large termite populations, then you might be interested in the benefits of this product in terms of destroying and discouraging termite colonies.
Because termites are capable of causing large amounts of damage to a property and its contents by destroying structures such as wooden supports or valuables such as books and storage boxes, it’s essential that home and property owners take action to ensure that a termite infestation does not go unchecked.
As most home owners do not have a thorough understanding of the behaviour of termite colonies, arranging for a professional pest controller to manage a termite infestation is recommended.
One product often used by professional pest controllers in helping to control termite populations, as well as other home-dwelling pests, is Bi-Flex.
This product is designed to create effective termite barriers around the home and other nearby structures. It is often applied to termite-prone areas such as building foundations, chimney areas, the slab perimeter, crawl spaces and other openings such as ducts and pipes, and also nearby trees and stumps. This helps stop the existing infestation, and to discourage the termites from returning.
Bi-Flex is widely used by professional pest controllers, and has a number of benefits in terms of keeping termite infestations under control.
One advantage of using this product is that it is highly effective even when applied at relatively low concentrations.
Research has indicated that even a small amount of the product may help to destroy termite infestations. This makes it both cost-effective and more environmentally friendly because less of the product needs to be used.
In addition to helping stop termite infestations in their tracks, Bi-Flex continues to do so for extended periods of time, meaning that not only are termite colonies wiped out, but they’re discouraged from returning.
Perhaps one of the biggest selling points of this product is that its active ingredient is known for being stable.
This means that residents in the home or property won’t be exposed to harmful chemicals or residues, and won’t be subject to strong chemical smells.
In fact, the product is safe enough that it can be used in the garden – including around vegetables or fruit trees.
If you’re concerned about the damage being done to your Canberra home by a termite colony, then it’s worth speaking to a professional pest controller about the methods available to help deal with pest infestations.
Our company is experienced in using products such as Bi-Flex, so feel free to contact us for more information about the application process.
Termite Baiting do you know what this is? Let me tell you what it is and how it is used. As termites are a significant issue for Canberra home and properties, and are in fact one of the most common causes behind property damage in the country. As termite colonies can often go undetected until they have caused visible problems with a property, they can be a serious problem for property owners and what most people are unaware of is that home insurance doesn’t cover termite damage.
There is 1 popular way of dealing with termite infestations is termite baiting. This process involves attracting termites to a particular area, and then treating them with a specially designed insecticide. The process works as the affected termites do not die immediately, but return to their colonies. In doing so, they infect the other members of their colony with the toxin they have ingested.
Over time, this results in the death of the termite colony. Baiting is one of several solutions to dealing with termites, and is often used when other treatments are not viable. For example, baiting can be a good option where using standard termiticides may pose a threat to the environment, such as in areas near water, when pesticides cannot be used, or when barrier treatments, treatments designed to stop termite infestations occurring, have been unsuccessful.
Termite baiting should only be performed by a licensed pest controller, as termite dusting often involves the application of chemicals and toxins that may not be used by other individuals. In fact, many over-the-counter processes for baiting termites are designed only to determine whether termite colonies are present on the property, rather than to destroy these colonies. Professional pest controllers are able to oversee the entire process of identifying, assessing, and dealing with a termite infestation, so it’s in your interest to invest in a pest control inspection the sooner the better.
There are currently several different types of termite baits available on the market. These vary in their application process, their toxins and active ingredients, their effectiveness, and how environmentally friendly they are.
Not all termite baits are appropriate to a given property, and a professional pest controller will be able to advise about which product are best suited and to be most effective for your household’s needs. For example, factors such as whether you own pets, or whether the infestation is within the home or outside the home may affect the type of termite bait chosen.
Termite baiting can be an effective solution to dealing with a termite infestation, but is best discussed with a professional pest controller who can advise you about whether it is the most appropriate method of dealing with your termite problem.
Rats as well as mice are alongside mankind, essentially the most effective creatures on the planet when it comes to selection as well as range.
Mankind has unknowingly assisted their distribution through the entire word through exploration. Nevertheless, they’ve in certain conditions turn out to be his worst type of adversary.
Large amounts of money annually is sacrificed through contamination of foodstuff through rodent excrement, urine as well as fur. Rats ruin a lot more foodstuff compared to they might possibly consume, and also their eating routines via gnawing have been to blame for producing fires in roofs and walls.
They are prolific breeders that inside a calendar year a rat may have between 30 -80 young, depending on species whereas one couple might produce 15,000 rats in their life span.
Rodents may press via a opening the dimensions of a twenty cent piece, drop twenty metres without injuries, tread water for three days, consume a variety of foods and endure an atomic bomb blast. How’s that for constitution.
AKA scientific name of Rattusrattus or common name of black rat or the ship rat is accountable for the Black Plague and the death of millions of people from its flea. Its capability to clamber distributed it all through the planet by clambering boats hawsers. It prefers to reside in trees and shrubs and roofs of buildings.
AKA scientific name of Rattusnorvegicus or Brown rat prefers to dig unlike the roof rat and also favours to dwell in close proximity to drinking water and damp areas. The Norway Rat carries a stouter frame and has a tail that is not as long. Is ears are also not as big when in comparison to the roof rat.
AKA scientific name Musdomesticus. Having a mouse problem tends to be a very much bigger monetary issue compared to rats in Australia, with population densities achieving 32,500 per hectare in plagues. They demand significantly less water than rats, with a shorter pregnancy period plus from 42 days, are at nearly 1/2 the proliferation maturity of the Roof rat.
Baits and Lures -Since the 1940’s blood thinner chemicals were mainly used as they were anti-coagulant and worked well at the time, this was then superseded by other poisonous lures. Since the previous 10 or so years, rodents have become largely immune to blood thinning chemicals.
Strains of rats can make it through a dosage that is several times more powerful only 10 years ago. Some strains of mice appear typically untouched by it at all.
Mousetraps: Snap boards and tacky traps need to be applied as a backup for lures, or for basic safety reasons. They need to be placed just out from skirting boards, with the bait on the trap close to the walls.
The trap lure has had success for customers is the use of cocoa powder sprinkled on some fresh bread. The advantage of setting the trap with this concoction is It may be smelled some distance away and mice seem to love it. Tie the bread on to the metal tab that holds the bait with some cotton thread. Pulling will set off the trap.
Is used for outdoor burrows, in boats and grain silos by the usage of fumigants.
Prevention: In pest control this means the stopping of entry locations by mechanics means such as bird wire, aluminum sheeting, steel wool or door closes.
Contact Dusts and Gel: Tracking powder or gel may be used where the activity is situated. You can see where they travel and determine this by using a well known D.Y.I. household tip by the usage of talc as a tracking dust.
Prevention: Good cleanliness and confining resource of food and water is the advisable for preventing rodent contaminations.
Rodents actually are repelled by the odour of mint, camphor and pine-tar. Cats and dogs particularly fox terriers are the experts in hunting down small amounts of rodents in the formative reproduction stages.
Is YOUR home protected? Remember A1 Pest Control Canberra for your home’s complete rodent Rats and Mice and pest protection systems.
Call us today on 0407 065 413 or [email protected] for advice or free quotes on rodents, rats and mice!
As you may or not be aware mosquitoes are pests that can spread harmful disease along with the after effect of the bite being itchy and uncomfortable. To get rid of mosquitoes in a small area is easier than you might think, here are a few tips to assist you to win the battle against the dreaded mossie.
If you’re inundated by mosquitoes or gnats due to standing water from street curbs, drainage ditches or other pools you can’t really control you could toss in a couple of toilet bowl tablets. This seems to work quiet well.
By producing CO2, the Black Hole lures and traps mosquitoes and sandflies, but may also catch other flying insects such as flies and moths which are attracted by the black light.
Black Hole Mosquito Traps are a safe and effective alternative to pesticide treatments and are placed inside or outside homes, offices, gardens, swimming pools and all outdoor eating areas.
They are especially effective in areas where mosquito population is very high.
Best area coverage: 66 square meters to 165 square metres.
The light globes lasts for over three hundred hours, and are available from most lighting shops.
The Black Hole is available in Canberra, just ring us on 0407 065 413 and order one over the phone.
….”I tried this on my deck and around all of my doors. It works – in fact, it killed them instantly. I bought my bottle from Target and it doesn’t cost much. It really doesn’t take much, and it is a big bottle, too; so it is not as expensive to use as the can of bug-spray you buy that doesn’t last 30 minutes.
Q: If I try this service and it doesn’t work, how much will it cost me?
A:The cost varies upon your needs and situations. Call us to ascertain exactly which plan suits your needs and you will talk to a non-pushy, informed technician or office staff who will guide you to your best solution.
Send Bob and email [email protected] a free quote and advice.
If you live anywhere in Canberra, Northside, Southside or surrounding areas such as Braidwood, Bungendore, Goulburn or Yass, effective and safe pest control and pest Exterminators will be needed more than ever before.
Due to the diverse weather in Canberra you may find creeping and crawling bugs that you would normally find in your yard have now found a way into your home and are now unwanted house guests.
These pest and vermin need to be safely exterminated with systematic regular pest control services so that they don’t cause germs and disease to you and your family.
Whatever you do, don’t give up! If they’re not controlled, they can continue to infest your home and cause health major issues, or just be plain annoying.
Readily available DYI solutions for spraying insects, which might seem to work in the interim but if you are searching for the best pest control solutions to your problem permanently you really need to call in the experts.
Our firm has been successfully eradicating various pests in Canberra for many years now and we know how to treat the problem permanently.
Call today to find out more information or to order our services on 0407 065 413.
Or feel free to email [email protected] for a free quote and friendly advice.
We are bed bugs exterminators who have the skills and expertise to solve your problems with bed bugs using only safe and fast control strategies. We have different plans of attack for the type of infestation you have.
If you have silverfish infestations, or need to get rid of mouse or rat problems, just let us know.
We are available most times of the day for all types of other pest control treatments.
Looking for friendly pest control services in your area? We service most areas of Canberra, using only environmentally friendly insecticides & non-toxic products that are also Eco-friendly.
We find pantries in kitchens are hot spots and magnets for pests where sugar, flour and other foodstuffs may attract moths, ants and cockroaches.
These areas need to be protected from not only vermin, but also they need to be protected against harmful and smelly chemical treatments. To eliminate bugs in these locations, only non-fuming and non-toxic treatments should be used.
Ring Bob on 0407 065 413 or send a [email protected] if you have a pest extermination problem and need a safe, effective, treatment that won’t break the bank. We are the ones you are after.
Safe Environmental Solutions For You and Your Family.
Looking for a reliable and safe pest control firm that doesn’t charge the earth for its services? Our pest exterminators have been successfully treating Cockroaches, Ants, Spiders, Bees, and Bed Bugs within Canberra metro area now for a long time now.
The reasons for our success are great services backed up by rock solid warranties, and good old-fashioned customer satisfaction that seems to be lacking now a days.
Our Pest Technicians also give you protection against bees, Fleas, rats, mice Rodents, bird lice often called mites or other garden pests.
Call us today up to 6pm on 0407 065 413, or email Bob at [email protected] for a free quote and advice.
The funnel webs are mainly occur along the coast and mountain regions from Gladstone in the north to southern Tasmania. Isolated species occur in the Mount Lofty Ranges and Eyre Peninsula of South Australia, and in the mountains of North Queensland.
Although the Sydney funnel-web spider is found within about 100 km of the city.
In tropical and subtropical regions, spider prefer to thrive in rainforests and areas of higher altitudes. However, in southern states, they also live in drier eucalypt forests and woodlands, as well as snow country.
Funnel-web spiders are probably the most venomous aggressive spiders in the world.
All funnel web species are lethal to humans, not just the Sydney or Northern tree dweller. If they bite you it is usually a pretty deep injection but even a small grazing bite means get to hospital immediately.
The Sydney Funnel-web constructs its own burrow, which may be over a foot deep or uses a suitable crevice in rocks or round house foundations. Sometimes, Funnel-webs may be found in colonies of over a hundred.
The webs are white and often tubular rather than funnel-like with supporting lines running out to surrounding rocks and debris.
The spiders may take several years to reach maturity and live for perhaps 8 years or longer. When mature, the males leave their webs and lead a homeless existence.
They tend to roam and often enter homes particularly during summer after a heavy downpour of rain. They mate with a female for only one season and if not killed shortly after mating, die within a few months.
This spider is one of Australia’s largest and most easily identified. The body of a female Sydney Funnel-web spider measures about 35mm in length and the male about 25mm.
The paired spinnerets at the end of the abdomen are particularly long, much longer than those of other large dark spiders.
The male is of a more delicate build than the female and has 2 features, which help identification. One is a little spur half way along its second leg on each side and the other is a finely pointed feeler to transfer sperm to the female.
Both sexes are very aggressive and when approached, will rear up into a ready to strike position. Their massive fangs can penetrate a child’s fingernail.
However, most people bitten by them are not injected with sufficient venom to cause any illness.
Often it falls off the tips of the spider’s fangs as it makes a preliminary downward thrust. People bitten by the female may at the most suffer pain around the bitten area.
The venom of the male is 5 times more toxic than the female. Man and monkeys seem to be especially susceptible to the venom.
For example, rabbits can be given very large doses of the venom with no apparent effect but a small dose injected into a monkey produces the terrifying symptoms seen in humans.
In all cases where the victim has died, and in which the spider has been positively identified, it has been a male spider.
The venom contains a low molecular weight toxin called atraxtoxin, which attacks the nerves of the body causing thousands of electrical impulses to be fired down them. The muscles twitch and there is a profuse flow of perspiration, tears and saliva.
The venom also causes changes to blood vessels, which can lead to shock and coma due to brain damage. All the evidence suggests that the effects wear off after a few hours.
Provided the victim reaches hospital before serious illness has developed, he or she has an excellent chance of recovery. An antivenom to the venom of the Sydney Funnel-web spider became available in 1980.
Funnel-web spider venom is highly toxic, and all species should be considered potentially dangerous. Males wander at night, especially during or after rain, and may enter houses.
Bites by males of two large species, the Sydney funnel-web and northern tree funnel-web, have resulted in death. You need to follow the advice below.
carefully shake out shoes before use, any footwear, clothes and sleeping bags left on the ground overnight, as the spiders hide during the day. | 2019-04-21T03:19:20Z | https://www.a1pestcontrolcanberra.com.au/tag/australian-pest-control/ |
Ever wondered how Chris Record, Tai Lopez, Adrian Morrison, Anik Singal and almost every other successful internet entrepreneurs make their money — well, the answer is easy. Even though they all have multiple streams of revenue coming in from various partnerships and business ventures, the one thing that is universal to all of their business models is something called digital publishing.
Earn Up to 80% Commission by Creating and Launching Digital Courses in the Tecademics Marketplace!
Click here to get started: DIGITAL PUBLISHERS ACADEMY powered by Tecademics.
As a Publisher, when you sell courses in the Tecademics Marketplace you make 40% Publisher Commissions on every program that you produce. In addition, Tecademics Affiliates keep 40% commissions when they promote courses featured in the marketplace. This is how you can earn 80% of the sales price when you create (40%) and promote (40%) your own courses!
Hurry, this deal won’t last long, members who join at the Publisher level will receive 50% off the regular price! THAT MEANS YOU PAY ONLY $997!
CLICK TO TAKE ADVANTAGE OF THE 50% DISCOUNT AND JOIN AT THE PUBLISHER LEVEL.
It’s safe to say that if you are reading this post, you are dedicated to changing your life for the better. If that description fits you then you can skip the fluff and go straight to one of the following pages which explain how you can take advantage of this incredible opportunity. Though very few will earn seven or eight figures, for many people, the realistic chance to make three or four thousand dollars a month can be meaningful. (It is important to note that there is no guarantee of earnings made by this author or the owner of any training program. As with any school, how the information is applied upon learning has a critical bearing on the outcome. Which is why, if you follow the road map that is carefully laid out in Chris Records Digital Publishers Academy program, you will likely reach great success. Still, mileage will vary. So why not bet on massive success?
HOW TO EARN MONEY BY PRODUCING AND SELLING DIGITAL TRAINING PROGRAMS.
As the cost of formal education has become unaffordable for many, and with the average student forced to take on thousands in student loan debt, parents, students and those looking for retraining are weighing the benefits of traditional university programs versus more useful and budget-friendly online alternatives.
Before we check out the Digital Publishers Academy let’s examine how you can get a piece of the online education market which is poised to go beyond $240 Billion by 2021.
Who will those billions go to and how can you capture your share?
Answer: A large part of the earnings goes directly to the individuals who create the academic content around their unique and specialknow-how in topics that interest them.
Everyone has an interest that drives them. In fact, the literal definition of an expert is not a genius as some assume, instead, it’s a person who has more understanding than the typical student who is interested in the same topic. This fact is how normal people are making money with digital courses. The secret to creating passive income on the Internet is with something called digital publishing.
As an internet marketer looking for training on how to launch Facebook advertising campaigns, Chris Record (Co-founder Tecademics) discovered that there was a lack of quality instructional materials on the topic. Frustrated by this, Chris felt if he would pay for a program, others would too, and thus he built his first online course called Dark Post Profits.
Leveraging Facebook’s own training materials and tutorials, Chris simply repackaged the information into a series of over the shoulder tutorial videos that walked course attendees through the process of setting up a successful Facebook advertising campaign.
What’s incredible about this story is that Chris would not have been thought to be a Facebook advertising guru at the time that he published his course.
But what Chris did have, which made it possible for him to publish a course and have people buy it, all while not being a real expert on the subject, was a bit more knowledge than the desperate entrepreneurs who were having difficulties understanding how to properly set up their Facebook advertising account and navigate the complexities of setting up a Facebook ads account. Chris walked course attendees through the entire process of establishing an account, writing copy, creating images, and everything required to run a successful campaign.
Remember, Chris didn’t need to a sufficiently large number were interested so that the course began to bring in sales from strangers.
As an “aside”, one of the main promotion principals inside Digital Publishers Academy, is the concept of using FREE to build momentum.
Regardless of the niche that you are knowledgeable in, there is a set of people who share your interest level but have not grown at the same level in their understanding. And this is why, online course creation is probably the best method for quickly scaling a business online.
Which brings us to one of the most interesting aspects about niche knowledge, and that is the person who holds the information is so familiar with it that they do not see how special the information they possess is.
What Special Topic Could You Teach?
Online training programs cover a wide variety of topics.
Start by taking stock of your very own abilities and experiences, particularly if you’ve overcome some challenges or battles in the past. Chances are, others are struggling with issues and could learn from your competence.
Test your idea and do not be afraid to fail.
After hearing about some of these crazy success stories, one student wished to try her hand at creating a course and being highly motivated she got started after just a few weeks of training, this is her story.
The very first course that she developed was developed on the topic of hiring virtual assistants in a SEO company, regretfully, it was a total flop earning just $400 in the first year that it was made available.
After achieving some success with an e-book launch, a great deal of peers emailed asking for recommendations on their upcoming book launches.
It was a non-technical topic, however one that remained in high demand. Of interest, launching books is a subject that is very well covered online. With just a little time spent researching Google, anyone could have discovered the same information, and for free. But the point is, they didn’t do this, and instead were happy to buy her course because of her perceived expert status having launched a book herself.
This is another secret you will learn in the Digital Publishers Academy, that you do not need to break new ground with the information you present, you only need to package it in a way that fits the needs of your audience. In some cases, you don’t even need to repackage the information, perhaps just the style it is delivered in. Alex Becker is famous for his irreverent style in how he presents his digital marketing and SEO training. Though he may not connect with everyone, Alex has a loyal following who has propelled him to making more than 8 figures online. The point is, the information Alex presents can be gained dozens if not hundreds of other places, but his unique presentation style and no nonsense method of communicating has allowed him to build a small fortune.
After you choose a subject for your course, the next question is where to host it. How will consumers discover it?
John and Eliot hosted their iOS programming courses on their own website, suggesting they had to set up the video hosting, payment processing and basic technical structure. They’re developers, however, so it wasn’t a problem.
Rob decided to host his course on Udemy, among the biggest marketplaces for offering online courses with more than 5 million registered trainees. Udemy makes it really simple for instructors to obtain started, and they handle all the payment processing and video hosting.
Naturally, Udemy has to earn a profit, however they likewise depend on excellent instructors like Rob to develop courses for their website.
The current royalty structure is established so if Udemy provides the student to your course through their own organic discovery or through a promotion they run, they’re going to keep the bulk of the revenue– as much as 75% sometimes.
Your course won’t sell itself, unless you are publishing in the Tecademics Marketplace. For this reason I think the most significant mistake individuals make when creating an online course is having a “develop it and they will come” mindset.
Whether you host the course yourself, or publish it to an elearning platform like the Tecademics Marketplace, you will be accountable for sustaining the preliminary traction and enrollments.
In the seven figure success stories above, there is a unified theme and that is, they had large email lists of prospective clients who were interested in their niche that they could connect with. That suggests if you’re thinking about introducing a course this year, you have to start believing now about how you’re going to let individuals understand about it.
One method that is working right now extremely well is to recruit high-profile affiliate partners. These should be groups with sizable email lists of their own which they sell your program or course to.
This is why I like the Digital Publishers Academy. DPA is operated by parent company Tecademics, and with 250,000 members, the possibility of connecting with a larger and broader audience is exponentially more than if you “go it alone.” Plus, you not only gain access to highly targeted sales prospects, but you will be able to engage the tens of thousands of affiliates who will sell for you.
In summary, I want you to think about what skills you have which you could teach in this rapidly growing online education.
Ever wondered how Chris Record, Tai Lopez, Adrian Morrison, Anik Singal and almost every other well known Internet entrepreneurs make their money — well, the answer is simple. Even though they all have multiple streams of revenue from various joint ventures and partnerships, the one thing that is universal to all of their business models is something called digital publishing.
Make Up to 80% Commission by Promoting and Publishing Digital Courses in the Tecademics Marketplace!
As a Publisher, when you sell courses in the Tecademics Marketplace you earn 40% Publisher Commissions on every program that you produce. In addition, Tecademics Affiliates make 40% commissions when they promote courses featured in the marketplace. This is how you can make 80% of the sales price when you produce (40%) and promote (40%) your own training programs!
Everyone knows the challenge when you sell a product is accessing your market. The silver bullet with Tecademics and the Digital Publishers Marketplace is that with a quarter of a million members your courses can get exposure to a massive potential audience, the Tecademics Community, as well as tens of thousands of potential affiliates, all who can and will promote your courses.
For a very limited time, those who join at the Publisher level will receive 50% off the regular price! THAT MEANS YOU PAY JUST $997!
CLICK TO JOIN AT THE PUBLISHER LEVEL.
It’s safe to say that if you are reading this article, you are dedicated to changing your life for the better. If that description fits you then you can skip the fluff and go straight to one of the following pages which detail how you can take advantage of this incredible opportunity. Though very few will earn 7 or 8 figures, for many of my students, the realistic chance to make an extra couple thousand a month can be impactful. (It is important to note that there is no guarantee of earnings made by this author or the owner of any training program. As with any education program, how the information is applied upon learning has a critical bearing on the outcome. But, if you follow the road map that is carefully laid out in Tecademics Digital Publishers Academy program, you can do much much better. Still, mileage will vary. So why not bet on massive success?
As the cost of education has become unaffordable for many, and with the average student forced to take on thousands in student loan debt, parents, students and those looking for retraining are weighing the advantages of standard higher education versus more practical and budget-friendly online alternatives.
You may be thinking, “What’s an alternative to a higher learning program?
Before we check out the Digital Publishers Academy let’s examine how anyone can get a piece of the online training industry which is poised to go beyond $240 Billion in the next 5 years.
Who will those billions flow to and how will you get your piece?
Answer: A big portion of the windfall goes directly to the instructors who produce the academic material around their unique and specialcompetence in subjects that interest them.
We all have interests that drive us. In fact, the actual definition of a guru is not a genius as some assume, instead, it’s a person who has more understanding than the typical student who is interested in the same topic. This fact is how everyday people are making money with digital courses. The secret to generating passive income on the Internet is with something called digital publishing.
As an internet marketer seeking out information on how to launch Facebook advertising campaigns, Chris Record (Co-founder Tecademics) found that there was a lack of quality instructional materials on the topic. Frustrated by this, Chris felt if he would buy a program, others would too, and thus he built his first training program called Dark Post Profits.
Leveraging Facebook’s own training materials and tutorials, Chris simply repackaged the information into a set of over the shoulder tutorial videos that walked students through the process of setting up a successful Facebook advertising campaign.
What’s amazing about this story is that Chris would not have been thought to be a Facebook advertising guru at the time that he published his course.
But what Chris did have, which made it possible for him to publish a course and have people pay him for it, all while not being an expert on the subject, was a bit more knowledge than the desperate entrepreneurs who were having trouble understanding how to properly configure their Facebook advertising account and navigate the complexities of configuring a Facebook ads account. Chris walked those who bought his course through the entire process of establishing an account, writing content, creating graphics, and everything required to run a successful campaign.
Remember, Chris didn’t need to a sufficiently large percentage were interested so that the course began to attract sales from complete strangers.
Regardless of the niche that you are versed in, there is a set of people who share your interest level but have not grown at the same level in their knowledge. And this is why, online course creation is perhaps the best way to making money online.
This brings us to an intriguing point regarding niche knowledge, and that is the person who holds the knowledge is so familiar with it that they do not see how unique the information they possess is.
Online courses cover a wide array of subjects.
Courses with distinct outcomes that might assist the course taker to make more money or achieve a common objective that is shared by a wind number of people, such as how to find the perfect boyfriend, or land the ideal job, tend to gain the widest support. When it comes to online learning and education people are amazingly diverse, as are the topics that they are interested in, and willing to pay for.
Test your idea and do not hesitate to fail.
After hearing about some of these insane success stories, one student wanted to attempt her hand at developing a course and being especially motivated she got started after just a few weeks of training, this is her story.
The very first course that she developed was constructed on the topic of employing virtual assistants in a SEO company, regretfully, it was a complete flop earning just $400 in the first year that it was made available.
After reaching some success with an e-book launch, a great deal of peers emailed requesting for guidance on their upcoming book launches.
It was a non-technical subject, however one that remained in high need. Of interest, launching books is a subject that is very well covered online. With just a little time on Google, anyone could have found the same information, and for free. But the point is, they didn’t do this, and instead were happy to buy her program because of her perceived expert status having launched a book herself.
This is another secret you will learn in the Digital Publishers Academy, that you do not need to break new ground with the information you present, you only need to present it in a way that fits the needs of your audience. In some cases, you don’t even need to repackage the information, perhaps just the style it is delivered in. Alex Becker is famous for his irreverent style in how he presents his digital marketing and SEO training. Though he may not connect with everyone, Alex has a loyal following who has helped him make more than eight figures online. The point is, the information Alex presents can be gained dozens if not hundreds of other places, but his unique presentation style and no nonsense method of communicating has allowed him to build a small fortune.
After you decide on a subject for your course, the next concern is where to host it. How will clients learn about it?
John and Eliot hosted their iOS programs courses on their own site, implying they needed to configure the video hosting, payment processing and general technical structure. They’re developers, though, so it wasn’t an issue.
Rob chose to host his course on Udemy, among the biggest markets for offering online courses with more than 5 million registered trainees. Udemy makes it extremely simple for instructors to obtain started, and they handle all the payment processing and video hosting.
But, earnings share is where it gets challenging, and this is why the Tecademics Marketplace is the perfect platform to host and sell your programs.
Naturally, Udemy needs to make a profit, but they also count on outstanding instructors like Rob to construct courses for their website.
The existing royalty structure is established so if Udemy provides the trainee to your course through their own natural discovery or through a promotion they run, they’re going to keep the bulk of the earnings– approximately 75% in some cases.
Your course won’t sell itself, unless you are publishing in the Tecademics Marketplace. For this reason I think the greatest error individuals make when developing an online course is having a “develop it and they will come” mindset.
Whether you host the course yourself, or publish it to an elearning platform like the Tecademics Marketplace, you will be responsible for sustaining the initial traction and registrations.
In the 7 figure success stories above, there is a unified theme and that is, they had large email lists of possible consumers who were interested in their niche that they could connect with. That suggests if you’re thinking of launching a course this year, you have to begin thinking now about how you’re going to let people understand about it.
One tactic that is working right now extremely well is to recruit prominent affiliate partners. These should be individuals with sizable e-mail lists of their own which they sell your program or course to.
This is why I like the Digital Publishers Academy. DPA is operated by parent company Tecademics, and with two hundred and fifty thousand members, the possibility of connecting with a larger and broader audience is exponentially more than if you “go it alone.” Plus, you not only gain access to highly targeted sales prospects, but you will be able to engage the tens of thousands of affiliates who will sell for you.
In summary, I want you to consider what skills you have which you could teach in this rapidly expanding Internet based action movies.
If you are curious how Chris Record, Tai Lopez, Adrian Morrison, Anik Singal and pretty much every other big time online entrepreneurs make their money — well, the answer is easy. Though without exception they have multiple revenue streams from various partnerships and joint ventures, the one universal theme to all of their business models is something called digital publishing.
Earn Up to 80% Commission by Promoting and Publishing Digital Courses in the Tecademics Marketplace!
As a Publisher, when you sell courses in the Tecademics Marketplace you keep 40% Publisher Commissions on every program that you produce. In addition, Tecademics Affiliates make 40% commissions when they promote courses featured in the marketplace. This is how you can make 80% of the sales price when you create (40%) and sell (40%) your own training programs!
Hurry, this deal won’t last long, those who join at the Publisher level will receive 50% off the regular price! YOU PAY JUST $997!
Since the chances are high that if you are reading this article, you are serious about achieving success. If that description fits you then you can skip the fluff and go straight to one of the following pages which explain how anyone can participate in this ideal opportunity. Though few will make seven or eight figures, for many of my students, the realistic chance to make three or four thousand dollars a month can be impactful. (It is important to note that there is no guarantee of earnings made by this author or the owner of any training program. As with any school, how the information is applied upon learning has a critical bearing on the outcome. Though, if you follow the blueprint that is carefully laid out in Tecademics Digital Publishers Academy program, you will likely do much much better. Even still, mileage will vary. So why not bet on massive success?
As the cost of education has become unaffordable for many, and with the average student forced to take on thousands in student loan debt, parents, students and those looking for retraining are weighing the benefits of standard college versus more practical and budget-friendly online alternatives.
Before we look at Digital Publishers Academy let’s examine how you can get a piece of the online education industry which is poised to surpass $240 Billion in the next 5 years.
Answer: A large portion of the windfall goes directly to the people who develop the educational material around their unique and specialknow-how in topics that interest them.
A lot of people have knowledge in subjects that can be shared with others who are interested in the same things. Amazingly, the literal definition of a guru is not a genius as some assume, instead, it’s a person who has more knowledge than the average student who is interested in the same topic. This fact is how everyday people are making money with digital courses. The magic to making passive income on the Internet is with something called digital publishing.
As an internet marketer looking for information on how to run Facebook advertising campaigns, Chris Record (Co-founder Tecademics) found that there was a need for quality training materials on the subject. Frustrated by this, Chris knew that if he would buy a program, so would many others, and thus he built his first training program called Dark Post Profits.
Leveraging Facebook’s own training materials and tutorials, Chris simply repackaged the information into a set of over the shoulder screen capture videos that walked course attendees through the process of setting up a successful Facebook advertising campaign.
What’s amazing about this story is that Chris would not have been thought to be a Facebook advertising expert at the time of his training programs release.
But what Chris did possess, which is the reason he could publish a program and have people pay him for it, all while not being an expert on the subject, was slightly more knowledge than the desperate entrepreneurs who were having difficulties understanding how to properly configure their Facebook advertising account and navigate the complexities of configuring a Facebook ads account. Chris walked those who bought his program through the entire process of setting up an account, creating copy, creating images, and everything required to run a successful campaign.
Remember, Chris didn’t need to become an expert number were interested so that the course began to attract sales from strangers.
Everyone has a wealth of unique experiences and information just waiting to be shared with those who can appreciate it. Leveraging the Internet, the ease of publishing using free or very low cost tools, enables literally everyone to assemble their content into a form that will be seen as professional and worthy of being charged a reasonable fee for.
Regardless of the niche that you are versed in, there is a set of people who share your interest level but have not grown at the same level in their understanding. And this is why, digital publishing is perhaps the best method for building wealth online.
This brings us to an intriguing point regarding niche knowledge, and that is the person who holds the knowledge is so familiar with it that they fail to see how special the information in their head is.
Online courses cover a wide variety of subjects.
Naturally, courses with distinct results that may help the course taker to earn more money or achieve a common objective that is shared by a wind number of people, such as how to find the perfect boyfriend, or land the ideal job, tend to gain the widest support. When it comes to online learning and education people are amazingly diverse, as are the topics that they are interested in, and willing to pay for.
Test your concept and do not be afraid to fail.
After checking out some of these insane success stories, one student wished to attempt her hand at creating a course and being especially motivated she jumped in after just a few weeks of training, this is her story.
Her first course that she developed was constructed on the topic of using virtual assistants in a small company, regretfully, it was a total flop earning just $400 in the first year that it was made available.
After achieving some success with a Kindle book launch, a great deal of peers emailed requesting for suggestions on their approaching book launches.
It was a non-technical subject, but one that remained in high need. And interestingly enough, launching books is very well covered online. With just a little time on Google, anyone could have found the same information, and for free. But the point is, they didn’t do this, and instead were happy to buy her course because of her perceived expert status having launched a book herself.
This is another secret you will learn in the Digital Publishers Academy, that you do not need to break new ground with the information you present, you only need to package it in a way that fits the needs of your audience. In some cases, you don’t even need to repackage the information, perhaps just the style it is delivered in. Alex Becker is famous for his irreverent style in how he presents his digital marketing and SEO training. Though it may not be for everyone, Alex has a loyal following who has propelled him to making more than eight figures online. The point is, the information Alex presents can be gained dozens if not hundreds of other places, but his unique presentation style and no nonsense method of communicating has allowed him to build a small fortune.
After you select a subject for your course, the next concern is where to host it. How will clients learn about it?
John and Eliot hosted their iOS programs courses by themselves site, indicating they needed to set up the video hosting, payment processing and general technical structure. They’re programmers, however, so it wasn’t a problem.
Rob decided to host his course on Udemy, one of the largest markets for selling online courses with more than 5 million signed up trainees. Udemy makes it extremely easy for instructors to get started, and they deal with all the payment processing and video hosting.
Naturally, Udemy needs to earn a profit, however they also depend on excellent trainers like Rob to build courses for their website.
The existing royalty structure is established so if Udemy provides the trainee to your course through their own organic discovery or through a promotion they run, they’re going to keep the bulk of the earnings– approximately 75% in some cases.
Your course won’t sell itself, unless you are publishing in the Tecademics Marketplace. For this reason I believe the greatest error people make when producing an online course is having a “construct it and they will come” mentality.
Whether you host the course yourself, or publish it to an elearning platform such as the Tecademics Marketplace, you will be responsible for fueling the preliminary traction and registrations.
In the seven figure success stories above, there is a unified theme and that is, they had big e-mail lists of potential customers who were interested in their niche that they could connect with. That suggests if you’re thinking of launching a course this year, you need to begin thinking now about how you’re going to let individuals understand about it.
One method that is working right now extremely well is to recruit prominent affiliate partners. These should be people with large email lists of their own which they sell your program or course to.
This is why I like the Digital Publishers Academy. DPA is operated by parent company Tecademics, and with 250k members, the possibility of connecting with a larger and broader audience is exponentially more than if you “go it alone.” Plus, you not only gain access to highly targeted sales prospects, but you will be able to engage the tens of thousands of affiliates who will sell for you.
In summary, I want you to ponder what skills you have which you could teach in this quickly growing online training.
Grab your free tickets to the TEC Talks 2017 Scottsdale entrepreneur event with Chris Record and Cole Hatter powered by Tecademics. This is the super bowl of online money getting events and you do not want to miss out on the launch of the Digital Publishers Academy.
$1,000 dollar value! Grab 2 FREE tickets to TEC Talks 2017 in Scottsdale. August 25th to 27th, 2017 at the JW Marriott. Seats are very limited. Don’t miss out!
Grab your FREE passes to the TEC Talks 2017 Scottsdale entrepreneur conference with Chris Record and Billy Gene is marketing powered by Tecademics. This is the super bowl of online money getting events and you do not want to miss out on the launch of the Digital Publishers Academy.
$1,000 dollar value! Grab 2 free passes to TEC Talks 2017 in Scottsdale. August 25th to 27th, 2017 at the JW Marriott. Seats are very limited. Do not miss out!
$1,000 dollar value! Get 2 FREE passes to TEC Talks 2017 in Scottsdale. August 25th to 27th, 2017 at the JW Marriott. Tickets are extremely limited. Do not miss out!
This article covers three search engine optimization tips for generating more traffic to your local business website. Many business owners don’t realize that it can take up to a year to see the results of SEO. Do not think there is a problem just because the ranking movement hasn’t happened in the first three months. The best practice is to not stop linking. Don’t let your impatience or lack of trust, stop what will be a very positive result. Google does not want site search rankings to be easily manipulated, so it makes sense that if you hang in there, you’ll see very good results. But quit early, and your competitor will regain whatever lead you had and then some.
Having a well-designed website with a clear call to action is vital for your business to improve its online presence. SEO is an essential activity for all local businesses, but SEO alone will not drive more leads if your site is not structured well, or your offer not competitive. Many small business owners do not know the number of leads their site generates. In fact, many owners consider their site to be an expense instead of a marketing tool. This is a wrong perspective since a quality website will generate leads (and even sales) while you and your team are sleeping – 24/7. One of the challenging questions is where to start if your site isn’t working for you. Let’s take a look at three aspects to consider for better online performance.
Traffic is about balance and tracking. With PPC, SEO, and print media, you should know which advertising channel performs the best and returns the maximum ROI. Be sure to track each source to minimize unneeded expenses so that you can optimize your impact in the market. Of all traffic driving approaches for your website, SEO always will return the highest ROI for the smallest investment.
Do your visitors take action when they come to your site? Do people have an easy way to contact you? It is vital that you make it as simple and painless as possible for someone to take action. If you want them to buy, there should be a very clear ‘buy button’ or if you want them to call or complete a form, make sure it’s very easy for them to do these things. To improve conversion you may need a new landing page with better messages. Less is more and make it simple to act.
Not everyone will be ready to call or visit when they first come to your site. You should have an email newsletter where those who want to keep in touch with your business can be notified about upcoming special events, etc. One of the most underutilized marketing tools is the email newsletter. A highly converting website must have a way to track who has visited your website and to help you understand your traffic, be sure to have Google Analytics installed on the website.
Enhancing your site for greater search engine exposure is a process. As for improving your search ranking, regretfully there is not a single secret, but with the assistance of an expert search engine optimization company, your site can be a much more effective marketing tool. With consumers telling Google that 8 out of 10 of their search queries are starting in a search engine, and 4 out of 10 are a mobile search query, it is likely that when someone is looking for what you provide, they will start by asking Google on their phone. Isn’t it time to move your business to the next level with free traffic from Google?
To learn more about local SEO, watch the following video.
Tucson area business owners will benefit from having a highly professional expert search engine optimization consultant. Tucson SEO is a top rated company whose services stand out as being among the best. To learn more visit their website Tucson SEO.
Watch this video for more information on how SEO Tucson can 10x your organization or business. | 2019-04-21T06:05:39Z | https://www.wtc11.org/ |
January 18 (Proactive Investors) The AIM quoted exploration group intends to drill two wells in Mongolia during 2017, and it is pursuing a fresh farm-out to bring in a new partner.
Petro Matad Limited (LON:MATD) shares rose in Wednesday's early deals as it revealed that an awaited payment from Royal Dutch Shell is now expected in a matter of days.
The AIM quoted explorer is due cash following Shell's decision to back out of a partnership entered into by BG Group before it was scooped up by the Anglo-Dutch.
Today Petro Matad told investors that the 'protocols of reassignment' document had now been signed by all parties.
"Payment by Shell is therefore expected to be received within the next ten days," it said in a statement.
Petro Matad will retain 100% of the exploration blocks following Shell's decision to withdraw (78% stakes were previously entered into by BG Group) as it rationalised its portfolio of assets after the merger.
1. The designation and securities to which this report relates and the name and address of the head office of the issuer of the securities.
Common shares of the capital of SouthGobi Resources Ltd. ("SouthGobi"), whose head office is located at 1100 - 355 Burrard Street, Vancouver, British Columbia, Canada, V6C 2G8.
2. The name of the market in which the transaction or other occurrence that triggered the requirement to file this report took place.
3. The name and address of the acquiror.
4. The date of the transaction or other occurrence that triggered the requirement to file this report.
China Investment Corporation previously filed early warning reports in respect to a US$500 million convertible debenture (the "Debenture") LB purchased from SouthGobi and in respect to the exercise on March 29, 2010 of SouthGobi's right to call for the conversion of up to US$250 million of the Debenture, in respect to the receiving of paid in kind interest on November 21, 2013, and in respect of the receiving of paid in kind interest on November 21, 2014, and in respect of the receiving of paid in kind interest on November 27, 2015. China Investment Corporation is a sovereign wealth fund of the People's Republic of China.
Pursuant to the Debenture, since March 29, 2010, LB has acquired ownership of 40,123,980 common shares of SouthGobi, which includes 25,232,419 common shares previously issued and reported upon and 14,891,561 common shares issued on January 11, 2017, in each case, in satisfaction of the paid in kind component of the interest accrued on the Debenture.
7. The designation and number or principal amount of securities and the acquiror's securityholding percentage in the class of securities, immediately before and after the transaction or other occurrence that triggered the requirement to file this report.
Immediately prior to the issuances noted in item 2.2 above, LB held 49,875,030 Shares representing approximately 19.35% of the Issued Shares.
After giving effect to the issuances noted in item 2.2 above, LB owns and controls 64,766,591 common shares of SouthGobi, representing approximately 23.76% of the issued and outstanding common shares of SouthGobi as of January 11, 2017. LB also continues to own US$250 million of principal amount under the Debenture which, if converted at the current conversion price of Cdn$8.88 (and the currency exchange rate of 0.7397) would represent approximately 38.1 million additional common shares. If the Debenture in the principal amount of US$250 million that remains outstanding after the issuances noted in item 2 above is fully converted into SouthGobi common shares at the current conversion price of Cdn$8.88 and the currency exchange rate of 0.7397 then, together with the actual common shares owned or controlled by LB as of the date hereof, LB would own or control a total of approximately 102.9 million common shares or approximately 37.75% of the common shares of SouthGobi.
8. The value, in Canadian dollars, of any consideration paid or received per security and in total.
The amount of interest in respect of the 14,891,561 common shares issued on January 11, 2017 was US$ 4 million, and the price of the common shares was Cdn$ 0.36 per share.
Announcement made after Wednesday close.
The Board is pleased to announce that on 18 January 2017 (after trading hours), the Company and Minghua Group entered into the Exclusive Services Agreement under which the Company has been granted by Minghua Group the exclusive right to the provision of the Logistics Services.
The Company has agreed to pay to Minghua Group the Exclusive Right Fee in the amount of RMB100 million, which shall be satisfied by the Company through the issue of approximately 93,016,667 Consideration Shares at an issue price of HK$1.2 per Share to Minghua Group within 20 Business Days after the date of the Exclusive Services Agreement. The Consideration Shares will represent (i) approximately 3.08% of the total number of issued shares of the Company as at the date of this announcement; and (ii) approximately 2.99% of the total number of issued shares of the Company as enlarged by the allotment and issue of the Consideration Shares.
As the applicable percentage ratio in respect of the transaction contemplated under the Exclusive Services Agreement is less than 5% and the Exclusive Right Fee will be satisfied by the Company allotting and issuing the Consideration Shares under General Mandate, the Exclusive Services Agreement constitutes a share transaction of the Company under Chapter 14 of the Listing Rules.
TORONTO, ON--(Marketwired - January 18, 2017) - Centerra Gold Inc. (TSX: CG) will host a conference call and webcast of its 2016 fourth quarter and year-end financial and operating results at 11:00 a.m. (Eastern Time) on Friday, February 24, 2017. The results are scheduled to be released after the market closes on Thursday, February 23, 2017.
January 18 (MSE) Mongolian Stock Exchange established on 18 January 1991 by the Resolution No.: 22 of Mongolian Government in goal of developing securities market and starting privatization process.
It has been 26 years since the MSE's establishment. During this period, Mongolian Stock Exchange has been contributing development of national economy by creating the classical securities market with the purpose of mediating the accumulation of assets in the financial market by providing lowest possible cost with the long term. Mongolian Securities Market has adapted a favorable legal and efficient market infrastructure which level up with international standard and total amount of MNT2.1 trillion financial service were provided.
We would like to express our greetings and best wishes to all our investors, professional organizations and securities issuers on occasion of 26thanniversary of the establishment of Mongolian Stock Exchange and Mongolian securities market.
May the Mongolian securities market become a gateway to development!
The population of the Mongolia preliminary estimated 3120.9 thous.persons at the end of 2016, a growth of 63.2 thous.persons (2.1%) from the previous year.
In 2016, there were 79382 live births at national level, of which 78194 live births (98.5%) were born in Mongolia and 1188 live births (1.5%) were born in overseas.
At the end of 2016, birth rate of 25.4 per 1000 population and death rate of 5.2 per 1000 population.
This equates to a natural increase rate of 20.2 per 1000 population.
Compared to the previous year, there were decreases in birth rate by 1.9 percentage points, in death rate by 0.3 percentage points and in natural increase by 1.6 percentage points.
According to the Government Implementing Agency General Office of Labor and Welfare Service, there were 46.8 thous.persons seeking to work, of which 34.4 thous.persons (73.5%) are registered unemployed and 12.4 thous.persons (26.5%) are looking for a job.
The number of registered unemployed persons is 34.4 thous.persons which increased by 1.6 thous. persons (5.0%) from the same period of the previous year and by 1.0 thous.persons (3.0%) from the last month. There were 17.8 thous.persons (51.7%) thousand unemployed women.
The Government Implementing Agency General Authority for Health and Social Insurance of Mongolia reported that total revenue of Social Insurance Fund reached 1875.7 bln.tog in 2016. It was 375.4 bln.tog (25.0%) higher than last year. Total expenditure of Social Insurance Fund was 1786.2 bln. tog, an increase of 225.8 bln.tog (14.5%) compared with the previous year.
The Government Implementing Agency General office of Labor and Welfare Service reported that in 2016, total of 154.8 bln.tog was allocated from the Social Welfare Fund to 277 thous.persons for pensions and welfare benefits. The number of pensioners and welfare receivers increased by 77.3 thous.persons (38.7%) and the amount of pensions and allowances rose by 990.2 mln.tog (0.6%) compared with the previous year.
In 2016, 197.9 bln.tog as granted from the Human Development Fund to 1021.1 thousand children aged 18 and below in cash within the scope of the children program. (including 12.8 bln.tog were granted to 617.4 thousand children who are 60.4 percent of the total number of children in December 2016.
There were 552.0 thousand pupils of 778 general educational schools, increases of 10 general educational schools (1.3%) and of 16.9 thousand pupils (3.2%) compared with the preceding year.
There were 40.1 thousand students of technical and vocational schools, a decrease of 2.6 thousand students (6.1%) from the previous year.
There were 157.1 thousand students of colleges and universities, a decrease of by 5.5 thousand students (3.4%). Of which, 133.2 thousand Students (84.8%) were studied with bachelor degree.
In 2016, there 77803 women gave birth to 78194 live births across the country, number of maternity decreased by 2631 (3.3%) and live births by 2681 (3.3%) compared with the previous year. In December of 2016, there were 5960 maternities and 5994 live births, decreases of 302 maternities (4.8%) and 331 live births (4.9%) from the previous month.
There were 1315 infants and 1628 under-five mortalities recorded in 2016. Compared with 2015, infant and under-five mortality increased by 81 (6.6%) and by 152 (10.3%) respectively. The main causes of the infant mortality were diseases of the respiratory system and measles.
In December 2016, 93 and 120 cases of infant and under-five mortalities were registered. Compared with the previous month, infant mortality has increased by 13 cases (16.3%) and under-five mortality rose by 18 cases (17.6%).
According to the report of the Institute of Meteorology and Hydrology, a maximum precipitation was registered at 11.4 mm in Tosontsengel soum of Zavkhan aimag. Dalanzadgad soum of Omnogovi aimag had a maximum air temperature at 8.0°C, while Otgon soum of Zavkhan aimag had a minimum air temperature at minus 43.0°C in December 2016.
A maximum wind speed reached temporarily between 22 m/sec and 24 m/sec in Bulgan soum of Omnogovi aimag, Tonkhil soum and Bugat soum of Govi-Altai aimag.
In December 2016, as measured by over 15 air quality monitoring stations, the average daily concentration of nitrogen dioxide NO2 exceeded the acceptable level by 31 times in Zuragt, by 30 times in West crossroad, by 29 times in Tolgoit and Zuun-Ail, by 27 times in Kharkhorin market and 13th micro district, by 22 times in Urgakh naran micro district, by 16 times in Amgalan, by 6 times in Dambadarjaa, by 5 times in 1st micro district, by 4 times in nearby the Institute of Physics and Technique and by twice in Khailaast.
The average daily concentration of sulphur dioxide SO2 exceeded the acceptable level by 31 times in Zuragt and Tolgoit, by 30 times in Zuun-Ail, by 27 times in Amgalan, by 25 times in Bayankhoshuu, by 20 times in West crossroad, by 19 times in 13rd micro district, by 12 times in Urgakh naran micro-district, 9 times in Dambadarjaa and nearby the Institute of Physics and Technique, 8 times in 1st district, by 5 times in Kharkhorin market and by 4 times in Khailaast.
Dust content with less than 10 micron in the atmosphere of Ulaanbaatar exceeded the acceptable level by 31 times in Zuragt and Tolgoit, by 30 times in Zuun-Ail, by 29 times in Kharkhorin market, by 26 times 13th micro district and Amgalan, by 25 times in West cross road and Bayankhoshuu, by 22 times in Nisekh, by 17 times in 1st micro district, by 14 times Misheel expo and Urgakh naran district.
Dust content with less than 2.5 micron in the atmosphere of Ulaanbaatar exceeded the maximum acceptable level by 31 times in Zuragt and Tolgoit, by 30 times in west cross road and 13th micro district, by 28 times in Amgalan, by 25 times in Bayankhoshuu, by 22 times in Nisekh, and also the average daily concentration of carbon monoxide CO exceeded the acceptable level by 4 times in Zuragt and by once in Tolgoit respectively.
In 2016, 4381 disasters and accidents occurred, a decrease of 1041 disasters and accidents (19.2%) compared to the 2015. There were 3710 construction fires, a drop of 851 construction fires (18.7%) from the last year. In addition there were 81 animal madness diseases and 126 sheep small pox. As a result of disasters and accidents, 230 people died and 1059.4 thous.heads livestock and animals were lost.
Estimated damage caused by the construction fires amounted to 43.1 bln.tog and totally 1.4 bln.tog expended for disasters and accidents.
There were 27167 crimes recorded in 2016, a decrease of 590 offences (2.1%) compared with previous year at national level. This decrease was driven by falls in economic crimes by 293 (56.3%), in crimes against the rules of safety of traffic and use of motor vehicle by 227 (11.3%), in crimes against public security by 151 (9.3%) and in crimes against environmental protection rules by 63 (27.6%).
In December 2016, 2072 crimes were registered. This is decreases by 518 crimes (20.0%) from the same period of the previous year and by 413 crimes (16.6%) from the previous month.
As a result of crimes occurred in 2016, a total amount of damages was 162.9 bln.tog an increase of 18.6 bln.tog (12.9%) and amount of restituted payment damages was 44.0 bln.tog a decrease of 5.0 bln.tog (10.3%).
As a result of crimes occurred in 2016, 11257 persons were injured and 880 died. The number of injured persons decreased by 30 persons (0.3%) while the number of deaths increased by 33 deaths (3.9%) compared with the last year.
There were 805 thefts of livestock recorded which accounts for 3.0 percent of total reported offences.
It is a decrease of 375 thefts of livestock (31.8%) from the same period of the previous year.
In December 2016, total thefts of livestock were 57, a decrease of 20 thefts of livestock (26.0%) from the previous month.
According to a report of the Bank of Mongolia, money supply (broad money or M2) reached 12.0 trill.tog at the end of December in 2016, which increased by 361.9 bln.tog (3.1%) from the previous month and by 1927.0 bln.tog (19.2 %) compared with the same period in 2015.
At the end of December 2016, the currency issued in circulation reached 823.6 bln.tog which increased by 54.9 bln.tog (7.1%) from the previous month and by 117.0 bln.tog (16.6%) compared with the same period in 2015.
Loans outstanding amounted to 12.4 trill.tog at the end of December 2016, which decreased by 295.9 bln.tog (2.3%) from the previous month and increased by 716.1 bln.tog (6.1%) compared to the same period in 2015.
Principals in arrears reached 912.8 bln.tog at the end of December 2016, which decreased by 49.0 bln.tog (5.1%) from the previous month and increased by 58.8 bln.tog (6.9%) compared to the same period in 2015.
At the end of December 2016, the non-performing loans over the banking system reached 1082.8 bln.tog, which decreased by 84.2 bln.tog (7.2%) from the previous month and increased by 213.0 bln.tog (24.5%) compared to the same period in 2015.
In 2016, 97.1 mln.pcs were securities traded are valued at 462.9 bln.tog in the stock market.
The securities trading was decreased by 435.6 bln.tog (48.5%) and shares increased by 55.4 mln.pcs (2.3 times) compared to the same period in 2015.
In December of 2016, 38.3 mln.pcs were securities traded are valued at 150.2 bln.tog in the stock market, which increased by 104.0 bln.tog (3.3 times) of 35.1 mln.pcs (11.8 times) compared with the previous month.
In 2016, total equilibrated revenue and grants of the General Government Budget preliminary amounted 5852.1 bln.tog and total expenditure and net lending amounted to 9519.9 bln. tog, representing a deficit of 3667.8 bln.tog in the equilibrated balance.
Total expenditure and net lending of the General Government Budget reached 1783.2 bln. tog in December 2016, which indicates an increase by 861.2 bln.tog (93.4%) from the previous month.
Tax revenue reached 4996.8 bln.tog which showed a decrease of 122.1 bln.tog (2.4%) from the previous year. This fall was mainly due to drops in other taxes and fees by 283.1 bln.tog (32.6%) and in income tax by 149.8 bln.tog (12.8%) even there were increases in social contributions by 157.8 bln.tog (15.5%), in value added tax by 93.5 bln.tog (8.9%), and in excise taxes 34.6 bln.tog (5.8%).
In 2016, Mongolia traded with 157 countries from all over the world and total external trade turnover reached 8275.3 mln.US dollars, of which 4917.3 mln.US dollars were made up by exports and 3357.9 US dollars by imports.
Total external trade turnover decreased 191.5 mln.US dollars (2.3%), of which imports decreased by 439.6 mln.US dollars (11.6%) and exports increased by 248.1 mln. US dollars (5.3%) compared with the previous year.
In 2016, surplus of external trade balance reached 1559.4 mln.US dollars it has risen by 687.6 mln.US dollars from 871.8 mln.US dollar in 2015.
In December 2016, surplus of external trade balance reached 362.3 mln.US dollar, an increase of 123.0 mln.US dollar (1.5 times) from the previous month.
In December 2016, the national consumer price index for across the country increased by 0.7 percent from the previous month and by 1.1 percent from the end of the previous year.
This slight increase of 1.1 percent from the end of the previous year was mainly due to increases of 0.3 units (29.4%) in prices for food and non-alcoholic beverages group, of 0.3 units (25.2%) in prices for clothing, footwear and cloth group and of 0.2 units (16.4%) in prices for health group.
The national consumer price index for capital city consumers increased by 0.5 percent from the end of the previous year, which was mainly due to increases of 1.4 percent in prices for food and non-alcoholic beverages group and of 7.8 percent in prices for health group.
A slight increase of 0.9 percent from the previous month was mainly due to increase of 3.0 percent in prices for food and non-alcoholic beverages group, of which increases of 7.0 percent in prices for potato and vegetables subgroup and of 5.8 percent in prices for meat and meat products subgroup.
In 2016, number of livestock reached 61549.2 thousand heads, of which horse was 3635.5 thousand heads, cattle was 4080.9 thousand heads, camel was 401.3 thousand heads, sheep was 27856.6 thousand heads and goat was 25574.9 heads.
As a report of harvesting in 2016, 483.5 thous.tons of cereals, 165.3 thous.tons of potatoes, 94.4 thous.tons of vegetable were harvested and 1275.4 thous.tons of gross hay harvest, 45.8 thous.tons of handmade fodder were produced. It reveals that harvest of cereals increased by 267.2 thous.tons (2.2 times) potatoes by 1.6 thous.tons (1.0%), vegetables by 22.1 thous.tons (30.5%), gross hay harvest by 246.7 thous.tons (24%), and handmade fodder by 5.9 thous.tons (14.8%) from the previous year respectively.
The industrial production index (seasonally adjusted) was 154.2 (2010=100) in December 2016 which increased by 18.8 percent from the same period of the previous year, by 1.9 percent the previous month.
In the mining and quarrying sectors the mining of products such as copper concentrate, zincum concentrate, iron ore, concentrate, gold, coal increased by 8.3-46.7 percent and in the manufacturing sector the production of products, such as copper, pure water, beer, cement, milk, soft drinks, alcoholic beverage, kind of sausage, printing plastic cards, railway sleeper increased by 0.1-75.8 percent compared to the same period of the previous year.
But in the mining and quarrying sectors the mining of products such as molybdenum with concentrate, crude oil, fluor spar, concentrate, broken or crashed stone decreased by 0.6-28.1 percent and in the manufacturing sector production of major commodities such as spirit, bakery products, steel casting, lime, sawn wood, building door and windows, articles of iron concrete, vacuum windows and doors, metal steel, metal foundries decreased by 0.2-66.5 percent compared to the same period of the previous year.
In 2016, the total carried freight by all type of transport reached 40.3 million tonnes, a rose of 4.5 million tonnes (12.6%), the number of passengers reached 264.0 million passengers (double counting), reflecting an increase of 4.0 million passengers (1.5%) compared with the same period of the previous year.
January 18 (news.mn) Mongolia is to reconstruct some old parts of building of the Government Palace due to the risk of earthquakes. As reported by working group of inspectors, a total of MNT 42.4 billion in investment is needed for rebuilding of some parts of the structure. Rebuilding process will begin from 2018.
The 'Saaral Ordon' or 'Grey Palace', as it is known locally, was built in 1947-1951 and is home to the State Great Khural (parliament) and the Presidential Administration. A minor earthquake hit the Mongolian capital in 2015, which triggered discussion on what damage a larger quake could cause.
Ulaanbaatar, January 18 (MONTSAME) Arkhangai aimag, one of central provinces of Mongolia has a population of 93.5 thousand by the end of 2016. With number of population, Khovsgol ranks first among provinces, following Uvurkhangai and Arkhangai.
However, density in Arkhangai is 1.7 persons per square kilometer, which is 15 per cent lower than national average. 21.500 citizens of the province live in the aimag center, 17.900 in soum centers and remaining 20 per cent sparsely reside in countryside.
Population density is the highest in Ulaanbaatar, Erdenet and Darkhan cities, while Bayan-Ulgii, Selenge, Gobisumber, Uvurkhangai and Arkhangai are considered sparsely populated.
Ulaanbaatar, January 18 (MONTSAME) A project to build logistics center in Zamiin-Uud soum of Dornogobi aimag, where the predominant border point for container transport by railway locates, is underway.
The logistics center aimed at developing the region is significant to increase exports, imports and transit transportation and influence positively to the economy. The Government of Mongolia established an agreement with the Asian Development Bank on financing the project and 60 per cent of the estimated cost or USD45 million is covered by the bank's grant aid and soft loans.
The logistics center is planned to cover 128 ha of land, consisting of zones for terminal, customs and other facilities, and for truck waiting area. The Project design includes a road connection with an overpass (bridge) above the UB Railways mainline, providing easy direct connection between the border post and the logistics center. The proposed intermodal or multimodal logistics facility will enhance trade between the two countries and will reduce times for cargo transfers and reduce costs for shipping goods.
Currently, the construction and installation works of 3.6 km of drinking water line, the overpass (bridge), 1.6 km paved road, 4.15 km of exterior fiber-cable line, power plant substation and 110 KW electricity line have been executed by 9 national contract companies. The construction works are scheduled to be completed in 2018-2019.
Ulaanbaatar, January 18 (MONTSAME) An official opening ceremony of Mongolia's largest solar power plant will be held on January 20. The solar power plant located in Khongor soum of Darkhan-Uul aimag was built by Mongolian Solar Power International LLC and Japan's Sharp Corporation and Shigemitsu Shoji Co.,Ltd.
It has a 10 MWt capacity to generate 15.2 million KWT/h energy annually, supplying them to the central energy system and preventing from 14.746 tons of greenhouse gas emission.
The plant is equipped with 32 274 high-performance solar panels from Sharp Corporation of Japan. It was introduced with the latest technology and know-hows and was supplied by low and high voltage electrical facilities and other equipment from CMA Group of Germany and ABB Company of Sweden.
It's electrical wires meet requirements to work effectively and reliably during extreme weather conditions that reach -30 to -40 C.
This first mega solar power plant has been operating since December 2016 to generate energy to the central energy system of Mongolia.
Ulaanbaatar, January 18 (MONTSAME) The Mongolian biggest cashmere brand Gobi opened its new factory store branch at the Department Store of Erenhot city, China last Friday.
All 100-percent cashmere products such as coats, dresses and sweaters will be sold at the store. Other branch stores of the "Gobi" brand were opened in Berlin, Germany in November and at the "Haneda" airport of Japan in December 2016.
The Gobi Corporation has exported 40 percent of its total coat products to foreign countries in 2016 and now they are aiming to bring the number up to 80 percent. The company is also planning to launch new retail stores in Belgium, Great Britain, Switzerland and another three countries in 2017 with a view to increase their sales on foreign markets.
January 18 (UB Post) Member of Parliament M.Oyunchimeg received the Asia Foundation's Country Representative in Mongolia, Meloney Lindberg, to discuss the promotion of the businesses of female entrepreneurs.
MP Oyunchimeg noted that whenever she meets with her electorate, women entrepreneurs always ask her to help them find ways to connect to business networks to sell their products.
She said that they have faced challenges in reaching customers. MP Oyunchimeg asked Lindberg to help women participate in the Women's Business Center (WBC) project being funded by Korea International Cooperation Agency (KOICA) and implemented by the Asia Foundation.
Meloney Lindberg stated that 829 women have taken part in the WBC since it was launched in 2016, and that the project will be implemented until 2018. She noted that the project's resources are available to women entrepreneurs who are interested in taking part in the business incubator.
The center helps women entrepreneurs learn how to write a business plan, offers business advice, helps its members improve their marketing skills, and teaches women how to access financial resources.
January 16 (Mongolian Mining Journal) In recent years, Kazakhstan has become one of the world's leading countries in exploiting its radioactive mineral resources such as uranium, beryllium, tantalum, niobium, lithium, and rare metals and rare earth elements, reaching a high level of excellence in their exploration and extraction, and in using modern production technology.
State-owned Kazatomprom is the world's largest producer of uranium, the most important of these minerals. The country's 14 deposits hold the world's second largest reserves of natural uranium, and its 22 uranium mines employ 26,000 workers. Kazakhstan's trade partners include the US, China, India, South Korea, Japan, the European Union and Russia.
Several of Kazakhstan's uranium deposits were identified and the basis of their future intensive extraction laid when the country was part of the Soviet Union. At present there are 129 recorded deposits, most of them roll front, as in Mongolia. Most of the 22 active mines are owned by Kazatomprom, which does everything from exploring to extracting to exporting.
Most of these mines are in the Syr Darya river's basin in Kyzylorda State, the two major ones being Harasan–1 and Harasan– 2. With its annual output of 2,000 tons, the expected life of the latter is 40 years. Its uranium grade is 0.021%-1.016%.
Location map of uranium deposits in Kyzylorda State.
I recently spoke with Mukhtarkhanovich Baurzhan Ibraev, Chief Director of Production at Kazatomprom to learn more about Kazakhstan's uranium industry. He had once worked in Mongolia. I also made a study tour of Harasan-2, Baiken-U in Kyzylorda. Ibraev and I spent a very busy and interesting two days together on a road trip. Among the topics we discussed was possible cooperation between Mongolia and Kazakhstan in the uranium sector.
As a senior mining professional and the first President of democratic Mongolia, I felt sad to see how far Kazakhstan had gone ahead of Mongolia, even though the state of the uranium sector in our two countries was more or less the same in the early 1990s. We are yet to leave the starting block, as Kazakhstan races on. After 20 years of "Stop Mardai", "Close this", "Drive out Khan Resources", "Delay Areva".... we should realise enough is enough.
The number of nuclear plants is set to increase and the demand for nuclear fuel will rise radically. If we wish to benefit from this, we have to take two quick decisions.
First, we should build a pilot plant based on Areva's uranium deposit.
Second, we should seek the cooperation of Kazakhstan in developing our radioactive minerals resources. From what I saw, Kazakhstan has the professional resources, equipment and technology. Investments also can be attracted from there and from those already working there.
We can begin with producing the "yellow powder" that is not hazardous for people, livestock and environment.
(Your Amazing Places) Mongolia is a country located in Central Asia and borders with Russia and China. Mongolia is a sparsely populated country. The capital city is Ulaanbaatar with 1.5 million inhabitants.
Ulaanbaatar is located at 1350 meters above sea level, in the center of Mongolia on the River Tull. Ulaanbaatar was a mobile town that moved several times to different location. The city as a permanent location becomes in the 18th century and was originally a nomadic Buddhist center. Over the next century, over half the population of the Ulaanbaatar city consisted of Buddhist monks, who among other things founded many monasteries. Some of them now are the target of tourists. Square monasteries are a combination of the Mongolian and Chinese style construction. So, the most popular are monasteries Choijin Lama Temple. Their importance is not only a religious and cultural, but also belong to the rare Buddhist objects that survived the socialist overturn and the Russian intervention in the 20th century.
Due to the high altitude and because of the distance from the sea, the city of Ulaanbaatar applies to the coldest capital in the world. Throughout the year there are short a very cold winters and long hot summers. Average temperature is -1,3 ° C, while in January the temperature reaches to -16° C.
Ulaanbaatar has several museums dedicated to Mongolian culture and history. Natural History Museum has many fossil remains and meteorites found in Mongolia. National Museum of Mongolian History includes samples from prehistoric times.
If you want to try something new, to see something extraordinary and if you want to feel the coldest capital of the world, we recommended visiting Ulaanbaatar city. It is the "eye" of Mongolia, city with its own charm and magic.
Ulaanbaatar, January 18 (MONTSAME) Today, Prime Minister J.Erdenebat received U.S. Ambassador Jennifer Zimdahl Galt and some US business representatives from Polaris Asset Corporation, General Electric and J.P. Morgan. The Ambassador expressed her readiness to help the Government of Mongolia in all aspects during the period of economic difficulties.
Ambassador Jennifer Zimdahl Galt wished success in ongoing talks between the Government of Mongolia and the International Monetary Fund and stated that the embassy would cooperate to successfully implement the second compact of US Millennium Challenge Corporation in Mongolia.
General Electric is working together with 'Erdenes Mongol' company to implement a liquefied coal project (producing petroleum and other byproducts through liquefying coal), financed by J.P.Morgan. The project will bring positive impacts to the citizens and the economy, ensuring energy independence of Mongolia, reducing air pollution of Ulaanbaatar, lowering dependence on imported oil and reducing outflow of money, underlined the project team member. After the project completion, the coal liquefaction plant will be transferred to the ownership of Mongolia.
PM J.Erdenebat said the government would support this kind of project that the project implementer had found financial source or the investor. PM also underlined the project should be realized without delay. "Although Mongolia now faces economic difficulties, it is a country with very high promising future and our economic growth will achieve high. Therefore, considering the market, the main raw material reserves and future of Mongolia, you can be confident that you are implementing prudent and non-risky project.
January 18 (gogo.mn) 10th annual Japanese film days are now held in Tengis cinema until Jan 20th. Embassy of Japan in cooperation with Japan Fund are organising the event.
Synopsis: Takao, who is training to become a shoemaker, skipped school and is sketching shoes in a Japanese-style garden. He meets a mysterious woman, Yukino, who is older than him. Then, without arranging the times, the two start to see each other again and again, but only on rainy days.
Synopsis: Eikichi, having trained at an established tofu maker in Kyo, comes to a traditional town of Fukagawa Hamaguri-cho in Edo to open his own shop, where he meets Ofumi, a true-born Fukagawa girl full of life. With the help of Ofumi's father, Eikichi finds accommodation at the same tenement as Ofumi. Eikichi finally opens "Kyo-ya", his long-planned Tofu shop of his own. Eikichi and Ofumi get married before long and build a home together. The business thrives, but their eldest son, who becomes tired of Tofu making, gets involved with gambling. The shop is taken over by another tofu maker as payment for debts, and the family is on the brink of disintegration. To make matters worse, Eikichi suddenly dies in an accident. Remembering that Tofu making was Eikichi's life, Ofumi and the children decide to protect Kyo-ya.
January 16 (VietMaz.com) The Vietnamese embassy in Mongolia has co-ordinated with the Vietnamese Association there and held a get-together for more than 160 overseas Vietnamese in the country.
Addressing the meeting, Vietnamese ambassador to Mongolia Hoang Tuan Thinh reviewed Vietnam's socio-economic achievements, the country's important events in 2010 and the success of the 11th National Party Congress. Mr Tuan also highlighted the fine relationship between Vietnam and Mongolia through the exchange of high-level delegations as well as contributions by Vietnamese community in Mongolia for raising funds for flood victims in Vietnam.
Mr Thinh wished the embassy staff, overseas Vietnamese and students a successful year and hoped the association will serve as a bridge of friendship between the peoples of both nations.
President of the Vietnamese Association in Mongolia, Nguyen Huy Tuan, also expressed hope that the embassy staff and overseas Vietnamese will continue to promote last year's achievements and that the Vietnamese community in Mongolia will continue to work hard and respect their resident country's customs and traditions.
HMA Catherine Arnold talks about what to expect in 2017.
2016 has been a significant year.
Here in Mongolia you hosted a very successful ASEM conference. I would like to congratulate Mongolia on its global success. You also held parliamentary elections and invited the OSCE to monitor them, for the first time. Democracy is something that our two countries share. Our governments and our people share the importance of democracy and the wider values it brings, such as freedom to express ourselves and increasing transparency.
In the UK we held a referendum on the UK's membership of the European Union. The UK is and will remain an outward looking and engaged global player and here in Mongolia I look forward to building our strong relationship even further.
2016 has been a busy year for UK and Mongolia partnership. We have worked together to strengthen democracy and transparency. We have worked together to strengthen global peace and security through peacekeeping and human rights. We have worked together to help counter the illegal trade in wildlife. I would like to thank all our many partners for making this possible.
The UK continues to work with Mongolia to support the sustainable development of your economy – through education, innovation and technology. I recently went to the UK with a mining delegation led by the Vice Minister of Mining to promote investment into Mongolia. And I want to continue to work with you to show the world what Mongolia has to offer.
Open is the word I use most about Mongolia. You are an open people with an open democracy. You are open to business and open to tourism.
You have continued to show this openness and warmth to me and my embassy this year, here in UB and as we have travelled around this extraordinary country. You have taught me to play Polo in UB, sing Mongolian folksongs in Gobi Altai, and to make aruul in Khuvsgul.
May 2017 and the years that follow bring you and your country blessings and opportunities.
January 18 (UB Post) Rates of tuberculosis in Mongolian school-aged children are up to five times higher than previous estimations by the World Health Organization (WHO), according to new findings from Mongolia's first clinical study of tuberculosis in children.
Preliminary results show there are 1,479 active cases of tuberculosis (TB) in 100,000 school-aged children, putting it in line with South Africa, where the TB epidemic is the country's number one cause of death.
The study, by the Mongolian Health Initiative in conjunction with the Harvard T.H. Chan School of Public Health in the United States, also found that 10 percent of school-aged children had latent (inactive) TB.
Mongolian Health Initiative (MHI) research fellow Dr. T.Mendsaikhan, who was on the study team, said the early results were alarming.
"The results of our study show it's very high- much higher than the predictions by the World Health Organization, which predicted 500 to 1,000 cases in 100,000," Dr. T.Mendsaikhan said.
"The cases of latent TB were at 10 percent, and previous figures showed it was only two percent, so there's been a huge increase in latent TB in children.
"This shows that we have to take more action on TB."
The study's other results revealed that passive smoking increased the TB rate in children by a worrying 22 percent. And the risk of contracting the disease is four times higher when there is a TB-infected person living in the household.
A 2015 study revealed that Mongolia is the fourth highest tuberculosis-burden country in the Western Pacific Region. It is the sixth leading cause of death amongst the population and the first leading cause of death from communicable diseases.
TB is an infectious disease caused by the Mycobacterium tuberculosis which is spread by airborne transmission from person to person. It spreads when someone with the untreated, active form of tuberculosis coughs, speaks, sneezes or spits.
In latent TB, which is usually acquired in childhood, people still have the TB infection, but the bacteria remains in the body in an inactive state and causes no symptoms. While it is not contagious, latent TB can turn into active TB, so treatment is important.
Despite wide access to TB drugs, people still die from TB. In Mongolia, even though babies are vaccinated within 24 hours of being born, the disease is being spread in later life due to more cases of drug-resistant TB, symptoms being ignored and incorrect diagnosis of the disease.
The next stage of the trial by MHI is determining if vitamin D can reduce the prevalence of latent TB in school-aged children.
More than 8,000 students aged six to 13 years from 15 schools in six districts of Ulaanbaatar are taking part in the trial, which will conclude by 2019. The students take a vitamin D gel tablet once a week.
International studies have shown that vitamin D pills are proving effective when the body cannot produce enough of the vitamin from radiation by the sun. The low-cost pill has been used in countries to prevent tuberculosis with some promising results.
Dr. T.Mendsaikhan, who works as a pediatrician at a private clinic, SOS Medica Mongolia, said many Mongolians suffer from vitamin D deficiency as a result of the dark winter months and not enough sunlight, along with a lack of vitamin D rich food.
"Vitamin D tablets are becoming more popular in Mongolia and are readily available at pharmacies. Children should be taking these especially in the winter months," she said.
Vitamin D is also found in oily fish, cow liver, eggs, yeast and some dairy products.
In 2016, Mongolia began fortifying some brands of milk with vitamin D in an effort to combat deficiencies from inadequate sun exposure and poor vitamin D dietary intake.
Dr. T.Mendsaikhan also warned of the dangers of ignoring latent TB.
"In Mongolia, people with latent TB don't take medicine but they should be," she said.
"The medicine is available but it's not being prescribed. There needs to be a health directive or policy that says people with latent TB must take medicine to suppress the bacteria. At the moment, that's not happening, it's being ignored."
In Mongolia, 74 percent of overall TB cases are among poorer people living below the poverty line, according to WHO.
Dr. T.Mendsaikhan said one of the most important messages is spreading the word to parents about the risks of TB.
"We encourage parents to keep their children's immune system strong and healthy with good sleep and diet,'' she said.
"The other message is that tuberculosis can still affect anyone, whether your child is at a school in the ger district or at one of the best private international schools."
While Mongolia has one of the largest numbers of TB cases in the world, the impact of the disease on children has not been widely acknowledged. But Dr. T.Mendsaikhan said that attitude is slowly changing.
"Tuberculosis in children is becoming a more popular issue right now due to our study and other studies," she said.
"A lot of TB cases in children are not being diagnosed and treated properly and that's something that has to change."
January 18 (Western Washington University) The Karen W. Morse Institute for Leadership is excited to announce that we will leading a second global studies program to Mongolia in Summer 2017! Issues in Global Leadership will explore the rich, ancient history of Mongolia as well as the newly democratic Mongolia of 27 years. Students will be living in a developing country, learning about Mongolian leadership practices through interviews with leaders from a variety of sectors and visiting organizations aimed at supporting inclusive leadership development.
Throughout the course, we will explore the roles and identities of leaders in education, social services, journalism, politics and government, environmental social change, business and entrepreneurship, and the arts. In addition, we will visit several museums, temples, cultural monuments and performances. The program will spend two weeks in the capital city, Ulaanbaatar, and six days travelling the country side (or the "steppe"), spending time in the historical city of Kharkhorum and Hustai National Park.
The program is six weeks: the first week on campus, three weeks abroad and two weeks back on campus. The cost is $5,800, all-inclusive (airfare, lodging, meals and cultural excursions).
For more information, visit our website, take a look at our video from last summer's trip to Mongolia and join our Mongolia 2017 Facebook page to start conversations, ask questions and receive up-to-date information about trip details, application deadlines and more!
January 17 (Voice of Mongolia) Severe winter continues in Mongolia. According to the last Asia and the Pacific Weekly Regional Humanitarian Snapshot, an estimated 157,000 people or 37,000 herder households across 17 out of 21 provinces in Mongolia are affected by severe winter condition Dzud. A drought during the summer of 2016 has depleted herders' reserves of hay and fodder in the eastern part of the country putting at risk livestock which are a vital source of food, transport and income for thousands of people. Multipurpose cash grants to support life-saving basic needs, emergency agricultural inputs and veterinary first aid kits have been identified as priority needs. The Office of the Deputy Prime Minister has established a task force to coordinate the response to the harsh winter conditions.
Ulaanbaatar, January 18 (MONTSAME) A group led by U.Khurelsukh, Deputy Prime Minister and Chief of National Emergency Management Commission of Mongolia has worked in Chinggis Khaan, Dadal, Bayan-Adarga and Norovlin soums of Khentii province, the regions faced with harsh winter conditions.
Snow depth has reached 30 cm and even 50-60 cm in some soums of Khentii province. The Deputy Prime Minister rendered 210 tons of grass, fodder and other assistances to herders and three ambulances to the authorities of Bayanmunkh, Dadal and Bayan-Adarga soums.
According to the report of governors and the Emergency Management Office of Khentii province, winter conditions have worsened not only in three soums, but also in all northern soums of the province. Due to heavy snowfall in late 2016, Bayan-Ovoo, Batnorov, Dadal, Binder, Batshireet, Umnudelger, Tsenkhermandal, Jargaltkhaan and Kherlen soums have been encountered with difficulties and the snow depth has reached 5-30 cm and 40-60 cm in some areas, posing a danger to livestock grazing.
Therefore, Deputy PM U.Khurelsukh obliged the governors of soums and province to oversee the spending of assets and money rendered from the Government of Mongolia, pay attention to people's health, support herders in every possible way after conducting surveys on herder families living in areas confronted with wintering troubles. They were also ordered to request an assistance from the National Emergency Management Commission, if the budget runs short to carry out the activities.
On January 19, the Deputy Prime Minister will be working in Dornod province.
January 18 (Catster) Snow leopards in Mongolia recently received a "land grant" that will help the rare big cats thrive. Last spring, Mongolian government declared the Tost Mountains a nature reserve, one of four categories of state-protected areas. The new park will comprise approximately 5,072 square miles.
Located between the Great Gobi and the Gobi Gurvansaikhan National Park, which are already protected areas, the Tost Tosonbumba Nature Reserve is home to 14 to 16 adult snow leopards and their cubs, not to mention the ibex and argali that are the staples of their diet. They can now safely roam what is one of the world's largest continuous protected snow leopard habitats, according to the Snow Leopard Trust, based in Seattle.
Mongolia is home to some 1,000 snow leopards, a population second only to that of China. The ability of the cats to move freely throughout the region will help to promote genetic diversity.
The new designation means that only traditional economic activities, such as herding, will be permitted in the area. Mining, construction, and hunting will be banned.
Before the area was set aside, approximately a dozen licenses for mining exploration had been issued, and two mining sites are active. That means the licenses must either be revoked, with the affected companies being compensated for the loss, or the licensed land must be kept out of the reserve.
Bariushaa Munkhtsog, a senior researcher in the mammalian ecology laboratory of the Mongolian Academy of Sciences Institute of Biology, said what will probably happen is that licenses — which are typically issued for a two-year period — simply won't be renewed when they expire.
Ulaanbaatar, January 18 (MONTSAME) The 40th Men's, 25th Women's and 5th Team National Judo Championships took place on January 16-17 to conclude with interesting results.
On the first day of the championships, the announcement of retirement made by 2012 London Olympic bronze medalist S.Nyam-Ochir was a big news to Mongolian judo fans. "I have been associated with judo for more than 20 years. I am truly grateful to my peers, coaches and family for being there for me all this time. Although I am ending my career as a sportsman today, I am officially transferring to the duty of a coach. I will do my best to train good judokas in Mongolia", he said. The judoka has earned Mongolia numerous medals from international judo competitions , including a bronze medal from the 2015 World Judo Championships, two silver medals from the 2009 and 2013 Asian Judo Championships.
Proving his skills once again, 2008 Olympic gold medalist and 2012 Olympic silver medalist N.Tuvshinbayar challenged himself in +100 kg weight category for first time, and took the first place. The Olympic champion usually competes in -100 kg.
Judoka O.Uuganbaatar won his fifth gold medal at the national championships in men's -81 kg category.
A new national champion was born in men's -60 kg, the most competitive category of the championships. J.Amarbold, judoka of 'Suld' sport committee won a gold medal at the age 20.
In women's -57 kg, Rio Olympic silver medalist D.Sumiya claimed the title of national champion after defeating all of her opponents.
In women's -48 kg, world champion, Tokyo Grand Slam winner M.Urantsetseg won her second gold medal.
National champions D.Sumiya and G.Altanbagana who won a gold medal in men's -90 kg became the best judokas of the national championships.
January 18 (gogo.mn) State Philharmonic Theatre will host classical music concert on Jan 26th at 7 PM.
The Symphony No. 5 of Ludwig van Beethoven and symphonic suite "Shekherazada" of N. Rimsky-Korsakov to be performed at the concert.
Tickets are available now at the ticket office of State Philharmonic Theatre and www.ticket.mn.
January 18 (gogo.mn) Tsetserleg soum, Arkhangai aimag to host Winter festival 2017 on Jan 21st, aiming to to develop winter tourism in Mongolia. Governor's office of Arkhangai aimag is organising the event.
Location: Tsetserleg, the capital of Arkhangai aimag in Mongolia, which locates 600 km southwest of Ulaanbaatar.
January 18 (Great Falls Tribune) One thing Greg Schatz noticed during his trip to Mongolia was just how tough the Mongolian people are.
"You really don't understand just how soft Westerners are," Schatz said.
Schatz traveled to Mongolia with his wife for a three-week horse packing trip. Now, they're being sponsored by the Island Chapter of the Montana Wilderness Association to tell their stories and share a travel slideshow.
"The Mongolians are harder than nails," Schatz said. "They sit on the bare ground to eat their meals, and when it's time to sleep, they lay down where they are and use their elbow as a pillow."
"Where we went was one of the last places in the country with little to no Western influence," Schatz said. "The Mongolians wanted to learn about guiding, packing and outfitting so they could run an outfitting business without hiring Westerners."
Ten Western packers, including Schatz and his wife, Deborah, joined 10 Mongolian herders to learn each culture's equestrian customs.
Schatz describes the Mongolian people as overtly open people who are friendly and willing to listen — even if they don't always understand.
"They get up and ride their horses from the morning until they're done around midnight or two in the morning," Schatz said. "They couldn't wrap their heads around the way Westerners start their day at nine, break for lunch and typically like to be off their horses by three in the afternoon. They found it funny. They would never consider stopping so early because they never get sore. They've been riding before they could walk."
"All of Mongolia is public land — no one says this is mine, this land is mine," Schatz said. "I remember one day there was a terrible storm. It was windy and the rain was coming down. The Mongolians turned their horses' rears to the wind and got down under their chests. Well, I'm 6'4". I don't fit under a horse — especially a Mongolian horse."
"We stayed with strangers," Schatz said. "The herders had never met these people before. Can you imagine inviting strangers into your home and feeding them?"
Schatz said he learned about the Mongolian sense of community and how rare it is for a Mongolian to say "mine."
When a person leaves their ger for the day, they don't secure their home. Instead, they leave food out on the table should a hungry traveler pass by and need a meal and a place to take a break.
January 18 (Gold Coast Bulletin) Intrigued by Belize? Curious about Costa Rica? Dreaming about Vanuatu?
Now here's a really good reason to visit in 2017 - they're all on a new hot list of destinations where you can be sure your trip won't be guilt trip.
Holidaying in developing countries can often raise a complex set of questions and concerns - like, "Is tourism really helping the local people?" or "Am I damaging the environment by visiting?".
Thankfully, the folk at Ethical Traveler have answered these questions and come up with a list of stunning emerging destinations around the world where you can be confident you're doing the right thing by visiting.
Each year, the organisation researches the policies and practices of the world's developing nations, using data from groups such as Amnesty International and the UN to find the 10 most ethical destinations.
Criteria include forward-thinking policies, tourism infrastructure, natural beauty and welcoming cultures.
From tropical islands to quirky cultural gems, these up-and-coming holiday spots are making a big impression for all the right reasons. Take a look at the list - and get booking.
It's famous for its yurts, mountains, desert and nomadic culture but Mongolia isn't without its modern conveniences. A new airport and Shangri-La hotel complex - including IMAX cinema and Hard Rock Cafe - are scheduled to open this year, earning the country a gong as one of Lonely Planet's most exciting destinations for 2017. The country's major investment in education and environmental policies helped its standing as one of the world's most ethical destinations.
For current Mongolia's visa requirements for 193 nationalities, visit Indy Guide's Visa-Check.
Looking for local guides, tours, drivers or accommodations in Mongolia? | 2019-04-18T19:16:02Z | http://covermongolia.blogspot.com/2017/01/matd-jumps-on-shell-money-cic-gets-paid.html |
We know now that all those paper profits that puffed our portfolios were as solid as tsarist rubles and that the “compassion” which briefly infused conservatism was a bribe to get a few thousand seniors to vote Republican once—in return for leaving their grandchildren eyeball-deep in debt. But wasn’t it fun while it lasted? Who could have possibly predicted that all the experts who carefully managed the investment boom, and the technocrats in academia and government who enabled and cheered them on, would wind up as deeply discredited as Bernie Madoff’s word of honor?
Harry Veryser’s lively and readable new book has the answer: the Austrian economists, that’s who. In It Didn’t Have to Be This Way, this economist and entrepreneur shows how the current morass was the unavoidable outcome of specific policy decisions, some of which reach back decades—and how thinkers of the Austrian school of economics, exiled from academia and ignored by policymakers, accurately predicted how the crisis would come.
The basic narrative is not in dispute: banks, under pressure for short-term profits and goaded by regulators who wanted to enforce racial equality in home ownership, made hundreds of thousands of loans to people who… had never checked their credit ratings. Some of them had gone bankrupt. Others earned less in a month than the monthly mortgage payments they’d soon have to make. Many were middle-class people who’d already mortgaged the homes they actually lived in; they bought additional properties they could never pay for but hoped to “flip,” on the theory that real estate prices never go down. Such loans, which any sane accounting would tally as worthless, were sliced up, repackaged, and granted AAA ratings, then sold as securities—and our retirement plans duly purchased them, which is why you and I will be working until we are 80. We all know this much.
What in fact tanked our economy was something quite simple that Veryser explains in satisfying detail: politicians eager to win votes tried to keep the economy hyperstimulated by feeding it with ever more money. As a result, there was too much money floating around with no good place to go, so banks lowered their standards and made ever riskier loans. Such “mal-investments” were doomed from the get-go, and the longer government policies tried to keep the pyramid scheme standing, the higher the tab would get. What happened in 2008, Austrians know, was nothing new; in fact, such artificial booms pervade our history, from the ultra-low interest rates Alan Greenspan gave President Clinton—which puffed up share prices for the dotcoms of the 1990s—to the stock and real estate bubbles of 1927-28. Because they direct resources to places where they don’t belong, investment bubbles amount to little more than paying people on your credit card to dig a bunch of holes, then borrowing still more to have them all filled in. Yes, this does boost employment, for a while. But what are you left with in the end?
Veryser points to such key Austrian theorists as Ludwig von Mises, Friedrich Hayek, and Wilhelm Röpke, who predicted that bubbles and subsequent crashes were the unavoidable result of politicizing the currency—of cutting the last ties between the money supply and tangible assets such as gold. It should sober boosters of the Republican Party that the last such link to gold—and hence to real-world discipline on politicians—was severed by Richard Nixon in 1971. Veryser also shows how economic, political, and international turmoil can be traced, in part, to the meddling of politicians in the otherwise self-correcting mechanism of the market: it is no accident, he says, echoing Röpke, that the collapse of international trade in the wake of the Great Depression coincided with the rise of aggressive nationalism. Either goods will cross borders or armies will; the golden age of free trade in the 19th century made possible the “long peace” that ended in 1914.
There is much more in this book than a stark diagnosis of economic crashes and a solid case for restoring some kind of gold standard; Veryser shows how most of the key principles that mainstream academics use to understand microeconomics were lifted—often without giving credit—from Austrian theorists, whose faithful disciples are frozen out of universities as “cranks.” We see how the Austrians predicted the implosion of the Soviet Union even as Harvard professors issued textbooks explaining how the Soviet model “worked.” Best of all, Veryser shows how the insights of Austrian economics can be uncoupled from the “anarcho-capitalist” politics with which they are often bundled. Ludwig von Mises didn’t favor restoring medieval Icelandic anarchy, but rather the Habsburg monarchy. There is plenty of room, in other words, for social and religious conservatives to learn from the sober analyses of the Austrians—the only school of empirical economic thought that takes seriously human dignity, personal responsibility, and the role of the natural virtues in promoting the common good.
John Zmirak is author of Wilhelm Röpke and The Bad Catholic’s Guide to the Catechism.
My comments as they are. I am still a huge fan of the gold standard — without a doubt, in my mind, Pres. Nixon’s mistake.
Austrians understand the immense complexity and heterogeneity of intertemporal capital structure. The injection effect of central bank credit expansion causes the newly created money to enter through capital markets.
It does not only have to flood exclusively into housing, but rather long-term interest sensitive production processes such as durable goods like autos, stocks (see current stock boom and the Nasdaq and dotcom bubble), bonds (see now), and yes housing (see now). The suppression of the interest rate below natural market determined level, realigns the production structure in a manner that is inconsonant with consumer preferences. The pattern of this malivestment depends on innumerable uncontrollable factors and subjective evaluations of market participants.
How could we see housing come back and stocks flying through the roof with nonexistent saving by Americans and investment 10 percent lower than its pre-recession peak?
Thanks for the response. I agree that there are limits to a purely aggregate notion of the economy. This is why micro-economics are important too.
But the story of distorted interest rate signals is just not plausible though. If entrepeneurs are so good (heuristically) at guessing or rapidly adapting to consumer preferences in the future, they should then be equally attuned to guessing the future moves of central bankers. But they strangely are not. Austrians never really explain this one. Are businessmen and entrepeneurs who live in interventionist economies really unaware of the phenomenon of inflation/deflation and how these affect the value of money. commodities and fixed assets and that interest rates changes are possible? implausible in the extreme!!
Think about what you are saying. You’re claiming that the artificially low rates led bankers and house builders and so forth to systematically overinvest in mortgages and housing. There’s no question that low rates can be a stimulant for this in the short term. But are bankers and builders really so dumb to behave as though low rates will last forever as some immutable law of the cosmos? Do they not rather look at the price and availability of money and interest rates in exactly the same way that copper miners look at the price of copper or oil drillers look at the price of crude. They all know that reversals are possible and to plan accordingly, slow to ramp up production and quick to unwind, always monitoring changes in the market . Builders do this too ordinarily.
No, what happened in this case was that all over the world (after the dot.com bubble) liquidity flooded into bundled mortgages–not just in the US where rates were low but in Spain, Ireland and many other places. They threw caution to the wind not because they thought low rates would persist forever but because banks bundled junk mortgages into large packages and used sophisticated portfolio theory to convince themselves that individual default rates did not matter. They had figured a way to make money on mortgages that no one hitherto had thought profitable. They had turned lead into gold. And for several years it worked and because it worked businesses and consumers began planning around its continued working as buyers and builders all tried to get in on the action too.
But the underlying problem was there was tons of money in the world chasing after high returns that seemed safe. Equities could no longer provide those returns. And so financial engineers came to the rescue. We know how that ended. Now all that money has nowhere to go but into sovereign debt since the growth of the worldwide economy has slowed so much. It’s not clear what we do from here. But it is clear that the recommendations of the “Austrian school” has little to offer on this score.
You can’t lay this one at the feet of central bankers. The problem is much larger than them.
petebrown asserts that the causal link between falling home prices and recession is the exact reverse of the story I told. Actually I think we are both oversimplifying.
In the real economy there is no single, clear cause linking one event to another. Both pete’s story and mine can be true at the same time — falling house prices and a preference for saving over spending probably fed upon one another in a cycle.
At the risk of being tarred as an “austerian” I claim that this cycle of lower house prices was not obviously a vicious one. Something — some combination of forces — needed to bring house prices back down to a realistic level reflecting their actual utility compared to other economic goods. The hundreds of billions in paper values that vanished in 2008 was not actually wealth being destroyed — it was illusory wealth that never really existed in the first place. The Keynesian “fake it ’til you make it” recipe is simply not capable of arranging labor and capital in ways that can actually bring that level of real, tangible wealth into existence. The only thing it can do is drive malinvestment from one sector to another, in a succession of speculative bubbles. Which is exactly what we are seeing today.
I dont think any financial/economic model is perfect given the human instinct toward murmuration.
A big problem not mentioned here is that some 80% of all loans go to real estate purchases and not productive job creating businesses. Wall street no longer funds creation of industry.
I think I answered the part about the distortion of interest rates in another post.
me: Well companies are profitable, despite the fact that there are 16 million out of work. There are enough paying customers to report good earnings which is the main reason stock prices have come back from their 2009 depths. One reason is that companies have trimmed their work force to the bone. With housing prices–where the have rebounded you will see that unemployment has fallen. That and the normal churn has cleared alot of the surplus including us who just bought a condo as a short sale.
But there is little or no inflation which is what you seem to be arguing. Long term spreads for TIPS bonds which are set by the market are only around 2% for the ten year. So the folks with billions on the line are not expecting much in the way of inflation in the medium to long term. Same thing with corporate bonds also set by the market.
And the absence of inflation despite monetary expansion has been one of the things that has convinced be that the gold standard folks and Austrians are seriously wrong with the way they view things. At some point their prediction of runaway inflation has to confront reality that expectations general price level rises remains very low.
I reluctantly have had to admit that Krugman was right that there would be no inflation when we were in a zero bound. Facts are stubborn things.
Well you have to confront the fact that wealth is accrued by society exchanging goods and services for little green pieces of paper that have no intrinsic value at all but are treated as “money” because, well, people expect that they will be valuable to them to buy other goods and services. There is no “real tangible wealth” at all in the sense you seem to mean and has not been for a very long time, if there even has been. Truth is gold in the ancient world functioned just as dollars do today.
So we lost in 2007-current not “paper wealth” but wealth as real as any. When people feel the value of their assets dropping they tend to feel poorer and thus don’t spend and invest as they did. If a whole society does this or a big part of it does, the nation as a whole cannot help but get poorer.
Seen micro economically your salary is dependent on others consumption. If they stop spending your salary must fall too, which means that your consumption will fall too which causes the earnings of others to fall. Then when others get wind of what’s happening they spend less and save more for fear it will happen to them and it does because the people whom they are buying less from were also the source of their earnings. Vicious cycle. It’s not really that complicated.
This is how you reach an equilibrium with idle factories, laid off workers and customers not buying…no one has any money because hardly anyone is buying anything. You have customers who would like to buy, businesses who would like to produce, and workers who would like jobs–all who are idle simply because of a lack of flowing money in the system. No good comes from this…none at all. It is a deadweight loss of not of “wealth” but of “real tangible resources”–people, goods, factories etc.
The most straightforward way of combating this is by putting more money into the system. If customers have money again they will spend, businesses will ramp up production and start hiring and then their employees will have money to spend again. Virtuous cycle.
All this bizarre fixation on “real tangible wealth” (gold coins? hard money??) obscures the fact that money is a necessary lubricant to commerce. If there is too little in the system moving too slowly the economy will become artificially depressed. And this is bad all around.
@petebrown — Sorry if I confused you by using the terms “real” and “tangible” as modifiers to “wealth.” By “wealth” I was referring to things like automobiles, Ipads, and bottles of wine — not gold coins. In my lexicon, “wealth” consists of consumer goods and capital goods while “money” is something that can be exchanged for wealth. I can understand why you might see some kind of fixation on hard money in those comments, since Austrians are associated with those ideas, but that’s a discussion for another time.
I am aware of the conventional wisdom that injecting more money into the system will stimulate the production of wealth. This is what I call the “fake it ’til you make it” recipe, and in my opinion it is a recipe for malinvestment.
I disagree that “wealth” (using my definition) is accrued by the process of people buying things — regardless of whether they use gold coins or paper. I believe that wealth is created by production — Japanese assembly lines making automobiles, Chinese sweatshops making Ipads, Sonoma county illegal immigrants picking wine grapes, etc. And yes, I am aware of the Keynesian idea that “stimulating demand” will have a salubrious effect on these processes of production. I just don’t think it’s a very good way to stimulate those processes over the long run, because of its indiscriminate nature. Putting it simply, some kinds of production are more important than others, and stimulating aggregate demand does not recognize that fact.
Correct me if I’m wrong, but weren’t there frequent panics and bubbles in the “golden age of free trade” that was the 19th century? Quite a few more that there were in the “over-regulated” 3/4 century between the Great Depression and the Great Recession?
Actually they do explain this phenomenon. Entrepreneurs are not omniscient eunuchs that are lightning calculators of pleasure and pain. They rely on relative price adjustments and differentials in prices of complementary factors and anticipated prices of future products. They are not infallible but respond to relative price signals and profit-loss accounting. If these are subverted and manipulated then they are prone to errors.
The rational expectations theory has become an aggregate variable describing all entrepreneurs as a homogenous blob of superhuman policy wonks. They are postulated as encompassing all the knowledge of Monetarist economists and armed with intellectual tool kit of the quantity theory of money.
This has led to implausible theory of perfect markets as wrongheaded as the extreme theory of constant market failure. The reality is somewhere in between and economic actors rely on many institutional arrangements (private property, relative prices, and profit-loss wealth calculus) that filter the decisions in a sound direction and coordinate economic activity. When the interest rate is falsified and arbitrarily pegged by a monetary politburo, systemic dis-coordination is engendered throughout the capital structure.
They cannot be in the head of monetary central planners like Greenspan and Bernanke.
Inflation is not absent and is significantly underreported. Commodities, producer goods index, stocks, houses and bonds are inflated and deeply manipulated by the Fed’s money printing bonanza.
Besides, Austrians believe there is a kernel of truth in the quantity theory of money, but they do not believe in the mechanistic Monetarist version where the general price level corresponds uniformly to the expansion of the money supply.
Austrians and “gold standard folks” have predicted the patterns of these boom-bust cycles and asset bubbles and have gotten much more right than Monetarists or Keynesians.
Yes because central bankers and politicians tell them so. The interest rate and yield curve is being manipulated by the wizards at the Fed so investors follow their moves instead of responding to market prices that convey real information. Remember the so-called Great Moderation where central bankers and economists claimed they tamed the vaunted business cycle? That’s the signal the unsustainable boom is near its peak.
Thanks for your thoughtful reply. i would reckon wealth somewhat differently. It’s more the aggregation of real resources—human beings with skills and talents, a society that can cultivate talent and cooperation, factories that can make things, land that can yield useful crops, the natural environment, and yes money too. in fact in a modern economy there has to be money for people for the other thing to function.
Creating the right amount of money to prevent economic activity from falling artificially is not “fake it till you make it.” It’s what a central bank is necessary to do. Most of the time it can go on relative auto-pilot as long as inflation stays low and deflationary pressures are absent. But it is absolutely necessary to provide extra liquidity in times of financial panics. Because so much of our money in a modern economy is in various forms of fractional reserve accounts, things can collapse very quickly if people start demanding money very quickly and the fed doesn’t provide it. Then you have far worse problems than (hypothetical) asset bubbles: depression, war, civil unrest. It’s happened before and it will happen again. Then were going to need far more difficult interventions by the government.
Saying you won’t create more money in a panic because it might produce asset bubbles is like saying you won’t administer penicillin when someone has a life threatening infection on the grounds that in the long run the medicine itself might make the patient sick.
Austrianism is the triumph of ideology over common sense.
me: you provide no evidence for this contention at all and ignore mountains of evidence that cut against it. Commodities go up and down because of supply and demand too; increases in price are not necessarily indicative of inflation. You have in China 90 times as many cars as in 1990 and a similar story in Brazil and India. So is it any surprise that with many more people eating and driving more that prices for oil and food have tended to rise? There is no bubble in housing?!?! Check Case-Schiller.
In the stock market today the PE ratio is 17.5. Since 1890when the PE ratio was 26.5 the ratio has usually hovered in the 20’s though it has dropped as low as 5-6 . By contrast in the tech bubble the ratio was 35-46 and in 2007 the ratio got up to over 120. That’s what a bubble looks like. I’m sorry but you’re just seeing ghosts if you see a bubble today. No evidence for it at all despite that nutty fact free David Stockman op ed over the weekend. Its not to say the market cannot fall. But its prices today are not out of historic norms. Please John check historic price levels so that you don’t make assertions that are demonstrably untrue!!!
And if we are having all this inflation why is this not reflected in soaring interest rates. Forget “price indices” TIPS bonds explicitly price in expected future inflation. You can compare their rates to normal treasuries. The spread is a measly 2%. You simply can’t explain this on a hypothesis of run away inflation. And I can tell that you wisely haven’t even tried.
I don’t mean to be rude. But how is it Austrians see what people and institutions with literally trillions on the line don’t see. At some point this ideology needs to touch ground and examine some empirical facts.
And when you do you’ll stop being an Austrian.
This can’t possibly work when labor has been so devalued that the newly printed money goes directly into the stock market and gets used to create new asset bubbles in commodities, as opposed to funding new businesses. The average American can’t benefit from a virtuous cycle if he has no part in it. If you said this somewhere earlier, then apologies, I must have missed it.
You know how some left-leaning folks might look at the title of this website and reflexively assume its readers share every opinion of Rush Limbaugh and Ann Coulter? Some critics do a similar thing with the label “Austrian” — as if it were an all-encompassing philosophical worldview, rather than a perspective on certain economic problems.
Statements like “Austrianism is the triumph of ideology over common sense” and “examine some empirical facts… when you do you’ll stop being an Austrian” would be more appropriate in a forum like alt.politics.
Well the relative share of labor in the total national income is kind of another issue. And yes…you’re right in the sense that maintaining enough money in circulation to keep nominal growth on a set trajectory does not solve all economic ills.
But the average worker is hurt immensely by monetary contraction. There is a broad consensus among economists across the spectrum that contraction is what caused the Great Depression and could have been combated much more effectively if we had not been on the gold standard or even if we had abandoned it earlier.
And I think if you read a good market monetarist blog like http://www.moneyillusion.com you will find that workers have been hurt immensely in this recession by the slowdown in money velocity too, that has come because of the financial crisis. All this money that has been created is not causing bubbles. It has been sterilized. Banks are holding it on their balance sheet and are actually being paid interest to hold onto it. They’ve been given money and then paid rent to hold onto it…nice work if you can get it. If that money gets flowing in the real economy you’ll see the unemployment rate drop pretty quickly. No, it wont solve all the problems of low wages but its better than sitting on the couch everyday looking for jobs on Craigslist.
I don’t mean to be offensive I really don’t. I shouldn’t demonize the term “austrian”. Hayek is an Austrian who has had a great deal to contribute to pricing theory for instance and of helping remind the dinosaur Keynesians of the importance of expectations feedback loops and so forth.
But “internet Austrianism” is simply toxic for the GOP, conservatism and the country as a whole on many different levels.
Adherents to Keynesian dogma are fond of asserting, with an air of dismissive superiority, that their economic theory is rigorously scientific, and thoroughly grounded in hard empirical data. You can hardly slog through one of Krugman’s columns these days without running into some form of that claim.
On the other hand, Austrian praxeology is said to be a bunch of superstitious knuckle-draggers, ignorantly scrawling magic incantations on cave walls, utterly divorced from the rigorous scientific method of Keynes.
Now the hallmark of a scientific theory is making falsifiable predictions, and testing those predictions against experiment. No theory can ever be proven absolutely true, but if a theory makes a whole lot of falsifiable predictions and fails to be proven wrong each and every time, then it can be said to be “empirically verified” in proportion to the number of times it’s stuck its neck out there and survived the trial.
Exactly what falsifiable predictions does my theory make? How many times has my theory made a truly falsifiable prediction, gone head-to-head with the evidence, and survived the trial?
What evidence can I imagine that would shake my own faith in this theory?
We need less “internet monetarism”. You have not responded substantively to any of my critiques of your interpretation of data i.e. economic theory.
You have just thrown around a bunch of useless aggregates and price levels.
I never even mentioned runaway inflation. I said that inflation is underreported because the CPI does not include very relevant prices of food and oil. It also has changed the formula with a substitution method that conceals actual price increases of goods that have utility to consumers. We also export a lot of dollars and hence inflation, as well as recent interest payments by the Fed on excess reserves of banks.
Also, bond prices and yields run inversely and my point is that treasury yields are too low because of the Fed being the main purchaser and manipulator and hence inflated prices of treasuries and a bond market boom!
How is this not a distorted market?
How come people like you have not thoroughly investigated the Austrian Theory of the Business Cycle. It has predictive and empirical validity, albeit in looking at patterns of phenomena. When was the last time the Monetarist or Keynesians (do I repeat myself) predicted or diagnosed a speculative bubble? Milton Friedman’s monetary theory was wrong about the Depression and he missed the most recent boom in Housing and on Wall Street.
Again, how did be people get with “trillions” of dollars engage in speculative mania in the Housing bubble, Nasdaq Bubble, the gyrations on Wall Street in the 90s with Long-Term Capital Management and Mexican bailout, Stock market crash of 1987, stagflation of the 1970s and Fed generated credit and stock market boom of 1921-29?
The interest rate is extremely crucial price and when it is fixed artificially low by the Fed it generates excessive consumption, debt, leveraging, malinvestment, distortions of relative prices, falsification of profit-loss and wealth calculation. People respond to prices and incentives and are not omniscient like you assume.
Do you really believe the interest rate determined by the Fed does not filter out and influence the complex array of interest rates on the market?
At some point you need come to grips with reality, but let us agree to disagree.
One caveat. Some Keynesians actually call for a strong inflation and housing bubbles. So I guess they inadvertently diagnose and encourage the business cycles (see Paul Krugman).
me: well, what about the part about constantly asserting either that we have high inflation (that strangely none of the market indices measure) or were are about to get runaway inflation. Yes, the gold crowd has been on that one since back to the second Bush term in fact and the chorus has only grown louder since the financial panic How long before the statute of limitations runs out on that prediction? Inflation is at a postwar low. This whole thing is like yelling fire during day 27 of Noah’s flood.
The ABC cycle theory fails on its own terms. It’s predicated on the assumption that guys like you have figured out that the “spiked punch bowl” will one day be taken away but that all the actors in the field somehow are too blind or stupid to realize this.
Hint: beware of esoteric theories that purport to contain secrets that are outside the ken of the rest of the world.
Markets are now forecasting very anemic growth and very low inflation. (you also ignore the fact that i refuted your assertion that the stock market is a “bubble.”) Folks buying trillions of treasuries know better than you that the fed is buying some of these on the secondary market and have already factored in the implications of this for the value of the nominal dollars with which they will be repaid. You know nothing that these guys don’t. (And frankly I think you should entertain the possibility that they know things that you don’t.) And right now they are willing to lend at practically zero real interest rates because they don’t see much growth or inflation and just need a safe place to park money.
Is it possible that they are drunk again from all the “spiked punch”? I suppose. Markets can be wrong. Indeed maybe they will change tomorrow to call for higher nominal growth and higher inflation. The trouble with your theory is that for it to work they not only have to be wrong this time but have had to be wrong consistently over decades and you have to be in possession of secrets of the temple that ought to have made you famously wealthy by now.
Put your money on the [email protected] John [email protected] Skoobie. If US treasuries are really the mother of all bubbles waiting to burst as you seem to think or as ABC theory seems to tell you, go way way short on them!!! Then when investors from all over the world figure out that you were right all along and yields soar and you both become sultans of brunei, I’ll become an Austrian.
But beware….contrarianism has a few who’ve made great riches…but a cellar full of many corpses.
And if we roll back through the 1800’s, with less and less government intervention, we still find booms, busts and crashes.
For the USA, at least, the post-New Deal situation was far better than the pre-New Deal situation.
Still the market might collapse to close to its historic lows at say 5-7 PE ratios that we last had in the early 80’s.
But what will be conclude from that? Nothing really. It does not prove that it was a bubble before the crash and neither does it prove that it now at its correct levels post crash.
The moral of the story is that 1) not only is it hard to know when assets are increasing in price because of fundamentals (better earnings, long term growth prospects etc.) or because of speculative mania fueled by too much money, or too many animal spirits or whatever 2)conversely it is hard to know when falling assets are falling because of fundamentals (bad earnings and prospects) or because undue pessimism has befallen investors.
In short Skoobie before you go around touting past “bubbles” as vindication for the ABC theory ask yourself (as an empirical control)”how do I know what a “bubble” really looks like in the first place? How do I know that many of the alleged “bubbles” were not simply 1) large bad business decisions that soured quickly once new information became available (which is the market working not a “bubble” bursting) or 2) an undue bout of panic that ignores salutary long term conditions (the 1987 crash which had no lasting effect is a good example of this one as is the “flash crash” in 2011) and not a “bubble” at all.
krugman, dean baker and others repeatedly warned greenspan in 2006 that a housing bubble might be looming. they noticed that house prices had gone up much more than incomes but that rents hadn’t. so it was obvious to them that demand for houses was largely speculative. greenspan replied that you only know if you’ve got a bubble after it has burst and that, in any case, raising interest rates was a blunt instrument which would harm other parts of economy. krugman et al responded that there were many ways of taking heat out of housing market without raising rates eg: lowering loan to values. greenspan didn’t respond. it’s of note that greenspan got his job because he was willing to go along with derugalation. volker wasn’t , and lost his.
If bubble and crash were caused by too much money slushing around how come inflation was so low, and still is?
tying dollar to gold was not particularly effective in preventing bubbles/bursts but Glass-Steagal Act was, for about 30 years; separating bank lending from speculation is the only tried and tested way of minimising this problem. breaking up banks which are too big to fail would also help, or at least making them pay an insurance premium for luxury of being too big too fail. economists estimate this premium should be about $ 60B pa. in a free market system the tax payer should not have to gift $ 60B to Wall Street, every year. the problem is Wall Street doesn’t like free markets because it impacts on their profits and with their lobbying power they will be able to continue distorting markets indefinitely.
Actually it’s a matter of record that in 2005 Krugman was predicting a major housing bust. He may not have understood at that time the extent to which securitization of real estate debt and speculation in it would extend the crisis throughout the financial system but by early 2007 he and several others certainly had and were warning of the dangers. Heck even I’d figured it out and was acting accordingly. By contrast most conservatives and Republicans were engaged in happy talk for the entire period 2004-2008 and amazingly some were still bullish in the spring of 2008. Unfortunately, this commentary is filled with similar questionable assertions. From my personal experience I visited the Soviet Union for commercial reasons several times in the 70’s and it was obviously moribund. Alas the entire Austrian theorem is undermined by the simple fact that since the dawn of modern capitalism at the start of the 18th century “perfect” markets have never existed and it’s a pipe dream that they ever could. I also find unpersuasive the assertion that looser regulatory regimes and adherence to the gold standard would magically smooth economic cycles. Didn’t seem to work in the case of the Jay Cooke crash of 1873 which ushered in a slump that lasted for 20 years; the 1907 panic; or the mother of them all in 1929.
Until we get rid of the illegal and immoral Federal Reserve, we will continue to have these boom-bust cycles, which keep stealing money from the poor and middle-class and give it to the rich and super-rich.
There’s no sane reason why Americans should pay around 400 BILLION a year in interest to the private banking families that own the FED, interest paid to borrow OUR OWN MONEY.
Some argue against QE because “the markets know best” and so the FED shouldn’t lower bond rates – only the rational market should decide on bond rates The very same people also claim that the 20% drop in bond rates between 2000 and 2006 caused the 100% rise in house prices over the same period, and so caused the crash. But if that’s true, then the markets were very irrational (a 20% rate drop can’t justify a 100% house price increase). So the markets didn’t know best at least during this period. In which case what’s wrong with QE?
Lese Majeste: you are righter than you think. When the Fed prints money to buy bonds, the coupons the Fed receives on these bonds are paid largely by people earning around the median income, including people not working and on benefits who don’t pay income tax but pay other taxes. Their income is their total benefit package. So we are talking about people earning about $ 20K pa. Because the Fed is privately owned, this means that a lot of poor people are paying money to fewer very rich people and they have no choice about doing it and get nothing in return. What kind of “free and fair” transaction is that? Doesn’t sound like capitalism to me – more like legalised theft and, what’s worse, from poor to rich. God help the American people. I hope we in Britain never end up like you.
before someone thinks my last 2 posts contradict each other, i should add that there is nothing wrong with QE as long as the Fed is not privately owned. It’s a useful tool . But if Fed is privately owned , then QE is theft.
Pete at least deserves credit for doing something that Krugman has been unwilling to do: he has given a specific, concrete real-world condition that would cause him to change his mind about theory.
So if interest rates on US Treasuries ever “spike” above zero again — from now until the end of time — Pete has agreed that he will become an Austrian.
Clint: Mr. Wallison was the General Counsel in the Treasury from 1981-1985 under Ronal Reagan. Ironically, the Father of Reaganomics was an Assistant Secretary of the Treasury named Dr. Paul Craig Roberts. He is an actual economist, Phd holder, former editor of the Wall Street Journal editorial page, and professor. He was actually instrumental in helping to solve the problem of ‘stagflation’ through a correction of Keynesian demand side economics by balancing the supply side. At any rate, he often describes the 2007 Recession (which officially started in December of that year) as being caused, at least in party, by the collapse of the housing bubble which, in turn, owed much to deregulatory capture by mega banks and other elites. He describes the world economic crisis today as the 1% stealing as much as they can from everybody else. Though formerly a Republican and a conservative, this narrative agrees with many, many other economists including Michael Hudson and especially Dean Baker both of whom Dr. Roberts has made mention on several occasions.
And for more info, How The Economy Was Lost and The Failure of Laissez-faire are Dr. Roberts’ most recent books. Anyone on this site is highly encouraged to check out this important figure in American history. | 2019-04-18T17:00:27Z | https://www.theamericanconservative.com/articles/austrians-dont-blow-bubbles/ |
Title of Regulation: 12VAC5-610. Sewage Handling and Disposal Regulations (amending 12VAC5-610-30, 12VAC5-610-920 through 12VAC5-610-950; adding 12VAC5-610-955).
Statutory Authority: §§ 32.1-12, 32.1-164, and 32.1-164.9 of the Code of Virginia.
Public Comment Deadline: October 26, 2015.
Agency Contact: Dwayne Roadcap, Director, Division of Onsite Sewage and Water, Department of Health, 109 Governor Street, Richmond, VA 23219, telephone (804) 864-7458, FAX (804) 864-7475, or email [email protected].
Basis: Section 32.1-164.9 of the Code of Virginia mandates the Board of Health to promulgate regulations for physical construction, design, and installation of chamber and bundled expanded polystyrene systems. Additionally, the board is authorized pursuant to § 32.1-12 of the Code of Virginia to promulgate and enforce regulations. Section 32.1-164 of the Code of Virginia authorizes the board to promulgate regulations governing the collection, conveyance, transportation, treatment, and disposal of sewage by onsite sewage systems to protect public health, surface water, and groundwater.
Purpose: The need for the proposed regulation is to implement § 32.1-164.9 of the Code of Virginia and incorporate requirements for gravelless material and drip dispersal. The amendments include construction, design, and installation requirements for gravelless material and drip dispersal systems. Since 2002, the Virginia Department of Health (VDH) has recognized, through policies, that gravelless material is an acceptable means of dispersing effluent. VDH has recognized, through policies, that drip dispersal is an acceptable means of transmitting effluent. The goal of the proposed regulation is to permanently add the construction, design, and installation standards for gravelless material and drip dispersal. The regulations are essential in order to comply with the provisions of the Code of Virginia and protect the health, welfare, and safety of the public.
8. Minimum installation requirements for drip dispersal systems.
Minor clarifying changes to the proposed amendments from the emergency regulation, published in 30:11 VA.R. 1576 January 27, 2014, are made, including the following: (i) the term "soil gravel or sand interface" used in 12VAC5-610-920 and 12VAC5-610-950 A is modified to ensure inclusion of gravelless material and drip dispersal, and (ii) the proposed regulation establishes minimum physical construction, design, and installation requirements for gravelless material and drip dispersal.
Issues: The proposed regulation poses no disadvantage to the public or the Commonwealth. The proposed revisions permanently incorporate the emergency regulations for gravelless material and drip dispersal. The proposed regulations provide a benefit to the public by providing a clear regulation for use of gravelless material and drip dispersal.
Summary of the Proposed Amendments to Regulation.
vi) Such other requirements pertaining to the promulgation of chamber and bundled expanded polystyrene effluent distribution system regulations for onsite sewage systems as may be deemed necessary by the Board.
The Board's proposed regulatory amendments include these requirements and criteria.
Result of Analysis. The benefits likely exceed the costs for all proposed changes.
Estimated Economic Impact. Since 2002, the Virginia Department of Health (VDH) has approved through policies gravelless material as an acceptable means of dispersing effluent. VDH has also approved through policies drip dispersal as an acceptable means of transmitting effluent. The Board's proposed requirements, specifications, and criteria are similar to those set by VDH in practice; although there are some differences. Placing the requirements, specifications, and criteria in regulation will be beneficial in that it will increase clarity for the public.
In practice VDH has required a $100,000 letter of credit and a 5-year limited warranty from manufacturers for approval of use of their gravelless (i.e., plastic) systems. VDH believes that the 5-year limited warranty has not been a binding constraint. In other words, it is consistent with what the manufacturers offer anyway. In the 15 plus years that this program has existed, there have been no instances where there has been a need to access any of these letters of credit to pay for failed manufactured product.
Under the proposed regulations, neither the letter of credit nor the warranty will be required. There are currently five manufacturers who have approved gravelless systems, and consequently each hold a $100,000 letter of credit. Manufacturers will save the cost of maintaining the letter of credit, approximately $3,250 per year per firm, under the proposed regulations.
In practice VDH has allowed up to 50% reduction in drainage field while using gravelless system, but required an informed consent form signed by homeowner. Under the proposed regulation the drainage field can be reduced by at most 25%, but no signature from the homeowner is required.
Businesses and Entities Affected. The proposed amendments may affect applicants for onsite sewage system construction permits and businesses providing services related to onsite sewage systems; onsite soil evaluators, professional engineers, onsite sewage system installers, and product manufacturers. Applicants and service providers are only affected when gravelless material or drip dispersal components are selected.
In calendar year 2013, VDH processed approximately 13,000 applications. The agency estimates that there are approximately 400 licensed individuals providing site evaluation and design services for onsite sewage systems. Additionally, there are approximately 215 individuals licensed to install onsite sewage systems. The vast majority of these service providers are small businesses. There are also 5 potentially affected manufacturers.
Localities Particularly Affected. The proposed amendment does not disproportionately affect particular localities.
Projected Impact on Employment. The proposed amendments are unlikely to significantly affect employment.
Effects on the Use and Value of Private Property. The proposed elimination of the letter of credit requirement will save manufacturers approximately $3,250 per year.
Small Businesses: Costs and Other Effects. The proposed elimination of the letter of credit requirement will reduce costs for small manufacturers of products used to disperse effluent within the absorption trench of an onsite sewage system without the use of gravel.
Small Businesses: Alternative Method that Minimizes Adverse Impact. The proposed amendments will not adversely affect small businesses.
Real Estate Development Costs. The proposed amendments are unlikely to significantly affect real estate development costs.
• the impact on the use and value of private property.
• a description of any less intrusive or less costly alternative methods of achieving the purpose of the proposed regulation.
Additionally, pursuant to § 2.2-4007.1, if there is a finding that a proposed regulation may have an adverse impact on small business, the Joint Commission on Administrative Rules is notified at the time the proposed regulation is submitted to the Virginia Register of Regulations for publication. This analysis shall represent DPB's best estimate for the purposes of public review and comment on the proposed regulation.
1Gravelless Material means a proprietary product specifically manufactured to disperse effluent within the absorption trench of an onsite sewage system without the use of gravel. Gravelless material may include chamber, bundled expanded polystyrene, and multi-pipe systems.
2Drip Dispersal means an onsite sewage system that applies wastewater in an even and controlled manner over an absorption area. Drip dispersal components may include treatment components, a flow equalization pump tank, a filtration system, a flow measurement method, supply and return piping, small diameter pipe with emitters, air/vacuum release valves, redistribution controls, and electromechanical components or controls.
Agency's Response to Economic Impact Analysis: The Virginia Department of Health concurs with the Department of Planning and Budget's economic impact analysis. The benefits of the regulations likely exceed the costs for all of the proposed changes.
Minor revisions for clarification, based on public comment, were made to the emergency regulation for the proposed amendments. In 12VAC5-610-955 B 6 a requirement that the system design protect from siphoning or backflow was added. In 12VAC5-610-995 C 3, general parameters for loading rates for sloping absorption areas were made specific requirements.
12VAC5-610-30. Relationship to Virginia Joint Sewerage Regulations other regulations.
This chapter is supplemental to the current Virginia Sewerage Regulations, or their successor, which were adopted jointly by the State Board of Health and the Department of Environmental Quality pursuant to § 62.1-44.19 of the Code of Virginia. This chapter addresses the handling and disposal of sewage not regulated by a Virginia Pollutant Discharge Elimination System (VPDES) Permit.
A. This chapter addresses the handling and disposal of those portions of sewage flows not regulated by a Virginia Pollutant Discharge Elimination System (VPDES) Permit or a Virginia Pollutant Abatement (VPA) Permit issued in accordance with 9VAC25-31 or 9VAC25-32, respectively.
B. Reclamation and reuse of sewage may be subject to permitting by the Department of Environmental Quality under 9VAC25-740.
Gravity distribution is the conveyance of effluent from a distribution box through the percolation lines at less than full flow conditions. Flow to the initial distribution box may be initiated by pump, siphon or gravity.
A. Enhanced flow distribution. Enhanced flow distribution is the initiation of the effluent flow to the distribution box by pump or siphon for the purpose of assuring more uniform flow splitting to the percolation lines. Enhanced flow distribution shall be provided on systems where the flow is split more than 12 times or the system contains more than 1200 linear feet of percolation lines. For the purpose of this chapter, enhanced flow distribution is considered to produce unsaturated soil conditions.
B. System size. Distribution systems containing 1800 or more linear feet of percolation piping shall be split into multiple systems containing a maximum of 1200 linear feet of percolation piping per system.
C. Distribution boxes. The distribution box is a device for splitting flow equally by gravity to points in the system. Improperly installed distribution boxes are a cause for absorption field malfunction.
1. Materials. The preferred material for use in constructing distribution boxes is concrete (3000 psi). Other materials may be considered on a case-by-case basis. All materials must be resistant to both chemical and electrolytic corrosion and must have sufficient structural strength to contain sewage and resist lateral compressive and bearing loads.
2. Design. Each distribution box shall be designed to split the influent flow equally among the multiple effluent ports. All effluent ports shall be at the same elevation and be of the same diameter. The elevation of the effluent ports shall be at a lower elevation than the influent port. The placement of the influent ports shall be such as to prevent short circuiting unless baffling is provided to prevent short circuiting. The minimum inside width of a gravity flow distribution box shall be equal to or greater than 12 inches. The inside bottom shall be at least four inches below the invert of the effluent ports and at least five inches below the invert of the influent port. A minimum of eight inches freeboard above the invert of the effluent piping shall be provided. The distribution box shall be fitted with a watertight, removable lid for access.
3. Installation. The hole for placement of the distribution box shall be excavated to undisturbed soil. The distribution box shall be placed in the excavation and stabilized. The preferred method of stabilizing the distribution box is to bond the distribution box to a four inch poured in place Portland cement concrete pad with dimensions six inches greater than the length and width dimensions of the distribution box. The box shall be permanently leveled and checked by water testing. Conduits passing through the walls of a distribution box shall be provided with a water stop.
D. Lead or header lines. Header or lead lines are watertight, semirigid or rigid lines that convey effluent from a distribution box to another box or to the percolation piping.
1. Size. The lead or header lines shall have an internal diameter of four inches.
2. Slope. Minimum slope shall be two inches per 100 feet.
3. Materials. The lead or header lines shall have a minimum crush strength of 1500 pounds per foot and may be constructed of cast iron, plastic, vitrified clay or other material resistant to the corrosive action of sewage.
a. Joints. Lead or header lines shall have joints of the compressions type with the exception of plastic lead or header lines which may be welded sleeve, chemically fused or clamped (noncorrosive) flexible sleeve.
b. Adapters. Joining of lead or header lines of different size and/or material shall be accomplished by use of a manufactured adapter specifically designed for the purpose.
c. Valves. Valves shall be constructed of materials resistant to the corrosive action of sewage. Valves placed below ground level shall be provided with a valve box and a suitable valve stem so that it may be operated from the ground surface.
a. Bedding. All lead or header lines shall be bedded to supply uniform support and maintain grade and alignment along the length of the lead or header lines. Special care shall be taken when using semirigid pipe.
b. Backfilling and tamping. Lead and header lines shall be backfilled and tamped as soon as possible after the installation of the lead or header lines has been approved. Material for backfilling shall be free of large stones and debris.
6. Termination. Header or lead lines shall extend for a minimum distance of two feet into the absorption trenches.
E. Gravity percolation lines. Gravity percolation lines are perforated or open joint pipes that are utilized to distribute the effluent along the length of the absorption trenches.
1. Size. All gravity percolation lines shall have an internal diameter of four inches.
2. Slope. The slope of the lines shall be uniform and shall not be less than two inches or more than four inches per 100 feet.
3. Design. Effluent shall be split by the distribution system so that all gravity percolation lines installed shall receive an equal volume of the total design effluent load per square foot of trench, i.e., the fraction of the flow received by each percolation line divided by the length of the gravity percolation lines shall be equal for all gravity percolation lines in a system.
4. Length. No individual gravity percolation line shall exceed 100 feet in length.
a. Clay. Clay tile shall be extra-strength and meet current ASTM standards for clay tile.
b. Perforated plastic drainage tubing. Perforated plastic drainage tubing shall meet ASTM standards. At not greater than 10 feet intervals the pipe shall be plainly marked, embossed or engraved thereby showing the manufacturer's name or hallmark and showing that the product meets a bearing load of 1,000 lb. per foot. In addition, a painted or other clearly marked line or spot shall be marked at not greater than 10 feet intervals to denote the top of the pipe.
The tubing shall have three holes, 1/2 to 3/4 inch in diameter evenly spaced and placed within an arc of 130 degrees, the center hole being directly opposite the top marking.
Spacing of each set of three holes shall be at four inch intervals along the tube. If there is any break in the continuity of the tubing, an appropriate connection shall be used to join the tubing.
a. Crushed stone or gravel. Clean gravel or crushed stone having a size range from 1/2 inch to 1-1/2 inches shall be utilized to bed the gravity percolation lines.
Minimum depth of gravel or crushed stone beneath the percolation lines shall be six inches. Clean course silica sand (does not effervesce in presence of dilute hydrochloric acid) may be substituted for the first two inches (soil interface) of the require required six inches of gravel beneath the percolation lines. The absorption trench shall be backfilled to a depth of two inches over the gravity percolation lines with the same gravel or crushed stone. Clean sand, gravel or crushed stone shall be free of fines, clay and organic materials.
b. Grade boards and/or stakes. Grade boards and/or stakes placed in the bottom or sidewalls of the absorption trench shall be utilized to maintain the grade on the gravel for placement of the gravity percolation lines. Grade stakes shall not be placed on centers greater than 10 feet.
c. Placement and alignment. Perforated gravity percolation piping shall be placed so that the center hole is in the horizontal plane and interfaces with the minimum six inches of graded gravel. When open joint piping is utilized the upper half of the top of the 1/4-inch open space shall be covered with tar paper or building paper to block the entrance of fines into the pipe during the backfilling operation. All gravity percolating piping shall be placed in the horizontal center of the absorption trench and shall maintain a straight alignment and uniform grade.
d. Backfilling. After the placement of the gravity percolation piping the absorption trench shall be backfilled evenly with crushed stone or gravel to a depth of two inches over the piping. Untreated building paper, or other suitable material shall be placed at the interface of the gravel and soil to prevent migration of fines to the trench bottom. The remainder of the trench shall be backfilled with soil to the ground surface.
F. Gravelless material is a proprietary product specifically manufactured to disperse effluent within the absorption trench of an onsite sewage system without the use of gravel. Gravelless material may include chamber, bundled expanded polystyrene, and multi-pipe systems. The division shall maintain a list of all generally approved gravelless material. Gravelless material on the generally approved list may be used in accordance with Table 5.4 of 12VAC5-610-950.
1. Gravelless material that received general approval as of December 12, 2013, shall retain such status when used in accordance with the requirements of this chapter. After December 12, 2013, the division shall review and evaluate new applications for general approval pursuant to the requirements of this chapter.
a. Any manufacturer of gravelless material may submit an application for general approval to the division using a form provided by the division. A complete application shall include the manufacturer's contact information, product specifications, product approvals in other states or territories, installation manual, and other information deemed necessary by the division to determine compliance with this chapter.
b. The manufacturer of gravelless material shall identify in the application for general approval any recommendation that deviates from the requirements of this chapter. If the recommendation is approved by the division, then the manufacturer shall include the deviation in the gravelless material's installation manual.
a. The minimum exterior width shall be at least 90% of the total width of the absorption trench. The exterior width of a chamber system shall be measured at the edge or outer limit of the product's contact with the trench bottom unless the division determines a different measurement is required based on the gravelless material's design. The exterior width of bundled expanded polystyrene and multi-pipe systems shall be measured using the outside diameter of the bundled gravelless material unless the division determines a different measurement is required based on the gravelless material's design. The division shall establish the exterior width of any gravelless material that is not considered a chamber, bundled expanded polystyrene, or multi-pipe system.
b. Gravelless material shall have a minimum height of eight inches to provide a continuous exchange of air through a permeable interface.
c. Gravelless material shall have a permeable interface that shall be located along the trench bottom and trench sidewalls within the absorption trench.
d. Gravelless material shall provide a minimum storage capacity of 1.3 gallons per square foot of trench bottom area.
e. Gravelless material shall pose no greater risk to surface water and groundwater quality than gravel in absorption trenches. Gravelless material shall be constructed to maintain structural integrity such that it does not decay or corrode when exposed to effluent.
f. Gravelless material shall have a minimum load rating of H-10 or H-20 from the American Association of State Highway and Transportation Officials or equivalent when installed in accordance with the manufacturer's specifications and minimum specified depth of cover in non-traffic or traffic areas, respectively.
3. For designs using gravelless material, the absorption trenches shall receive an equal volume of effluent per square foot of trench. Trench bottom area shall be equal to or greater than the minimum area requirements contained in Table 5.4 of 12VAC5-610-950. Trench sidewall shall not be included when determining minimum area requirements. When open-bottom gravelless material is utilized, it shall provide a splash plate at the inlet of the trench or other suitable method approved by the manufacturer to reduce effluent velocity.
4. Installation of gravelless material shall comply with this chapter unless the department grants a deviation pursuant to 12VAC5-610-660 or the division has granted a deviation identified in the installation manual.
5. Gravelless material shall contain a pressure percolation line along the entire length of the trench when low pressure distribution is utilized pursuant to 12VAC5-610-940 D.
6. When pumping effluent to overcome gravity, any open-bottom gravelless material shall provide a high-flow splash plate at the inlet of the trench or other suitable method approved by the manufacturer to reduce effluent velocity.
7. When enhanced flow distribution is used, open-bottom gravelless material shall contain a percolation pipe that extends a minimum of 10 feet from the trench's intersection with the header line. The percolation pipe shall be installed in accordance with the manufacturer's approved installation manual. The dosing volume shall be a minimum 39 gallons per 100 linear feet of absorption trench.
8. Gravelless material may be substituted for gravel in accordance with this chapter, provided that the certifying licensed professional engineer or onsite soil evaluator approves the substitution. The certifying licensed professional engineer or onsite soil evaluator shall identify the substitution on the inspection report submitted in accordance with 12VAC5-610-330. A new construction permit pursuant to 12VAC5-610-310 is not required for the substitution.
Low pressure distribution is the conveyance of effluent through the pressure percolation lines at full flow conditions into the absorption area with the prime motive force being a pump or siphon. Low pressure systems are limited to a working pressure of from one to four feet of head at the distal end of the pressure percolation lines. For the purpose of this chapter low pressure distribution is considered to provide unsaturated soil conditions.
A. Dosing cycle. Systems shall be designed so that the effluent volume applied to the absorption area per dosing cycle is from seven to 10 times the volume of the distribution piping, however, the volume per dosing cycle should not result in a liquid depth in the absorption trench greater than two inches.
B. Manifold lines. Manifold lines are watertight lines that convey effluent from the initial point of flow splitting to the pressure percolation lines.
1. Size. The manifold line shall be sized to provide a minimum velocity of two feet per second and a maximum velocity of eight feet per second.
2. Materials. All pipe used for manifolds shall be of the pressure type with pressure type joints.
3. Bedding. All manifolds shall be bedded to supply uniform support along its length.
4. Backfilling and tamping. Manifold trenches shall be backfilled and tamped as soon as possible after the installation of the manifold has been approved. Material for backfilling shall be free of large stones and debris.
5. Valves. Valves for throttling and check valves to prevent backflow are required wherever necessary. Each valve shall be supplied with a valve box terminating at the surface.
C. Pressure percolation lines. Pressure percolation lines are perforated pipes utilized to distribute the flow evenly along the length of the absorption trench.
1. Size. Pressure percolation lines should normally have a 1-1/4 inch inside diameter.
2. Hole size. Normal hole size shall be 3/16 inch to 1/4 inch.
3. Hole placement. Center to center hole separation shall be between three and five feet.
4. Line length. Maximum line length from manifold should not exceed 50 feet.
5. Percent flow variation. Actual line size, hole size and hole separation shall be determined on a case-by-case basis based on a maximum flow variation of 10% along the length of the pressure percolation lines.
6. Materials and construction. The preferred material is plastic, either PVC or ABS, designed for pressure service. The lines shall have burr free and counter sunk holes (where possible) placed in a straight line along the longitudinal axis of the pipe. Joining of pipes shall be accomplished with manufactured pressure type joints.
a. Crushed stone or gravel. Clean gravel or crushed stone having a size range from 1/2 inch to 3/4 inch shall be utilized to bed the pressure percolation lines. Minimum depth of gravel or crushed stone beneath the percolation lines shall be 8-1/2 inches. Clean course silica sand (does not effervesce in the presence of dilute hydrochloric acid) may be substituted for the first two inches (soil interface) of the required 8-1/2 inches of gravel beneath the pressure percolation lines. The absorption trench shall be backfilled to a depth of two inches over the pressure percolation lines with the same gravel or crushed stone. Clean sand, gravel or crushed stone shall be free of fines, clay and organic materials.
b. Grade boards and/or stakes. Grade boards and/or stakes placed in the bottom or sidewalls of the absorption trench shall be utilized to maintain the gravel level for placement of the pressure percolation lines. Grade stakes shall not be placed on centers greater than 10 feet.
c. Placement and alignment. Pressure percolation lines shall be placed so that the holes face vertically downward. All pressure percolation piping shall be placed at the same elevation, unless throttling valves are utilized, and shall be level. The piping shall be placed in the horizontal center of the trench and shall maintain a straight alignment. Normally the invert of the pressure percolation lines shall be placed 8-1/2 inches above the trench bottom. However, under no circumstance shall the invert of the pressure percolation lines be placed closer than 16-1/2 inches to the seasonal water table as defined in 12VAC5-610-950 A 3 12VAC5-610-470 D. When the invert of the pressure percolation lines must be placed at an elevation greater than 8-1/2 inches above the trench bottom, landscaping over the absorption area may be required to provide the two inches of gravel and six inches of fill over the pressure percolation lines required in subdivision 7 a of this subsection.
d. Backfilling. After the placement of the pressure percolation piping the absorption trench shall be backfilled evenly with crushed stone or gravel to a depth of two inches over the opening. Untreated building paper or other suitable material shall be placed at the interface of the gravel and soil to prevent migration of fines to the trench bottom. The remainder of the trench shall be backfilled with soil to the ground surface.
8. Appurtenances. The distal (terminal) end of each pressure percolation lines shall be fitted with a vertical riser and threaded cap extending to the ground surface. Systems requiring throttling valves will be supplied with couplings and threaded riser extensions at least four feet long so that the flow may be adjusted in each line.
D. Gravelless material with general approval may be used for low pressure distribution in accordance with the manufacturer's approved installation manual, Table 5.4 of 12VAC5-610-950, and the applicable requirements of this chapter.
A. The absorption area is the undisturbed soil medium beginning at the soil gravel or sand interface which is utilized for absorption of the effluent. The absorption area includes the infiltrative surface in the absorption trench and the soil between and around the trenches when trenches are used.
1. It shall have an estimated or measured percolation rate equal to or less than 120 minutes per inch.
3. If no single horizon meets the conditions in subdivision 2 of this subsection, a combination of adjacent horizons may be utilized to provide the required 12-inch sidewall infiltrative surface. However, no horizon utilized shall have an estimated or measured percolation rate greater than 120 minutes/inch.
1. The soil horizon into which the absorption trench bottom is placed shall be a Texture Group I, II or III soil or have an estimated or measured percolation rate of less than 91 minutes per inch.
2. The soil horizon shall be a minimum of three feet thick and shall exhibit no characteristics that indicate wetness on restriction of water movement. The absorption trench bottom shall be placed so that at least two feet of the soil horizon separates the trench bottom from the water table and/or rock. At least one foot of the absorption trench side wall shall penetrate the soil horizon.
3. A lateral ground water movement interceptor (LGMI) shall be placed upslope of the absorption area. The LGMI shall be placed perpendicular to the general slope of the land. The invert of the LGMI shall extend into, but not through, the restriction and shall extend for a distance of 10 feet on either side of the absorption area (See 12VAC5-610-700 D 3).
4. Pits shall be constructed to facilitate soil evaluations as necessary.
D. Sizing of absorption trench area.
Notwithstanding the above, the minimum absorption area for single family residential dwellings shall be 400 square feet.
2. Area reduction. See Table 5.4 for percent area reduction when gravelless material or low pressure distribution is utilized. A reduction in area shall not be permitted when flow diversion is utilized with low pressure distribution. When gravelless material is utilized, the design width of the trench shall be used to calculate minimum area requirements for absorption trenches.
E. Minimum cross section dimensions for absorption trenches.
1. Depth. The minimum trench sidewall depth as measured from the surface of the mineral soil shall be 12 inches when placed in a landscape with a slope less than 10%. The installation depth shall be measured on the downhill side of the absorption trench. When the installation depth is less than 18 inches, the depth shall be measured from the lowest elevation in the microtopography. All systems shall be provided with at least 12 inches of cover to prevent frost penetration and provide physical protection to the absorption trench; however, this requirement for additional cover shall not apply to systems installed on slopes of 30% or greater. Where additional soil cover must be provided to meet this minimum, it must be added prior to construction of the absorption field, and it must be crowned to provide positive drainage away from the absorption field. The minimum trench depth shall be increased by at least five inches for every 10% increase in slope. Sidewall depth is measured from the ground surface on the downhill side of the trench.
2. Width. All absorption trenches utilized with gravity distribution shall have a width of from 18 inches to 36 inches. All absorption trenches utilized with low pressure distribution shall have a width of eight inches to 24 inches.
F. Lateral separation of absorption trenches. The absorption trenches shall be separated by a center to center distance no less than three times the width of the trench for slopes up to 10%. However, where trench bottoms are two feet or more above rock, pans and impervious strata, the absorption trenches shall be separated by a center to center distance no less than three times the width of the trench for slopes up to 20%. The minimum horizontal separation distance shall be increased by one foot for every 10% increase in slope. In no case shall the center to center distance be less than 30 inches.
G. Slope of absorption trench bottoms.
1. Gravity distribution. The bottom of each absorption trench shall have a uniform slope not less than two inches or more than four inches per 100 feet.
2. Low pressure distribution. The bottom of each absorption trench shall be uniformly level to prevent ponding of effluent.
H. Placement of absorption trenches in the landscape.
1. The absorption trenches shall be placed on contour.
2. When the ground surface in the area over the absorption trenches is at a higher elevation than any plumbing fixture or fixtures, sewage from the plumbing fixture or fixtures shall be pumped.
I. Lateral ground water movement interceptors. Where subsurface, laterally moving water is expected to adversely affect an absorption system, a lateral ground water movement interceptor (LGMI) shall be placed upslope of the absorption area. The LGMI shall be placed perpendicular to the general slope of the land. The invert of the LGMI shall extend into, but not through, the restriction and shall extend for a distance of 10 feet on either side of the absorption area.
Area Requirements for Absorption Trenches.
J. Controlled blasting. When rock or rock outcroppings are encountered during construction of absorption trenches the rock may be removed by blasting in a sequential manner from the top to remove the rock. Percolation piping and sewer lines shall be placed so that at least one foot of compacted clay soil lies beneath and on each side of the pipe where the pipe passes through the area blasted. The area blasted shall not be considered as part of the required absorption area.
A. Drip dispersal applies wastewater in an even and controlled manner over an absorption area. Drip dispersal system components may include treatment components, a flow equalization pump tank, a filtration system, a flow measurement method, supply and return piping, small diameter pipe with emitters, air/vacuum release valves, redistribution control, and electromechanical components or controls.
B. Drip dispersal system tubing shall be color coded and certified by the manufacturer as designed and manufactured for the dispersal of wastewater. All drip dispersal system tubing shall be equipped with emitters approved for use with wastewater. For the application of septic tank effluent, the tubing must have self-cleaning emitters.
1. The minimum linear feet of tubing in the system shall be one-half of the minimum soil absorption area in square feet.
2. All tubing shall be placed on contour.
3. Except as provided by 12VAC5-613, drip systems dispersing septic tank effluent shall comply with the requirements of 12VAC5-610-594. Drip systems dispersing secondary effluent or better require a minimum of six inches of cover over the tubing. Cover may be achieved by a combination of installation depth and Group II or Group III soil cover or other approved material over the drip field.
4. The discharge rate of any two emitters shall not vary by more than 10% in order to ensure that the effluent is uniformly distributed over the entire drip field or zone.
5. The emitters shall be evenly spaced along the length of the drip tubing at not less than six inches or more than 24 inches apart.
6. The system design shall protect the drip emitters and system from the effects of siphoning or backflow through the emitters.
1. For the dispersal of septic tank effluent, the minimum soil absorption area for a drip system shall be calculated by multiplying the trench bottom area required for a low pressure distribution system in Table 5.4 of 12VAC5-610-950 by three.
2. For the dispersal of secondary or better effluent, the minimum soil absorption area shall be calculated by multiplying the trench bottom area for pressure distribution systems in accordance with subdivision 10 of 12VAC5-613-80 by three.
3. Landscape linear loading rates shall be considered for sloping absorption areas. For sites where effluent flow is primarily horizontal, linear loading rates shall be less than four gallons per day per linear foot. For sites where the flow is primarily vertical, the linear loading rates shall be less than 10 gallons per day per linear foot.
4. Air/vacuum release valves shall be located at the high points of the supply and return manifolds to each zone.
D. All drip dispersal systems shall be equipped with devices or methods to restrict effluent from draining by gravity to portions of a zone or laterals lower in elevation. Variable distribution due to gravity drainage shall be 10% or less within a zone.
E. A minimum of six hours of emergency storage above the high water alarm in the pump chamber shall be provided. The equalization volume shall be equal to 18 hours of storage. The equalization volume shall be measured from the pump off level to the high water alarm level. An audio/visual alarm meeting the requirements of 12VAC5-610-880 B 8 shall be provided for the pump chamber.
F. Each drip dispersal zone shall be time-dosed over a 24-hour period. The dose volume and interval shall be set to provide unsaturated flow conditions. Demand dosing is prohibited. Minimum dose volume per zone shall be 3.5 times the liquid capacity of the drip laterals in the zone plus the liquid capacity of the supply and return manifold lines (which drain between doses) accounting for instantaneous loading and drain back.
1. At each dosing cycle, the system design shall only allow a full dose volume to be delivered.
2. For design flows greater than 1,000 gallons per day, a means to take each zone off line separately shall be provided. The system shall have the capability to bypass each zone that is taken out of service such that each subsequent dose is dispersed to the next available zone in sequence.
G. Filtration shall be provided to remove suspended solids and prevent clogging of emitters. The filtration design shall meet the drip tubing manufacturer's particle size requirements for protection of the emitters at a flow rate equal to or greater than the rate of forward flushing. Filter flush water shall be returned to the treatment system at a point where the residuals and volume of the flush water do not negatively impact the effluent quality or exceed the hydraulic design capacity of the treatment system.
H. A means for measuring or estimating total flow dispersed to the soil absorption area and to verify field dosing and field flushing rates shall be provided.
I. The system shall provide forward field flushing to achieve scouring velocity as specified by the drip tubing manufacturer. Field flushing shall occur on a routine schedule to prevent excessive solids accumulation and clogging. Flush water shall be returned to the treatment system at a point where the residuals and volume of the flush water do not negatively impact the effluent quality or exceed the hydraulic design capacity of the treatment system.
J. Electrical components shall be Underwriters Laboratory (UL) listed for the intended purpose. The designer shall provide a description with a schematic diagram of the electrical and control functions in the operation and maintenance manual. The electrical control equipment shall be mounted within a National Electrical Manufacturers Association (NEMA) 4X rated enclosure with a rigid latching door. All switches shall be clearly identified, and all internal wiring shall be factory installed. All wiring shall be installed according to applicable electrical safety codes and the manufacturer's installation schematic.
K. All components in a drip dispersal system shall be rated to withstand contact with wastewater and recommended for this application by the manufacturer. All components shall be protected from freezing.
L. The designer of the drip dispersal system shall verify the dosing rates, the flushing rates, and other parameters critical to the proper operation of the system at the startup inspection. A summary of the startup inspection shall be included in the operation and maintenance manual and shall include, at a minimum, the dosing volume, the forward flow flushing rate, the pressure head of the system, and verification of proper cycling between zones.
NOTICE: The following form used in administering the regulation was filed by the agency. The form is not being published; however, online users of this issue of the Virginia Register of Regulations may click on the name of a form with a hyperlink to access it. The form is also available from the agency contact or may be viewed at the Office of the Registrar of Regulations, General Assembly Building, 2nd Floor, Richmond, Virginia 23219.
VA.R. Doc. No. R14-3665; Filed August 3, 2015, 1:47 p.m. | 2019-04-23T16:38:56Z | http://register.dls.virginia.gov/details.aspx?id=5109 |
Acquiring a ruby involvement ring is fairly a deserving acquisition every man must be lucky sufficient to make. Some that do not truly recognize way too much about precious jewelry and rubies may feel as if they should simply most likely to a shop as well as select out a ring which looks appealing to them. Although this might suffice, there are much better ways to selecting the finest feasible sort of ruby interaction ring for your loved one. The complying with will certainly note the leading 10 secrets to getting a ruby engagement ring.
Possibly among the most effective keys to remember if you bear in mind absolutely nothing else from this checklist is to search. Getting a ring of this type on a whim will certainly more than likely not lead you to the best offer or the most effective diamond. Consequently, take your time when looking for an involvement ring, search and also see exactly what is out there to be bought.
You should also know that you have the ability to discover a charming diamond involvement ring with a beneficial price connected to it. This is not to state that you ought to limit your selections only to sale things yet always do not hesitate to peruse the sale counter when looking for an interaction ring to provide to your future fiancée. Do ensure that it is a legit sale as well as not one that runs all the time.
An additional key when it pertains to getting an involvement diamond ring is that the carat size of the diamond is not really just what matters when all is stated and also done. Although some could assume that a bigger diamond equals a far better ruby this is usually not the case as cut, shade and also quality all need to be taken into consideration in addition to the carat weight of the rock.
With today's modern technology, you can buy nearly anything online and the exact same is real for ruby involvement rings. For those who like the concept of an on-line purchase, there are lots of websites which supply diamond rings available and also could supply fairly a good deal too. Simply be particular to obtain documents mentioning real quality of the ring. The on-line company ought to have a 30 day refund guaranty without questions asked.
You could likewise discover that if you remain in the market for not just an involvement ring but wedding celebration bands too, buying all of these things with each other could save you money. Certain ring developers will certainly generate engagement rings with matching wedding bands which you can purchase as a set.
If your liked one likes silver-tone jewelry but you are unable to afford a platinum diamond interaction ring, consider buying one constructed from white gold. White gold is a great alternative as it appears like platinum yet is a lot cheaper.
An additional trick to getting a diamond involvement ring is that several fashion jewelry retailers use sales throughout the year. Some are holiday sales whereas others are a way for the fashion jewelry shop to obtain eliminate the old inventory making space for new items entering into the store.
You might likewise discover that purchasing the ruby as well as establishing different from one an additional can conserve you some money. It additionally allows you to choose specifically the kind of ring that you desire as well as have the ability to see it before the rock is established.
If you are looking for a ruby engagement ring with a great deal of shimmer yet you are incapable to manage a huge carat ruby, think about purchasing a smaller diamond however include baguettes to the ring. This will certainly add sparkle and also shine as well as not set you back as much as a bigger ruby could set you back.
For those who are looking for a fashion jewelry shop which will certainly provide tailored solution, you could want to purchase the ruby interaction ring for your enjoyed one at a small precious jewelry shop. These jewelry boutiques are typically run by the individual proprietor who will certainly do everything feasible making your involvement ring shopping journey stunning.
Diamonds are normally readily available in an extremely vast range of colors. The majority of people find out about anemic diamonds and GIA's shade grading system that is used to categorize a ruby's body color ... you know D, E, F, etc. This color grading system is only used to classify one of the most common ruby body shade of yellow however anytime a diamond is found in an additional shade like pink, blue, environment-friendly, etc.; then this diamond is described as a "" fancy ruby"".
All-natural Fancy rubies can be extremely costly as well as lot of times much more expensive than a comparable dimension anemic ruby. An excellent example of a Fancy diamond is the well known 45.52 carat fancy deep blue diamond, the Hope Ruby, which gets on screen in the Smithsonian Nature Gallery in Washington, DC.
A color boosted diamond is a 100% natural diamond that has actually had its shade transformed. And also ideal of all, shade enhanced diamonds come in a very large option of shades at extremely affordable rates!
A little bit of background- For several, several years it has been popular that a diamond's shade could be "" boosted"" by placing a bit of tinted compound on the surface of a ruby and also simply like magic ... a ruby that had an obvious yellowish color would alter to a much more attractive near colorless diamond. Unfortunately, this type of shade improved diamond can alter back to its initial body shade if this tinted compound was unintentionally gotten rid of. In more recent years, the modern technology of color improved rubies has actually gone incredibly high technology. It is currently possible to completely transform the shade of a diamond! These procedures are thought about long-term because it does remain stable when revealed to everyday normal conditions. The shade will not fade if subjected to sunlight or be washed off by severe chemicals.
Exactly how is it done? The desired result of any one of these treatments is to have a much more valuable diamond. A much less valuable diamond would be a ruby that has a reduced body color or occasionally a reduced quality. The shade improved diamond therapy business recognize if they begin off with a particular kind of ruby and procedure it for a certain amount of time that they need to wind up with a particular color however it does not constantly work this way. This is a scientific research that does need some art in their procedures ... the only process that provides constant results is the finish process.
The 3 procedures are as complies with- Refine # 1- HPHT Shade Improved Diamonds- High Stress/ Heat (HPHT) treatment can enhance the color of certain sorts of brownish diamonds and also thus boost their worth. General Electric has actually established a procedure that very much is a mechanical simulation of a ruby's production in nature. The shade enhanced diamond will be heated up to a really high temperature under an extremely high, supported stress. Mistakes in the crystal structure are after that repositioned resulting in a change of the ruby's color. Due to the fact that the problems of HPHT are really much like ruby's original development, just a well furnished lab will have the ability to favorably determine this sort of shade improved diamond. HPHT wased initially made use of to turn yellow-colored diamonds right into more marketable fancy tinted improved diamonds, now it is additionally made use of to transform some unpopular brown diamonds right into more desirable colorless colored improved diamonds.
Process # 2- Irradiated Shade Boosted Diamonds- OK ... do not start getting all delighted because you saw the word irradiated! This is a 100% risk-free procedure that is very just like just what is made use of to preserve food by subjecting it to a stream of Gamma rays. The color boosted diamond procedure is performed in a number of various ways however the results are just the same. You begin with a low color (P, Q, R, etc.) 100% natural diamond that has already been cut and also polished, after that it is exposed to a stream of quick electrons. During this component of the process the diamond will certainly resort to an extremely dark shade since some of the atoms in the diamond's crystal framework have currently been disjointed as well as this consequently has actually impacted the method light go through the diamond. Next the diamond goes with a regulated heating (annealing) procedure, this permits a few of those atoms to relocate (partly repaired) in order to obtain a wanted color.
Process # 3- Coated Color Enhanced Diamonds- The layer on sleek diamonds refers to a thin fabricated layer that modifies the shade of the ruby. The finish could either be of the wanted color or could cause a colored interference-effect. Sadly occasionally this procedure is done to trick a purchaser. It is a relatively easy process to carry out, it has actually been around for numerous years (although the finishes products are far better now), and it does not call for a great deal of costly advanced tools. Just recently, I've seen some pink covered rubies on the market, they are very appealing ... and also certainly you would need to acquire them knowing that they have been layered and also follow your jewelry expert's standards about owning and taking care of these color enhanced rubies. The covering can be put on the whole of a ruby's surface area, just the base of the ruby, or to a narrow area near the band. A well-applied finishing could change the color by several color quality. Some layers can be gotten rid of with steaming in acid, strong cleaning solutions, or perhaps house chemicals. Occasionally dots or larger locations of purple or blue ink are repainted on the ruby in order to help counteract a yellowish color. The diamond's setting will usually cover the dots, so they are tough to see in a mounted rock.
So, is a color improved diamond right for you? Maybe ... natural elegant shade rubies can be beautiful but they are expensive! Shade improved rubies are cost effective and also enable numerous individuals to own a brightly colored diamond. Ask your local jeweler if they have any type of Fancy diamonds ... either all-natural or color improved diamonds. It is always intriguing, and also enjoyable, to look at something different!
Under typical wear the irradiated as well as HPHT shade boosted rubies will have no issues of the shade fading away. The only factor to consider will be when you have to have any kind of kind of service done on the piece of precious jewelry. If this kind of color boosted ruby is revealed to extreme quantities of heat it might affect the color. The jewelry expert will certainly should recognize that the ruby is a shade enhanced ruby before any job is done then the jewelry expert will have the ability to choose the very best strategy. Shade boosted rubies are now also utilized as the tiny accent rubies around a larger anemic diamond. There are several exciting items of precious jewelry available with little blue, yellow, black, or environment-friendly color improved diamonds.
Not all vendors provide ruby grading laboratory reports (aka ruby top quality reports) to their customers. So my general advice to you is to maintain your cash in your pocket when handling such jewelry experts.
Just acquire a diamond involvement ring if it includes the original ruby high quality record.
A laboratory report is an independent examination of the 4Cs of a loosened diamond and consists of an outlined representation of the rock's clearness features as well as a graphic depiction of the stone's percentages. Having such a report permits you to contrast rubies of various high qualities and also ultimately aids you make an even more notified buying choice.
A seller might reduce corners and also not supply a laboratory record or a dishonest vendor may supply a phony one due to the fact that of the moment, difficulty and also expenditure he'll bear to obtaining a stone rated.
Yeah - there is a rate for rating a diamond (though that expense is ultimately paid by the customer), plus the shipping and also insurance coverage charges for sending out the diamond to the lab. As well as let us not forget the possibility price of a jewelry expert not having the diamond in his shop offer for sale for a couple of weeks while the grading occurs.
Yes, all diamond quality records are not developed equal. Within the industry, it is an agreement that both top labs are GIA-GTL (Gemological Institute of The U.S.A.'s Gem Trade Laboratory) and the AGS (American Treasure Society Laboratories).
The GCAL (Treasure Qualification and also Assurance Laboratory) also provides highly regarded records or "ruby certificates" as they are described by GCAL. The GIA has the best worldwide reputation for independence and also uniformity. As a result of their constant shade as well as clearness strictness guidelines, the world's biggest and also most expensive diamonds have been sent there for rating decades. In 2006, GIA-GTL included a two-dimensional cut grading system for rounded great rubies.
AGS uses the strictest cut requirements in the sector. It makes use of a three-dimensional light performance metric that can grade a number of diamond shapes. Actually, it is the only cut grading system that is recognized by the clinical area.
Just what is even more, its Ruby Top quality Record makes use of a distinct as well as proprietary 0 to 10 grading system to evaluate the 4 Cs - a system which is easier to comprehend than GIA's grading system. Actually, AGS even goes the additional step by relating their 0-10 score range to various other forms of score. For example, the traditional VS1 ruby clearness rating is a 3 on the AGS Diamond Quality Document.
1. Ruby grading is not standardized or regulated and also for this reason you may stumble upon tier 2 labs that utilize looser standards to the tier 1 grading labs mentioned above. If you purchase a diamond that has been rated by a rate 2 laboratory, you may wind up paying more for a lower top quality ruby. So for instance, a diamond ranked a "F" in color at a tier 2 laboratory may obtain a G, H, or lower shade rating at a much more trusted lab. The sector also marks down diamonds rated by lower recognized labs by about 15-30% or even more. So either you only purchase a diamond rated by a rate 1 lab or you accept that you may be acquiring a lower top quality ruby compared to just what is stated on the report if that ruby is graded by a minimal recognized lab.
2. Several big chain shops have substantial agreements with lower well-known labs with "softer" ruby grading guidelines. Some of these softer labs put "recommended substitute values" on the laboratory reports - values which are above exactly what shops plans market the rubies for. So a salesman in a chain store may say to you, "Take a look at the terrific offer you are getting here. We are selling you this ruby involvement ring for $2500 but the report claims that the recommended replacement value is $4000." Wow - what an offer - NOT! This is why it is better that you trust just independent rate 1 labs.
Additionally remember that credible ruby grading records are not assessments and also don't supply evaluation figures. Ruby appraisals are commonly blatantly filled with air as well as are not something you'll desire to count on.
"It is wrong to state that pupils, grads, their companies, or particular gemstones are "licensed" by GIA. The Gemological Institute of America does not license anybody or anything. Neither a student nor a grad who has actually been granted a certificate or diploma, neither a treasure which has actually been rated or determined by GIA has actually been certified by GIA".
So it is possible that you the consumer is left holding the bag needs to an error in a record is later discovered. Courts have often ruled that sellers, not laboratories, are accountable for such errors. Why? Since the labs suggested in advance that their reports couldn't be held accountable.
A. You could fly to India where jewelers provide a lifetime buyback plan to their customers. As well costly to fly?
B. You could discover among the 20% of United States jewelry experts who sell fully bonded diamonds. These are rubies that are marketed with life time damage, lifetime trade-in as well as lifetime buyback policies.
C. Not as excellent a solution as acquiring a fully bound diamond but you could get a diamond that has a real "certification" and also not a report. "Qualified diamonds do have guaranties" albeit for much shorter durations.
Certification Some vendors describe a "diamond record" as a "qualified diamond" yet technically this is not deal with. From a legal viewpoint, a diamond record is a merely an expert point of view though in reality, facets of a ruby grading record are not just point of views.
As an example, a diamond's carat (weight) could be properly established as well as its cut quality by determining its optical performance or by describing a computer model. A certification on the other hand is a declaration of fact - a paper for which the issuer approves lawful duty and also will certainly make restitution to the consumer for errors.
Some leading diamond grading labs use both reports as well as certificates. AGS offers Ruby Quality Papers (non-certified records) as well as likewise Diamond Quality Certificates. Ruby High quality Certifications are ready exclusively for AGS retail jewelers as well as offers warranties from participating American Treasure Society member shops.
GCAL licenses it's diamond grading additionally. Its 100% money-back warranty plan is valid for a period of two years from the day on the suitable certification. This plan makes sure the precision of the cut, shade and clarity qualities as well as the carat weight.
A record or certificate ought to will certainly have a number on it that could or may not be inscribed on a diamond. You will have the ability to get in that number on the site of the licensing lab to inspect a report's credibility.
The Record #. This number is offered as well as taped in a laboratory's document as well as might or could not be etched on a ruby's girdle. You could get in the report number on a grading laboratory's site to examine the authenticity of the diamond quality report or to obtain even more information concerning the diamond. Shape & Element Style: This is the synopsis and the cutting design made use of for the facet arrangement. There are 3 fundamental element styles - "dazzling cut, step cut and also blended cutting design" as well as 12 fundamental shapes which consist of notables such as rounded great and also princess cut" diamonds.
Measurements: This refers to dimension (not weight) of a diamond. Dimension includes dimensions such as size, width, weight as well as diameter. A measurement is commonly provided to the hundredth of a millimeter. Dimensions play a substantial duty in just how a ruby sparkles.
Carat Weight: The weight of a ruby is determined to the hundredth of a carat weight as well as some even provide such step to the thousandth of a carat (1.123 ct.). Carat is one of the most objective and the most convenient to comprehend of the 4Cs since all one needs to do is weight the stone. Color Quality: This tells you the degree of color lack in the ruby. The less color the higher the grade.
Diamonds are generally graded from D-Z; the closer to "D" the whiter the ruby. You must never ever see ruby shade range such as (G-H, I-J-K, and also so on) on a ruby record. You should just see shade varieties on appraisals for stones that are mounted.
Clearness Grade: Essentially every ruby has inner blemishes called inclusions as well as exterior flaws called blemishes. A diamond is graded inning accordance with the size, type, location as well as amount of these imperfections.
Clarity grades vary from Flawless (FL) - Consisted Of. Labs use a couple specialists to grade the clearness of a ruby in order to develop an extra precise reading.
Cut Quality: Extra current ruby reports consist of a cut grade for typical round brilliant rubies. Cut takes right into consideration the luster, fire and also scintillation of the ruby. Cut quality ranges from Exceptional - Poor.
Various other components you might find on a diamond report consist of the gloss, balance, fluorescence as well as percentage. Equipped with this information, you are better able making an assessment of the quality of diamond that is installed in an interaction ring.
Rubies are normally offered in a really variety of colors. The majority of people understand about anemic diamonds and GIA's color grading system that is utilized to identify a diamond's body shade ... you understand D, E, F, etc. This shade grading system is just used to categorize the most typical ruby body color of yellow nevertheless anytime a diamond is found in one more shade like pink, blue, green, etc.; after that this diamond is referred to as a "" expensive ruby"".
Natural Fancy rubies could be very pricey as well as several times much more pricey than a comparable dimension colorless ruby. A great example of a Fancy ruby is the well known 45.52 carat elegant deep blue diamond, the Hope Diamond, which gets on display in the Smithsonian Nature Museum in Washington, DC.
A color improved diamond is a 100% natural diamond that has had its shade altered. As well as ideal of all, shade boosted rubies been available in a very large selection of colors at very affordable prices!
A little bit of background- For lots of, several years it has been popular that a ruby's color might be "" boosted"" by putting a little bit of colored material externally of a diamond and much like magic ... a ruby that had an obvious yellow-colored shade would certainly change to a more appealing near anemic diamond. However, this sort of shade improved ruby might change back to its initial body shade if this tinted material was unintentionally eliminated. In more recent years, the innovation of color boosted diamonds has gone exceptionally advanced. It is now feasible to completely transform the color of a diamond! These processes are thought about irreversible since it does stay secure when subjected to daily typical conditions. The shade will certainly not fade if revealed to sunshine or be cleaned off by severe chemicals.
Just how is it done? The wanted outcome of any one of these therapies is to have a much more marketable diamond. A less valuable diamond would be a diamond that has a low body color or occasionally a reduced clarity. The shade boosted ruby treatment firms know if they begin with a particular sort of diamond and also process it for a specific amount of time that they need to finish up with a specific color however it does not constantly work that method. This is a science that does require some art in their procedures ... the only process that gives constant outcomes is the finishing process.
The 3 processes are as adheres to- Refine # 1- HPHT Shade Boosted Diamonds- High Pressure/ Heat (HPHT) therapy could enhance the shade of particular types of brownish rubies as well as therefore increase their worth. General Electric has actually developed a procedure that virtually is a mechanical simulation of a ruby's production in nature. The color improved diamond will be warmed up to a very heat under a really high, supported pressure. Faults in the crystal structure are after that reorganized causing a modification of the diamond's color. Due to the fact that the conditions of HPHT are really just like diamond's original formation, just a well furnished laboratory will have the ability to positively identify this kind of color boosted ruby. HPHT was first utilized to transform yellowish diamonds into more valuable fancy tinted boosted diamonds, today it is likewise used to transform some undesirable brownish diamonds into even more preferable anemic tinted boosted rubies.
Refine # 2- Irradiated Shade Enhanced Diamonds- OK ... do not start obtaining all excited because you saw words irradiated! This is a 100% secure process that is very much like what is made use of to maintain food by subjecting it to a stream of Gamma rays. The color enhanced diamond process is done in numerous different means yet the outcomes are just the same. You begin with a low color (P, Q, R, and so on) 100% all-natural diamond that has currently been cut as well as polished, then it is subjected to a stream of quick electrons. During this component of the process the diamond will rely on an extremely dark color since several of the atoms in the diamond's crystal framework have actually now been dislocated and also this in turn has actually impacted the means light go through the ruby. Next the diamond goes through a controlled heating (annealing) process, this allows some of those atoms to relocate (partly fixed) in order to obtain a desired shade.
Refine # 3- Covered Shade Enhanced Diamonds- The layer on sleek rubies describes a slim artificial layer that modifies the color of the ruby. The finish can either be of the desired color or could create a colored interference-effect. Sadly in some cases this procedure is done to trick a buyer. It is a relatively simple process to do, it has been around for years (although the coverings materials are far better currently), as well as it does not need a whole lot of expensive advanced devices. Recently, I have actually seen some pink coated diamonds on the marketplace, they are very eye-catching ... and also of program you would certainly have to purchase them recognizing that they have been coated as well as follow your jewelry expert's standards about having as well as caring for these shade boosted diamonds. The layer could be related to the entire of a ruby's surface area, just all-time low of the diamond, or to a slim zone near the band. A well-applied finish can change the color by one or more color quality. Some layers can be gotten rid of with boiling in acid, solid cleaning options, and even home chemicals. Often dots or bigger areas of purple or blue ink are paintinged on the ruby in order to help counteract a yellowish shade. The diamond's setting will typically cover the dots, so they are challenging to see in a mounted rock.
So, is a shade boosted diamond right for you? Perhaps ... all-natural expensive color diamonds could be beautiful however they are costly! Color improved diamonds are economical and also enable several people to possess a vibrantly tinted ruby. Ask your neighborhood jewelry expert if they have any type of Fancy diamonds ... either all-natural or shade enhanced diamonds. It is constantly interesting, and enjoyable, to consider something different!
Under typical wear the irradiated and also HPHT color boosted diamonds will have no worry of the shade fading away. The only factor to consider will certainly be when you should have any kind of service done on the item of precious jewelry. If this kind of shade boosted ruby is subjected to extreme amounts of warmth it may affect the shade. The jewelry expert will certainly require to understand that the ruby is a shade enhanced ruby prior to any type of work is done then the jeweler will certainly be able to choose the very best program of activity. Shade enhanced diamonds are now also used as the little accent diamonds around a bigger colorless diamond. There are numerous exciting items of fashion jewelry offered with tiny blue, yellow, black, or green shade improved rubies.
You have been dating the person of your desires for rather a long time currently. You might or could not be staying with each other as a pair, either of the 2 has its own partnership troubles; if you do not live as a couple, the sensation of loneliness that rises via your heart each time your companion says the words "good bye" after a beautiful day well invested with each other inspires you to do even more and each time you turn erroneously to show to them your feelings, the void that welcomes you, swiftly transforms your ideas to do even more right into a willpower to do more currently! For those who have actually taken their connections a step further by relocating in together.
Due to the solitude really felt each time a companion says excellent bye, different types of pressures and also sensations established in they could be the need to make your love official for the entire world to see or you both wish to start a stable family. Whatever motivates you into ultimately making the initial action to the most important dedication you would ever before make in your entire life may not be off value however the sign which you need to give while taking this action is of the utmost importance - "The Engagement Ring".
Today buying an involvement ring has currently come to be the status quo of determining yourself as one who is currently taken and ready for marriage yet have you ever played with the rock or band on your hand and also assumed about its history? Since it's not defined in the scriptures or the oldest papers that offer in-depth accounts of methods prior to marital relationship in time passed.
The preferred interaction ring of the modern-day age had its start as recent as the 19th century and also wasn't constantly a sign of undying affection, it was a lot more or less the very first part settlement of the bride cost to be paid to the bride-to-be's family yet turned over and also used by the bride-to-be. It was a kind of insurance coverage attended to the woman, in instance the potential companion which was constantly the man at that time disbands the marriage therefore compromising the lady's virtue and also attract various other guys.
Real definition and also icon of the involvement ring started beaming through in the 20th century, when guys gave their fiancées a band that symbolized their love as well as purposes for a marital relationship union, the interaction ring symbolized that she had been taken, from limitations as well as prepared to be wed to her true love as well as it was positioned on the 4th finger of the left hand, for that finger was thought to have a blood vessel running via it which came straight from the heart for that reason symbolizing the finger as a "heart finger". Earlier rings could simply be a piece of silver or an iron band without any type of adornment, which the female inserts right into her 4th finger on her left hand, this was the technique for a brief time till business rings as well as the media took control of the involvement scene. The Adverts revealed on interaction rings in the center of the 19th century suggested that men ought to invest no less compared to 2 months of their regular monthly earnings to acquire the best ring for his precious bride to be and simply with an advert the meaning and design of the involvement ring took a brand-new direction. The contemporary engagement ring is an icon that reveals that a person is engaged to be married snappy. The cut, rates and also make from the engagement ring although not all crucial, includes a certain flavour to your involvement day or event and also has actually spurned a brand-new jewelry market all on its own. The Engagement ring now comes in various designs; maybe a band made of valuable materials such as Gold, Platinum or Silver or maybe a band laced with gem rocks to give a tempting charm to the ring. The different major designs of interaction rings shall be reviewed listed below.
Solitaire rings; these are the ultimate timeless interaction rings, the jewelry ring contains a band and also a gem stone; the band might be made from any material of your option ranging from gold to platinum while the gems need to likewise be preferred to fit your peculiar attributes, it might be rubies or sapphire cut in various manner ins which would be explained listed below.
Involvement Rings with Side rocks: These charming rings are made with gems placed into the sides of the band, which could be constructed from any type of steel product depending on your preference. Some side stones call additionally come with a central stone at the center. The popular gemstones made use of for this style of rings are generally diamonds however you could directly customize your gemstone to the taste of your love.
The Three Rock Bands or the Trinity ring: this is a ring style with its very own enchanting background, it is thought that each rock in the 3 rock ring symbolizes the past, present as well as future of the moment where a couple has actually spent with each other and also the ring would bind them with each other for all eternity. The ring design is that of a spotless platinum band with three splendid gemstones; one at the middle with two area tactically by the sides. The gems are usually crazy of rubies yet you are permitted to customize yours right into three different kinds of gems if you so need.
The Matching Bridal Establish: this is a stunning mix of both the engagement ring and also the actual wedding celebration band, there is no collection layout on just how a matching wedding collection must appear like but it is generally excellent to have either the involvement ring or the wedding celebration ring emphasizing the other and also vice versa I.e. a charming platinum interaction ring with a gemstone must be coupled with a simple Gold classic wedding celebration band, giving the new bride with a touch of colour. Stress Rings: let the name not act as an obstacle to you when thinking about the stress ring for it is one of those designs we call straightforward but indefinitely stylish, it contains a band made from any product of your choice, firmly holding a gems in its grasp with pressure i.e. the gemstone is not held by prongs however squeezed in between both sides of the band material you selected. The band material functions as its holding assistance. It is extremely advised you go with 2 contrasting colours for the band and the gems to bring out the true appeal of the tension ring.
The Pillow cut: this method of cutting a gemstone, gives the rock a timeless form that is in between a rectangle and also an oval, it is among one of the most popular jewellery cuts as well as it's also called the antique cut.
The Marquise cut: the technique used in cutting the shape of the marquise cut provides the gemstone an oblong shape between with ends. This ring has a traditional elven or must I state natural appearance that brings out the mythological elegance in your new bride.
The Emerald cut: the emerald treasure naturally has its own specified shape and this cut technique plainly mirrors it, the emerald cut is a rectangular cut with chopped edges protruding at its four ends.
The Asscher cut: this method of cutting the gemstone provides it a shape people say is comparable to the emerald rectangle however it is extra octagonal in shape compared to rectangular shape, the octagonal shape aids it catch light as well as mirror it in different directions. It's a flawlessly attractive cut for a rings gems.
The Princess cut: this is one of one of the most used cuts on gems, it is square fit and also assists draw out the appeal of the gems utilized quite demurely. The Round cut: this cut basic looks round but its even more compared to that for it has different spikes added to its surface areas making it among, if not one of the most radiating gems cut of the great deal, it is understood amongst women for its ability to blind the eye (sparkle).
The Heart cut: perfect for the romantics in mind and also formed to tummy their hearts, it is a basic and also classy cut that is rather prominent amongst ladies. After giving a general expose on interaction ring layouts as well as cuts, the next action is to bring to your notification the leaders in the industry that offers you with the most effective as well as most expensive rings- in many cases- around.
Bill Barnes: the producers of several of the most beautiful and also pricey engagement bands available. Tiffany: everybody recognizes the name Tiffany this developer residence additionally gives clients with top of the array rings as well as costs defer. Tacori: the Tacori design is also one of one of the most searched for involvement rings in the jewelry market the cut and setup of its styles are constantly a delight to behold.
In choosing a ring your budget plan must additionally enter into play so either you purchase Tiffany's or an ordinary engagement ring, it's the thought that counts.
Not all sellers offer diamond grading laboratory reports (aka ruby quality records) to their customers. So my general suggestions to you is to maintain your loan in your pocket when managing such jewelry experts.
A lab report is an independent assessment of the 4Cs of a loose ruby as well as consists of an outlined layout of the stone's quality features and a visuals depiction of the stone's percentages. Having such a record allows you to contrast diamonds of various top qualities and also inevitably assists you make an even more educated purchasing decision.
A retailer may cut corners and also not give a lab record or an unscrupulous seller might provide a phony one as a result of the time, problem and expenditure he'll birth to getting a rock graded.
Yeah - there is a rate for grading a diamond (though that expense is at some point paid by the consumer), plus the shipping and insurance policy costs for sending the ruby to the laboratory. As well as let us not forget the chance cost of a jewelry expert not having the diamond in his shop offer for sale for a few weeks while the grading occurs.
Yes, all ruby top quality records are not produced equivalent. Within the industry, it is an agreement that the 2 premier labs are GIA-GTL (Gemological Institute of The U.S.A.'s Gem Profession Laboratory) and also the AGS (American Gem Society Laboratories).
The GCAL (Treasure Accreditation and Assurance Lab) additionally provides extremely concerned reports or "ruby certificates" as they are referred to by GCAL. The GIA has the toughest global reputation for independence as well as consistency. As a result of their consistent shade and also quality strictness guidelines, the globe's biggest and also most pricey diamonds have actually been sent out there for grading years. In 2006, GIA-GTL included a two-dimensional cut grading system for round great diamonds.
AGS makes use of the most strict cut standards in the market. It uses a three-dimensional light efficiency metric that can quality a number of diamond shapes. Actually, it is the only cut grading system that is recognized by the clinical community.
Just what is even more, its Ruby Top quality Record uses a distinct and also proprietary 0 to 10 grading system to examine the 4 Cs - a system which is much easier to understand than GIA's grading system. In reality, AGS also goes the extra step by equating their 0-10 score range to other kinds of rating. As an example, the traditional VS1 ruby clearness ranking is a 3 on the AGS Diamond High Quality Document.
1. Ruby grading is not standard or regulated as well as therefore you might find tier 2 laboratories that employ looser guidelines to the rate 1 grading labs discussed over. If you acquire a diamond that has actually been rated by a tier 2 lab, you might end up paying more for a minimal top quality diamond. So for example, a ruby rated a "F" in color at a tier 2 laboratory might get a G, H, or reduced shade score at a much more trusted lab. The sector likewise discounts rubies graded by lesser known labs by concerning 15-30% or more. So either you just acquire a diamond rated by a rate 1 laboratory or you accept that you might be buying a minimal high quality diamond compared to just what is stated on the record if that ruby is graded by a lower recognized lab.
2. Numerous large chain shops have huge agreements with minimal well-known laboratories with "softer" diamond grading guidelines. A few of these softer labs placed "recommended replacement worths" on the lab records - worths which are more than what shops plans sell the rubies for. So a salesperson in a store could say to you, "Check out the wonderful offer you are getting right here. We are selling you this diamond involvement ring for $2500 yet the record states that the suggested replacement value is $4000." Wow - what an offer - NOT! This is why it is better that you rely on only independent rate 1 labs.
Also remember that trustworthy diamond grading records are not assessments and also don't use appraisal numbers. Ruby assessments are commonly grossly inflated as well as are not something you'll desire to rely upon.
"It is incorrect to state that pupils, grads, their services, or specific gemstones are "certified" by GIA. The Gemological Institute of The U.S.A. does not license any individual or anything. Neither a trainee neither a graduate that has been awarded a certification or diploma, neither a treasure which has been rated or determined by GIA has been accredited by GIA".
So it is feasible that you the customer is left holding the bag must an error in a report is later on discovered. Courts have often ruled that vendors, not laboratories, are in charge of such mistakes. Why? Because the labs showed in advance that their records couldn't be held accountable.
B. You can discover one of the 20% people jewelry experts that sell totally bound rubies. These are diamonds that are marketed with life time damage, life time trade-in and life time buyback plans.
C. Not as good a remedy as acquiring a completely adhered diamond but you might purchase a diamond that comes with a real "certification" and not a record. "Licensed rubies do have warranties" albeit for much shorter periods.
Certification Some vendors refer to a "diamond report" as a "certified diamond" but technically this is not fix. From a lawful standpoint, a ruby record is a simply a skilled point of view though in reality, elements of a diamond grading record are not just opinions.
As an example, a diamond's carat weight (weight) could be precisely determined as well as its cut grade by determining its optical efficiency or by describing a computer system model. A certificate on the various other hand is a statement of fact - a paper for which the issuer approves lawful responsibility and also will make restitution to the customer for mistakes.
Some top diamond grading laboratories use both records and certificates. AGS supplies Diamond Quality Papers (non-certified reports) as well as Diamond High quality Certificates. Ruby Top quality Certificates are prepared exclusively for AGS retail jewelry experts and uses warranties from taking part American Gem Society participant stores.
GCAL certifies it's diamond grading also. Its 100% money-back assurance policy stands for a duration of two years from the date on the applicable certificate. This policy guarantees the accuracy of the cut, color and also quality qualities and the carat weight.
A record or certificate must will certainly have a number on it that may or might not be engraved on a diamond. You will have the ability to get in that number on the website of the accrediting laboratory to check a report's credibility.
The Record #. This number is provided as well as taped in a lab's document and also might or might not be engraved on a ruby's band. You can enter the record number on a rating laboratory's web site to inspect the authenticity of the ruby top quality report or to obtain more information about the diamond. Shape & Aspect Design: This is the outline and also the cutting design used for the element plan. There are 3 standard aspect designs - "fantastic cut, action cut and combined cutting style" and 12 basic forms which include notables such as rounded dazzling and princess cut" diamonds.
Measurements: This describes dimension (not weight) of a diamond. Size consists of dimensions such as length, width, weight and also size. A measurement is commonly noted to the hundredth of a millimeter. Dimensions play a significant duty in exactly how a diamond glows.
Carat Weight: The weight of a diamond is determined to the hundredth of a carat weight and also some also offer such procedure to the thousandth of a carat weight (1.123 ct.). Carat weight is one of the most objective as well as the most convenient to recognize of the 4Cs due to the fact that all one needs to do is weight the rock. Color Quality: This tells you the level of color absence in the diamond. The much less color the greater the quality.
Rubies are usually graded from D-Z; the closer to "D" the whiter the ruby. You must never ever see diamond shade variety such as (G-H, I-J-K, and more) on a ruby report. You should just see shade varieties on appraisals for rocks that are placed.
Clarity Quality: Virtually every diamond has actually inner imperfections called additions and outside flaws called blemishes. A diamond is rated inning accordance with the size, type, area and quantity of these flaws.
Clarity grades range from Perfect (FL) - Included. Labs make use of a couple specialists to quality the clarity of a ruby in order to generate an extra exact reading.
Cut Quality: Much more recent diamond reports consist of a cut quality for common round brilliant diamonds. Cut thinks about the luster, fire and scintillation of the diamond. Cut grade varies from Superb - Poor.
Other aspects you could stumble upon on a ruby report include the gloss, proportion, fluorescence as well as proportion. Equipped with this details, you are better able to earn an assessment of the quality of ruby that is placed in an involvement ring.
Involvement rings are readily available in a selection of styles, rocks, cuts and shapes. Amongst all the kinds of rocks made use of in interaction rings, diamonds are the most precious as well as proper ones. Their sparkle genuinely has the ability to win a female's heart. There is an incredible collection of ruby interaction rings available on the market. A few of the rings are designer creations, which are created based on the consumer's option. They could likewise be called personalized ruby involvement rings. Several of the jewelers supply the consumers with the ability of knowledgeable developers to bring magic to the otherwise normal functions as well as forms.
Developer ruby involvement rings are not just designed according to the selection of customer however additionally fit their spending plan. These rings are economical, as contrasted to the various other diamond involvement rings. The buyers can choose their own ring setups and match the diamonds, to develop an unique item of jewelry for loved ones. A lot of the developer diamond engagement rings are made in white gold, yellow gold as well as platinum. Aside from the setups as well as diamond option, there are a number of other details that play a crucial role in developing a ring. Apart from selecting a particular design, it is essential for the buyers to bear in mind the different mixes of layouts. The size, density and precise size of the rings are likewise crucial and also need to be taken right into consideration while designing a ruby interaction ring. Many of these rings take around 6 to 8 weeks to be made.
Developer ruby interaction rings are really good options, as compared to the readymade rings conveniently offered. These rings offer more fulfillment to the purchasers and also are special, owing to the personal touch. They give the buyer to service the layout as well as option of rock and customize the creation.
To begin our attribute on various sorts of gemstones, we will certainly start with the very best and most well recognized gems of them all the ruby. The diamond is the supreme gems. It has few weaknesses and also many staminas. It shines with its amazing worth and also nostalgic worth. It is used in wedding event rings to stand for unlimited love or utilized as gifts/jewelry to be provided to enjoyed ones. But the diamond is so a lot even more compared to its timeless elegance.
The diamond obtains its name from the Greek work adamas indicating unequalled. In solidity, there is no comparison. The diamond prices in the Mohs range a 10 which is the hardest material on Planet. Its cutting resistance is 140 times that of the ruby and sapphire, the gems(Diamond) that are following in the Mohs range in hardness. The ruby's optical homes such as luster and rigidity make it unique and also easily identified from various other imitations. Enjoy!
The first videotaped ruby go back around 800 B.C. in India. Some think it also went back 6,000 years back. The rubies were utilized as attractive objectives as well as as talismans to fend off evil as well as offer protection in fight. Throughout the Dark Ages, rubies were also specified to be utilized as a medical aid. Spiritual medical professionals also informed people that if they hold a diamond in a hand as well as make the sign of the cross would, it would certainly treat and also health problem as well as heal wounds.
Diamonds ended up being extra prominent throughout the 19th century as a result of exploration of diamond down payments in South Africa. This discovery leads to increased supply, improved reducing as well as polishing techniques, and also growth in economic situation. In 1979, rock hounds found the Argyle pipe in Australia which to this date is the wealthiest ruby down payment worldwide. Argyle, ever since, alone is accountable for supplying over one third of the globe's rubies every year.
Diamonds consists of an allotrope of carbons that are created in high-pressure, high-temperature conditions. Diamonds are generated 90 miles under the Planet's surface at temperatures of concerning 2200 degrees Fahrenheit. Diamonds are formed deep within the planet and eventually, over exceptionally lengthy durations of time, push their means to the earth's surface, normally through volcanic eruptions.
The age of these rubies from beneath the surface area of the earth are from 1 to 3.3 billion years old! When rubies are formed and also begin their climb to the earth's surface area, they go through networks where the lava from the volcano increases to the surface, picking up diamonds in the process and eventually depositing them on the surface, where they are at some point discovered and mined.
There are four distinct attributes that figure out the worth and also quality of a diamond. These are the shade, cut, clearness as well as carat. Or else called the 4 C's of a ruby. In the adhering to, we will certainly chat regarding these attributes in detail.
The cut a diamond is determined by the ruby's percentage such as its shape, size and also depth. The cut determines what is called the diamond's "luster". Even if the diamond itself has perfect shade as well as clarity, with a poor cut the diamond will have a boring radiance. This is due to the fact that the cut determines how light travels within the ruby. The Gemological Institute of The U.S.A. has actually likewise developed a clearness grading system to rank ruby clearness. This grading system includes Perfect (Fl), Internally Perfect (IF), Very Very Slightly Consisted Of (VV1 or VV2), Very A Little Included(VS1 or VS2), Somewhat Included(SI1 or SI2), as well as Included(I1, I2, as well as I3). Although this system had actually been added to the diamond sector, it is not commonly made use of. This is due to the fact that it took a great deal of method and training to incorporate it.
The cut a ruby is determined by the diamond's percentage such as its form, size and deepness. The cut identifies exactly what is called the diamond's "sparkle". Also if the ruby itself has ideal color and also clearness, with an inadequate cut the ruby will certainly have a boring brilliance. This is because the cut establishes exactly how light journeys within the ruby.
There are 3 sorts of cuts that can establish the ruby's luster. These are a superficial cut, a cut that is also deep as well as perfect cut. A superficial cut is a cut of a diamond that is as well reduced, that light traveling via it is shed on the base of the stone and does not return right into sight. This cut makes a diamond appear drab as well as plain. A cut that is also deep is a cut that is too expensive, that light traveling with it gets away via the sides and darkens the stone. A suitable cut is an ideal cut on a ruby that mirrors light to the top of the rock, providing it ideal radiance.
As mentioned on the last e-newsletter, a solitary carat weight(ct) evaluates regarding 200 milligrams or.2 grams. For smaller sized carat rubies that weigh much less compared to a carat, it is shared as factors (pt). Points are 1/100 of a carat. Carat weight of a diamond is important because of the reality that larger rubies are rarer than smaller sized ones, so essentially the larger the ruby the extra costly it is. There is no basic grading system or representation that can reveal different carat weight. This is due to the fact that there are so many variations of diamonds fit and also cut, makings stones of similar weight, look various.
Considering that rubies are the most important and also rarest of all the gems, efforts have been made to duplicate and even enhance diamonds making use of more economical alternatives. A great deal of times, sincere mistakes have been made as well as these choices or other gemstones such as spinel were often confused with actual rubies. In many cases, some dishonest individuals attempt to market these choices to misfortunate purchasers in order to earnings. Listed below we will discuss concerning these options as well as means to determine them.
Synthetic rubies are diamonds that are grown made in a laboratory. The first well-known instances of ruby synthesis were claimed to be recorded in between 1879 - 1928, yet this was never confirmed. It wasn't up until the 1940's where study started in the USA, Sweden, Soviet Union began looking into. Synthetic rubies are or else recognized as High Pressure High Temperature Level (HPHT) diamonds or Chemical Vapor Down Payment (CVD) diamonds. The name of both these synthetic rubies originates from the procedures used to create them. Several of these artificial rubies can either have greater, minimal or comparable qualities than that of a diamond. As a result, these artificial rubies are utilized for abrasives, cutting as well as polishing devices, and also changes in power plant.
Simulants are non-diamond materials that are used to duplicate the appearance as well as also the form of a ruby. The most basic as well as well understood simulant is cubic zirconia (CZ). CZ at ordinary view could shimmer even more compared to a ruby and it is less thick, meaning that a 1 carat CZ will certainly be a lot bigger than a 1 carat weight ruby. Nowadays, a much more preferred simulant is moissanite, which has all the very same qualities of a diamond. These qualities consist of hardness (Moissanite-9.25 as well as diamond-10 in Mohs range), refractive index(Moissanite -2.65 as well as diamond -2.42) and diffusion (Moissanite -.104 as well as ruby -.044). This makes it hard to differentiate both at simple sight and would certainly frequently require testers to inform the distinction. In the next section we will discuss how you can recognize moissanites and also various other imitations.
An old technique of recognizing rubies is to do a scratch examination. This requires scraping a diamond with an additional diamond which is damaging as well as is seldom made use of nowadays. The most effective as well as most trustworthy way to evaluate for rubies is to make use of testers that use thermal conductivity. These testers include battery powered thermistors mounted with a retracting copper idea. This tester functions by injecting the warmth onto the tested rock then the gadget determines the quantity of warm that it conducts. However thermal conductivity testers functions best to distinguish diamonds and also its other simulants, it will certainly not assist differentiate lab developed or artificial rocks. To be able to determine these, certain optical strategies are required. Laboratories utilize techniques such as spectroscopy, microscopy and luminescence in order to establish a specific stones beginning. The typical individual can utilize loupes and also microscopes to differentiate artificial rocks. All-natural rubies generally have minor imperfections and defects such as additions or some sort of foreign product, which will certainly not be located in synthetics. | 2019-04-19T03:07:25Z | http://udcnyc.com/tag/1-kt-diamond-stud-earrings-online-centreville/ |
In order to become more whole and healed on all levels of our being we need to improve ourselves on all of these levels. Complete healing is not possible by working on just one level. As an example, assume that you are badly overweight. Mustering a lot of willpower you start a diet and are quite successful in losing a sizeable amount of weight. The problem is that after some months it slowly creeps back up again and after a year your weight is again where it started.
Eventually you come across some emotional release workshops and find that these, together with a sensible diet, are more effective to lose weight and keep it off. Nevertheless, you may find it difficult to keep your emotions under control because you still continue to react in undesirable ways. Now you discover that you are influenced by various negative beliefs that make life difficult for you.
You realize that you need an appropriate belief system in order to manage your emotions in an appropriate way. You start looking for a philosophy of life that helps you to become and remain healthy, happy and fit. This is where the spiritual dimension comes in. You will find that the more you adopt spiritual principles in your life, the more life will become an adventure or a pleasure rather than a struggle.
More than any other level, our emotions determine how we feel about ourselves and life in general. Our emotions are not only a result of our social interactions, but also of so-called higher and lower levels of energy and consciousness. On the lower level we have the influences of nutrition, exercise and other lifestyle factors, while from the higher level there is a strong effect from our belief system.
To give an example we may look at the perception of death. If someone believes that after death he is likely to end up in something like hell as described in some religions, he may inwardly panic at the thought of impending death. Even for an atheist the thought of total annihilation may be frightening. On the other hand someone who believes that life after death is more pleasant than that on earth may look forward to the time of death with eager anticipation. The fact of death remains the same for all but our emotional response to it is conditioned by our belief.
Most of us have developed our belief systems haphazardly from our parents, school and social contacts as well as books and mass media. These beliefs are often irrational and detrimental for us.
In order to heal our emotions, as well as all other levels of our being it is essential to adopt a suitable philosophy of life to guide us in this quest. I call this a spiritual philosophy. The various religions appear to have different spiritual philosophies. These differences are most pronounced at the mental level of dogmas and doctrines, while they tend to disappear at the level of the highest ideals of each religion.
In all major religions some followers have aimed for these highest ideals. They are the mystics who left us in their writings a spiritual philosophy that transcends and unites all religions.
The concept of spirituality obviously means different things to different people. In this book it means deliberately manifesting or aspiring to manifest a higher and purer consciousness. We do this by consciously developing the attributes of true spirituality such as compassion, discernment, faith, high ideals, harmony, joy, inner knowledge, intuition, kindness, openness, patience, self-responsibility, serenity, tolerance, wisdom and a gentle love for All That Is.
Being spiritual is not the same as being religious, which involves following the creed of a proclaimed religion. Someone may be spiritual without being religious and vice versa. Those who are religious become spiritual by following the highest ideals of their religion, while those without a religion follow their own highest ideals and their higher guidance. On the higher levels of consciousness true religion and spirituality merge.
In Christian terms, for instance, we are advised to 'seek first the kingdom of heaven' and all else will be given onto us. In spiritual terms this means to seek first and follow our higher guidance to manifest the signs of true spirituality. Then we can expect health and happiness to result as a natural by-product.
Spiritual development should not be confused with psychic development. Psychic abilities are no measure of spirituality. However, psychic abilities will develop on their own and in a natural way during spiritual awakening according to the need for their use. While neither good nor bad in themselves, psychic abilities without spirituality are like nuclear power without morality; both can lead to disaster.
Neither is spiritual development a quest for altered states of consciousness, though these may occur as natural by-products of deep relaxation and meditation. They can be useful and may provide us with insights as well as beautiful and uplifting inner experiences. However, our main task is at the level of our normal consciousness, and such inner experiences at elevated levels need to be transformed into improved daily living habits.
We become more spiritual by living according to our highest ideals, and by consciously improving our attitudes and feelings. Every moment in our day-to-day interactions provides an opportunity to become more spiritual. We are aided in this endeavor by asking for help from the highest guiding part of our consciousness, which we may call the Higher Self or in Christian terms the Holy Spirit.
In the following I like to show an outline of the theoretical basis of our spirituality as I see it. Starting at the most fundamental level, I regard consciousness as the basic ingredient of everything in existence. We may compare consciousness to air, which may be compressed to varying degrees of density in containers of different shapes and sizes. In a similar way, consciousness becomes compressed and may then aggregate to form more complex structures.
Different densities accumulate at separate levels to form an additional dimension based on density of consciousness. I call this the dimension of space-density. A certain density produces atomic and subatomic particles, while lesser and lesser degrees of density manifest as etheric energy, bio-energy or prana, as feelings and emotional energy, as mental energy and thought forms and finally as spiritual awareness. All of these represent different space-densities that may interpenetrate each other to occupy the same three-dimensional space.
Therefore, there is no fundamental difference between the consciousness of an atom and that of a human it is only a difference in complexity and range of densities. With this, the universe is basically a structure of consciousness acting on itself. Less dense fields of consciousness build, change, discard and rebuild forms from denser fields of consciousness in order to experience and express themselves. The main activity of consciousness is creativity; its highest manifestation on our planet is unconditional love.
We may assume two streams of consciousness. The 'stream of creation' leads towards greater density and less complexity to form atomic particles and the physical universe, while the 'stream of evolution' flows from dense towards less dense structures with greater complexity towards the spiritual universe.
As part of the stream of evolution, consciousness uses the various life forms like water is using a riverbed to flow to the ocean. A life form, be it a species or an individual form is useful only as long as it allows the consciousness to flow through freely and expand. If rigidity develops and consciousness becomes stagnant, then the form has reached old age and will soon disintegrate.
Physics cannot adequately and logically answer the question how all the energy and mass of our universe could have been concentrated in a single point at the start of the 'Big Bang' and what was before. A spiritual theory of creation would say that originally there was no energy at the physical level, that it emerged instead from the etheric level, not so much as an explosion but rather like the crystallization of a super-saturated liquid starting from a seed point. Likewise, it answers also the question of the origin of consciousness that biology cannot answer.
According to this model, our physical universe is a condensation of a less dense etheric universe. Atomic particles are the centers of etheric vortexes, comparable to atmospheric high and low pressure areas. For a more detailed explanation see: The Science of Spirituality.
I see the evolution of consciousness on our planet as a multi-dimensional cooperative venture. Consciousness in the form of the growth force is most active in the plant kingdom and works to transform the mineral kingdom.
In the animal kingdom consciousness becomes dominant at the level of feelings and emotions, it is at this level where most of the experimentation and creativity is present. The emotional level channels the growth force into more individualized forms than those in the plant kingdom. A price for this individualization is a more solidified growth force with less regenerative capacity.
Insects are close to plants with only rudimentary feelings, while primates and possibly dolphins are closest to the humans with highly evolved complex feelings. Similar to the evolution in the plant kingdom, which leads to the beginning of feelings in the highest plant species, so the higher animal species acquire a rudimentary capacity for thinking.
By having their emotional energies guided with the help of the emerging mental level, the animal kingdom culminates with the primates channeling their life-force into a nearly perfect form for our planetary conditions. With this, the planetary evolution of the growth force has been further completed and humanity works now on the perfection of the emotional level with the help of the mental level. We use beliefs to experiment with our emotions.
The animal kingdom required a rudimentary mental level in order for the growth force to be channeled into a perfect form by the emotional level. In a similar way, we humans need a level of consciousness beyond the mental level to perfect our emotions. We call this next higher level 'spiritual consciousness'. It evolves through the programming of our higher mentality by the incarnated soul. We may regard our different and evolving group belief systems as the human equivalent of different animal species.
The concept of God can be defined in two ways. We may equate God with consciousness and say God is everything. The consciousness manifested in the various universes, the physical, etheric and so forth up to the spiritual universe are the energy bodies of God, while the non-manifested part might be called the mind of God.
Alternatively, we may only regard the non-manifested universal consciousness as God and this may or may not be focused into what we may regard as a personified being at certain levels of consciousness. For the evolution of our own consciousness the details of what we believe is God do not matter very much at this stage. As part of a spiritual philosophy we may simply assume that the more consciousness becomes condensed, the less it is aware, especially of being a part of God or All That Is.
I see the Oversoul as the creator of our soul and as our personal God or God Self, our individualized representative of the universal aspect of God. Any communication from this more or less divine level can reach our normal human consciousness only by penetrating our mental and emotional levels. These, however, act as filters that will distort and interpret any messages according to our beliefs and emotions.
Therefore, a devout Catholic will receive messages clothed in Catholic symbols, while a Hindu will experience divine revelations according to his religious beliefs. The less strong and structured our beliefs are the less will any higher communication be distorted. The more we expand our consciousness, the closer we are to this higher guidance and the easier it will be to communicate. Disbelief, on the other hand, will block any communication.
A spiritual philosophy is our basic belief system about the nature of our existence, about its purpose and goal. From this we try to understand our role in society as well as our relationship with any higher or guiding forces, and it gives us the inner strength to follow the spiritual path. Everyone has a philosophy of life, even if they are not consciously aware of it. For some this is just the notion to get as much pleasure as possible out of life while trying to avoid suffering. Others, like various Christian saints and yogi, have deliberately self-inflicted suffering and denied themselves pleasures as part of their philosophy and as a path to their God.
To have a spiritual philosophy means to see ourselves as part of a higher purpose, of a universal blueprint, and we consciously try to cooperate with its unfolding and manifestation. A good spiritual philosophy needs to give us guidance and support on the spiritual path and in our daily interactions and relationships.
In the same way that we can deliberately choose to believe in and follow a certain religion or political party, we can also deliberately adopt a spiritual philosophy that exactly suits our purpose. Normally, this adopted philosophy can be in harmony with our present religion or political views. Just look for the highest ideals and replace any negative aspects with positive beliefs.
The center point of any philosophy of life is the question of meaning or purpose. If we see no specific purpose in life and especially in our own life, then it is quite natural to live for the sake of sense and ego gratification, but we also may easily become depressed by the apparent lack of deeper meaning of it all. In a spiritual philosophy we believe in a higher purpose. We may not know the exact nature of this purpose and it may not even matter. We may say we just want to manifest our own blueprint, or fulfill the purpose for which we incarnated, or just trying to do God's will, or becoming one with God. It may all be the same anyway.
By now you may be rather apprehensive. Basically all you want is to be healthy, have a good life, some fun and generally feel fulfilled and satisfied. You do not want to become a mystic or a saint to achieve this. Luckily, you do not need to. I just painted the big picture to show in which direction we generally have to move. How fast you want to move is entirely up to you.
The important part is to move in the right direction, however slowly. Suffering comes from moving in the wrong direction, no matter how far advanced we are spiritually. The saint will suffer if he moves in the wrong direction, and the sinner will feel good if he moves in the right direction. That is what it is all about, the right direction.
Indeed, this is a middle path between pleasure-seeking and intentional or unintentional self-inflicted suffering. In this it is like the path of the Buddha. For a long time, the Buddha tried to reach enlightenment through extreme asceticism. He fasted until where he had been sitting he left a mark like the footprint of a camel. Finally, he realized that he was on the wrong path, that he needed his body as a partner and, therefore, had to fulfill its legitimate biological needs, he had to be firm but kind to it. He called this the middle path, and many seekers after him found it to be the right path for them.
In the same way, our spiritual philosophy should help us to feel good in body as well as in mind and spirit. Suffering is only for the ego. If instead we identify more and more with the spirit or our higher self, then life will be correspondingly easier and more fun - at least that is what we start out believing and wonder whether it will turn out to be true.
Our basic premise is that we attract or become what we believe in. Assuming that the universe contains all possibilities, all shades of good and bad, right and wrong, desirable and undesirable, it is so much more attractive to believe in a benevolent universe than in a vindictive one, in a God of love rather than a God to fear. This spiritual philosophy of the middle path says that we can choose and have what we want, we just must firmly believe in what we want and act accordingly.
However, there is a catch. We must be careful what we choose and from which level of our consciousness we choose. If we let our ego choose, we generally choose wrong. This means we choose something selfish for which we have to pay later. If the ego chooses pleasure now, we will suffer later to pay for it.
If, on the other hand, we let ourselves be guided by our highest ideals and the inner voice of our higher guidance, then we will choose a path that leads us to gradually increasing and lasting happiness, without having to pay for it with later suffering.
The simplest and safest choice is that we want to fulfill the purpose for which we incarnated and just want to do the will of God. Of course, we do not really know our purpose or the will of God; at least not consciously with our mind. The good thing is that we do not need to know, we just can let ourselves be guided step by step, one step at a time, by listening to our spiritual guidance or by following our highest ideals. This is called 'living by faith' or 'going with the flow'.
Gradually, this living by faith will allow an inner seed of the divine to awaken and grow within us. Like a hologram, this seed is a miniature reflection of God and the universe. Fully developed, this seed will become the risen Christ. We will then live in the Christ and the Christ within us. This is the promise of those who know.
Expressed somewhat differently, we may say that we, as a living soul, now have become the perfect vehicle for our High Self or Christ Self. The Christ Self can then begin to manifest the will of the God Self, the 'Father'. Like Jesus, who became the Christ, we can then say: "I and the Father are one."
We may actually see the life of Jesus as a symbolic enactment of the inner journey that we are all sooner or later called to perform. The crucifixion symbolizes the death of our ego, and the resurrection, the birth and ascendancy of the inner Christ. By becoming the Christ we have finally redeemed our original sin - our separation from God.
I also have a different interpretation to religious doctrines that regard the human aspect of Jesus as the Son of God. Instead I regard the Christ who arose in Jesus as 'the only Son of God'. I understand that Jesus generally referred to himself as 'the Son of Man' rather than 'the Son of God'.
We awaken and nourish the Christ within by building a spiritual body composed of a higher emotional body and a higher mental body. This we do in a similar way to building a biological body from the food we eat, by building an emotional body from our feelings and emotions or a mental body by constructing belief systems with thoughts and ideas.
The nutrients we need for our spiritual body are spiritual feelings and spiritual thinking. With spiritual feelings, such as devotion, unselfish love, compassion, inner peace and divine bliss we build a higher emotional body. This combines with a higher mental body that we build through spiritual thinking with high ideals, pure motives, a spiritual philosophy, discernment and spiritual knowledge. This spiritual body or light body allows our High Self or Christ Self to fuse more and more with the soul so that the soul eventually becomes an expression of the Christ. This is the same principle that previously caused the personality to become an expression of the soul.
Stated in a different way, we may also regard the Christ Self as the Inner Master. With this fusion of soul and Christ Self, the personality of the soul can now be expressed as a spiritual master. However, this expression is still limited by being channeled through a biological brain. After discarding the biological body, the Christ consciousness is then able to express itself much more freely as an Ascended Master.
If we look much further into the future, then we may assume that the Christ Self will eventually merge with the God Self. With this, the 'I AM' that originally started out building itself a personality to become a living soul and eventually an Ascended Master, will now have returned to its source and become a God.
In this process we see the two opposing forces that keep the Wheel of Life turning. One is the individualizing tendency of the I AM, its ego, which prompts it to build a body and acquire its separate identity, while the other is the unifying tendency or the Christ principle, which compels it to return to its source.
You may sometimes wonder how all the different spiritual and religious beliefs, often contradicting each other, can possibly lead to the same goal. Surely, only one can be true. But then consider the following parable.
Imagine that different points of the compass represent different beliefs. There is a high mountain with a brightly shining light on top, marking the goal for countless climbers on all sides of the mountain. Those who are on opposite sides of the mountain actually walk and climb in opposite directions of the compass needle and yet they all progress towards the same light.
Below the climbers there are an even greater number of seekers who do not see the light itself, but believe in its existence because of what some of the temporarily returned climbers have told them. Groups of seekers follow some of the more experienced climbers back up the mountain. These are those who seriously follow a particular religion or spiritual leader.
Finally, the great majority of people live in the jungle surrounding the mountain without even seeing the mountain itself. Those living close to it know of it but generally do not move much closer to it. These are the uncommitted followers of various religious beliefs. Those far away from the mountain do not even know of it or believe in its existence.
The active climbers who actually see the light are those well advanced on the spiritual path. They all start from different positions. They may be on different levels and proceed in different directions but they all move closer to the light.
Expressed in Christian terms we may say God, as the Father or Parent aspect of Divinity, created powerful spiritual beings, the 'Children of God', as co-creators on the denser levels of consciousness. In Christian terminology they are the 'Son' aspect of Divinity. Collectively they created our own world. Some of these Children of God, also called Monads or Oversouls, projected parts of their consciousness into denser forms, to create Soul Families. Because of the great difference in the levels of consciousness between an Oversoul and its Souls, the High Self or Christ Self was created as a mediator between both. The Souls eventually created even denser forms at the etheric level, which gradually became the human races. They did this in order to experience more closely the interactions of the various forms of life on earth.
However, Souls gradually became entangled in the lower consciousness of their dense forms. In mystical understanding this is the 'original sin', the 'fallen angel', the 'lost paradise'. In order to free itself from this entanglement of part of its consciousness, the Soul, guided by the High Self and the Oversoul, sends out successive projections with improved programming in a chain of 'reincarnations'.
With each projection a new and different personality is programmed, taking the experiences of the preceding personalities into account. Therefore, from the point of view of a personality, we cannot really say that we are reincarnations with former lives. This would be as if a picture, painted by an artist, assumes that it has previously been another picture, painted by the same artist. Instead, each picture is a unique new creation.
With this, reincarnation as a general principle applies to the Soul but not to the personality. There are, however, exceptions. The American psychiatrist Ian Stevenson investigated and published a series of cases that show conclusively a reincarnation of the same personality with memories, birthmarks and injury marks directly from a preceding life.
However, these cases involved violent death at the prime of life before the programmed life task was accomplished and immediate rebirth in a baby born at the time of death. According to Tibetan tradition the Dalai Lama and some other important lamas reincarnate in the same exceptional way.
After the separation from the physical body that we call death, the personality remains individualized for a further period, clothed in its astral or mental and emotional bodies. Finally it is reabsorbed or reintegrated into the consciousness of its Soul as part of our overall life-stream, and the Soul forms another projection.
Hypnotic regressions seem to indicate that the incarnating Soul projection becomes only gradually attached to the fetus. While it may be close to the mother already before conception and guide the earliest development of the fetus, commonly it starts entering it only during the second half of pregnancy. Even after birth it still continues to fuse more closely with the baby.
The entanglement that keeps this process going and from which the Soul tries to free itself, is called 'karma'. This means a personality or its followers reap the consequences of its actions, and even of thoughts and feelings. We reap what we as well as those before us have sown. The deliberate attempt of a personality to free its Soul from karma or entanglement of consciousness is called 'the spiritual path'.
The ideal of vegetarianism especially in its relationship to spirituality originated in India. Presently, this idea appeals to many sensitive individuals in Western society, who do not want to contribute to cruelty against animals. Others become vegetarians because of the advice of their spiritual teachers or because of what is written in books on this subject.
However, our metabolism and food requirements have evolved according to our genetic background. Those who originate from cold climates or have blood group O, or have inherited or acquired a weak sugar metabolism, have non-vegetarian requirements for optimal health. Often this involves quiet, sensitive individuals with low blood pressure and a lack of energy. These may experience a conflict between their body needs and their ideals. With the following explanations I want to show that this conflict is not necessary.
Indians have predominantly vegetarian body requirements. They must pacify mind and emotions with plant food and may have great difficulties progressing spiritually on a non-vegetarian diet. Most Christian mystics and saints, on the other hand, were not vegetarians and neither was Jesus according to the Bible. As stated in some scriptures, even the Buddha did not insist on a meatless diet, only to abstain from the meat of carnivorous animals. Due to their cold climate, Tibetan Buddhist monks were often non-vegetarians. All of this may indicate that vegetarianism is not a prerequisite for spirituality.
However, there is a relationship between vegetarianism and spirituality. Meat makes body and feelings less sensitive, and meat-eaters with a slow metabolism become more insensitive to higher energies and spiritual influences. Fruit, on the other hand, has a beneficial cleansing and sensitizing influence on these people. Nevertheless, those who are already too sensitive may become ungrounded and open to unfavorable psychic influences on a fruitarian diet and even lose touch with physical reality. Some flesh food will help these individuals to 'come back down to earth'.
For those who aim mainly at dwelling in altered states of consciousness, preferably under competent guidance, a fruit-rich vegetarian diet will be of great assistance in loosening the ties between the physical body and its higher vehicles. It may also make it easier to receive messages from the higher self in the form of visions or voices.
However, on the spiritual path greater psychic sensitivity is desirable only in the context of a balanced development on all levels. Our main aim is to become more spiritual in our daily interactions and in our normal state of consciousness. The exploration of altered states of consciousness is only secondary.
A vegetarian diet is pacifying and, therefore, conducive to meditation and contemplation, but it may leave some of us unable to work efficiently in this world. Therefore, we must strike a balance in our diet selection between our goals and our body condition. Generally speaking, the diet best suited for our spiritual development is one that leads us towards optimal health.
We do not become more spiritual, that means more loving, understanding and wiser simply by being vegetarians, although compassion with the plight of farm animals is a step in the right direction. However, our body requirements will gradually change on the spiritual path as the body is transformed and we learn to utilize higher forms of energy.
In this way, even those of the non-vegetarian body type will eventually be able to maintain good health on a more or less vegetarian diet. The proper path in this direction, however, is a diet that is in harmony with present body requirements.
Gopi KRISHNA in his book 'Kundalini' gave a vivid account of his long-time suffering, because his body was not strong enough for the tremendous energy streams raging through his system. He finally realized that he could only save his body and become well again by starting temporarily to eat some meat.
Rolling Thunder, a Red-Indian spiritual leader is a meat-eater and so was Edgar CAYCE who said in essence: "Spiritualize these influences rather than abstain from meat (for this particular body of the questioner). Not what goes into the mouth but what comes out of it may defile the spiritual body."
While cruelty to animals is often cited as a reason in favor of vegetarianism, those who consume milk or eggs contribute to cruelty if they use eggs from battery hens or milk from cows or goats that have been prematurely separated from their offspring.
Now I want to consider the animals' side of the problem. That the animal eventually will be killed obviously does not trouble it during its lifetime. If it were not for human consumption, most farm animals would not have a chance to live in the first place. If these animals had a free choice, most of them would probably prefer to live and eventually being killed rather than not to live at all. Actually, I am sure even many humans would prefer a quick death like that of a humanely slaughtered farm animal as compared to the slow disintegration that may await them with some of our degenerative diseases.
However, what is decidedly wrong with our present system is that animals are commonly raised under unnatural and degrading conditions and may meet their death in fear and even terror. This is not necessary and only due to commercial interests and the general indifference to the plight of farm animals. But this often applies also to the production of milk and eggs that many vegetarians use.
Therefore, if animals are reared with loving care and in a natural way as it befits their species, and then killed in a humane way, there does not need to be any suffering for the animal. As Rolling Thunder explained it in essence: "When I am going to shoot a deer, I know beforehand where I will find it and also the animal knows that I am coming. But it is not afraid, it is waiting for me and it does not suffer when I shoot it."
With this, the animal actually sacrifices itself for a 'higher need'. We may regard the killing of animals for human consumption as a sacrifice by the animal world, as also we humans may sacrifice ourselves for some higher purpose, or as the vegetable kingdom sacrifices part of itself for consumption by animals and humans. Each kingdom evolves through this close contact with the next higher one and by nourishing it.
Furthermore, killing does not only pertain to animals. Also plants are living beings, responding to love and hate. Therefore, the difference between killing a cabbage, a fish or fowl, is only one of degree in the evolutionary chain.
Of course, most people would be happier to kill a cabbage than an animal (with the exception of insects and rodents). But I suggest that those who cannot function very well as vegetarians should accept this sacrifice gracefully and without guilt and in return work for a better deal for our animals. Nevertheless, it may be in the best interest of spiritually minded individuals to minimize the use of meat, especially from mammals, in preference to seafood. As our race becomes more spiritual in the future and bodies change, vegetarianism will become universal.
Living spiritually is our day-to-day, minute-to minute effort to live according to our spiritual beliefs. Our body with all of its problems is an important partner in this quest. It shows us where to start and what to do, helping us to become ever more conscious of all aspects of ourselves.
Healing our body, mind and emotions is in itself part of our spiritual evolution. Even if you do not otherwise intend to live spiritually, you do so anyway by healing yourself on these levels. There are many different definitions of what it means to live spiritually or following the spiritual path, as you may have already noticed. One of them sees it as our effort to develop our full potential of health and happiness, starting with the body and the problems that we have right now.
I am convinced that by living in total harmony with the biological, emotional, mental and spiritual laws that govern us, we would be close to perfect; we would personify the risen Christ. Therefore, all imperfections, usually manifesting as problems, show us what to do to become more spiritual and, with this, more happy and fulfilled.
Starting at the biological level, we may have a health problem, possibly a specific disease. This disease has one or more causes, usually on several levels. Just trying to ease symptoms with palliative care is not a spiritual solution, although we can use the disease to practice cheerfulness in adversity.
With our spiritual quest we try to discover and overcome the causes for the disease. We experiment with nutrition, cleansing and other natural healing methods, we improve energy flows by softening armored muscle structures, release suppressed negative emotions, and we may use regression and reprogramming, guided imagery and meditation. Chances are that the disease will more or less disappear and at the same time we have substantially progressed on the spiritual path.
The same is true for any of our other imperfections and problems, be it a rigid and aging body, lack of meaning in our life, unsatisfactory relationships, worry and resentments. Just keep part of your mind in observer mode and be aware of whatever you are doing. If you catch yourself worrying about something, that is your problem to work on, worry is a negative attitude and you need to change your approach. Do what you can to get the problem fixed and then leave it to faith, use prayer and meditation to strengthen your faith.
If you catch yourself having an unkind thought about someone, immediately make an effort to send a kind thought to that person. If you believe someone has harmed you, realize that this person is just a weak human and needs your help. Be angry if you feel that way but let it out in a suitable manner, and when you have calmed down, perform a deliberate mental exercise to forgive and send love. That is the spiritual way; you can do it all the time.
Learn to laugh about yourself when you make a silly mistake or break something. You would laugh if it happened to someone else, try it for yourself, it makes life much easier. Taking ourselves too seriously shows that we are dominated by our ego.
It is said that no one is an island; we all are in it together. We interact all the time, and helping our brothers and sisters is the most important part of interacting. We cannot help by preaching or trying to convince somebody. The most effective way is to be a living example of your spiritual beliefs. Try to live as an example. Be forgiving, be kind, try to do the right thing at the right time but if you mess up, do not worry, you are not expected to be perfect, try again.
As your consciousness expands, you may realize that your job or your partner is no longer in harmony with your beliefs. Visualize and pray for a suitable solution and keep your eyes open. You do not need to go out of your way to look for opportunities to help others. Just be aware and do your best whenever you come across something, your guidance will arrange the opportunities for you to learn and help. Do not blame yourself or anyone else if something goes wrong, making mistakes is the best way to learn. We need to make mistakes, learn from them, that is the spiritual path.
Specific ways of life have been devised through the ages to facilitate the growth of a spiritual body. Foremost in this are prayer and meditation, especially as part of monastic life. In a related form we have the yoga of devotion or bakthi yoga and the yoga of action or karma yoga in which we dedicate our life to unselfish social work or healing. Also rituals, such as performed by the Orthodox or Catholic Church and by secret societies and New Age groups, can provide spiritual food. When we deliberately set out to awaken and build a body for the inner Christ, we are said to be on the spiritual path.
If you have different ideas about spirituality, the meaning and purpose of life and the nature of God, just follow your own beliefs. In order to heal yourself with the methods on this website it is not necessary to accept my particular philosophy. I only offer it as a possibility for those who are still searching.
Disclaimer: The aim of this web site is to provide information on using natural healing methods to aid in the treatment of illness and health improvement.
or if you are unsure about a particular course of action, seek the help of a competent health professional. | 2019-04-21T01:16:42Z | http://healing-yourself.com/Spirituality/The-Spiritual-Dimension.html |
Well again, this morning, we have the opportunity to open our Bibles to the gospel of Luke. We are taking our time as we begin this gospel because there are so many foundational things. There are so many nuances, so many wonderfully rich things that Luke is doing in this opening as he begins this great history of redemption, that I want to take the time to make sure that we understand those. Since every word of God is pure by the testimony of Scripture and since all Scripture is given to be profitable for us, we want to take our time to really understand the very gripping nature of Luke's beginning of this tremendous gospel.
So we're looking at Luke chapter 1. We finished the first four verses which is the prologue in which we met Luke the physician and Luke the historian and Luke the theologian and then Luke the pastor. We got a little bit acquainted with the man. And starting in verse 5, this morning, the story begins. As we introduce this message let me just say a few things that will provide for us a context.
In this chapter in verse 78, toward the end of the chapter, the comment is made that "The sunrise from on high shall visit us.” The sunrise from on high shall visit us. That is a reference to the Jewish Messiah. So borrowing those words, “the sunrise from on High,” which refer to the birth of Christ, we could conclude then that the account of chapter 1 covers the final hours of darkness before that sunrise arrives, before Messiah comes. And the night, frankly, for Israel had been long and dark, not only for Israel but for the world, waiting for the Savior. Through all of Israel's history, a history of calling that began with Abraham, a history of exile 400 years in Egypt, of wanderings forty years in the wilderness, of the conquest of the land of Canaan, of the occupation of the land of Canaan, of captivity, the northern kingdom taken captive in 722 B.C., the southern kingdom taken into Babylon in 586 B.C., the northern kingdom never returning, the southern kingdom returning seventy years later. Israel's long history of coming back out of captivity and trying to rebuild, and then only to be oppressed as Greeks invaded and controlled the land, and then Romans came and further oppressed them; the long night of Israel's history of blessing and cursing mixed, the long night of Israel's history of faithfulness and apostasy. And what sustained those who really looked toward God through all those long, long years of darkness was the hope that the sunrise would break.
The last book of the Old Testament...the last Old Testament prophet was named Malachi. And Malachi promised in the last chapter of the last Old Testament book that the sun, s-u-n, of righteousness would arise with healing in its beams. And he was really saying exactly what was said in verse 78, "Sunrise is coming.” Sunrise is coming. The darkness is not permanent, but it's usually true that the darkness is the deepest just before the dawn. And for the 400 years since Malachi said that, since the last prophet said, “The sun of righteousness will rise,” for 400 years since that God never spoke. There was no prophet in Israel. There was no prophet in Judah. There was no revelation from God. Therefore it was the darkest time of all.
For 400 years heaven was silent. Prayers went up but it seemed as though they hit brass and bounced back. And Israel sunk deeper and deeper into depression, oppressed by the Greeks whose ruler Antiochus Epiphanes actually had the unmitigated gall to step into the sacred Holy of Holies, the holy place of the temple, and desecrate those places, even sacrificing a pig on the altar; a time when the Gentile Greeks came in and brought their pagan gods and their pagan theology and mingled it in that sacred land with the people of Israel. They were followed by the Romans, also with all their idolatries. This made the depression all the greater. And as much as the Jewish people cried out to God, God didn't speak and no prophet appeared.
Where was the sun of righteousness? No one dreamed it would be 400 years from the prophecy to its fulfillment. Where was the day of which Malachi also said, "You will tread down the wicked and they'll be like ashes under the souls of your feet on the day which I'm preparing, says the Lord of hosts." Where was the day when righteousness triumphed over evil? The prophet said it will come. The light will break. The dawn will come. The sun will rise. He was referring, of course, to the Messiah, the Christ, the Savior of Israel and the world. And Malachi, that last prophet, also said that that Savior, that Deliverer, that sun of righteousness that will rise, that One who will bring righteousness to prevail over evil will in fact be the Lord Himself because Malachi wrote in chapter 3 of his prophecy in verse 1, "And the Lord whom you seek shall suddenly come to His temple and the messenger of the covenant in whom you delight, behold He is coming, says the Lord of hosts." So the Lord of hosts says the Lord is coming. We know then that the One who comes, the Messiah, will in fact be God Himself.
So that's how the Old Testament ends. It ends with the promise of light, the promise of the sun of righteousness, the sunrise on high, the light of the world, Messiah, the Lord Savior will come and shatter the deepening darkness. But as I said, 400 years have gone by since Malachi's words were uttered in about 430 B.C. No prophet appeared, no word from God at all, and no light.
Israel not only sunk deeper into depression because of oppressing nations occupying her land, but sank deeper into sin and apostasy until by the time the gospel of Luke begins, Judaism as we know it existing in the land of Israel was apostate. It had abandoned the true message of the Old Testament for a false one, engaging itself in works-righteousness, self-righteousness, all those things which God hates. Israel had suffered then from sin and apostasy as well as the oppression of foreign nations desecrating its holy ground.
Where was the light? Where was the sun? Where was the dawn of redemption? Where was the hope of every Jewish heart?
It's important to realize there is a critical element of the predictions that Malachi made that can't be overlooked. Yes he said the sun of righteousness is coming, but he also said this, before He comes, before the sun rises, before the Messiah, Lord Savior comes there will come a prophet to announce His arrival, a herald, an announcer. He's often called a forerunner. Malachi said this, "Behold, I'm going to send My messenger and he will clear the way for Me." There's... There’s coming a messenger to announce the arrival of the sun of righteousness, to announce the dawn.
In fact, Isaiah spoke of him. Isaiah said he will be a voice in the wilderness, crying out to clear the way for the Lord, make smooth a highway for my God. Both Isaiah and Malachi then said that before the sun arises, before the Messiah comes will come a prophet pointing toward Him. When the Messiah's forerunner arrives, when that prophet comes, the silence of heaven will be broken with the voice of God and the darkness of earth will be shattered with the light of the Savior and Redeemer.
Now the world will know when the Messiah arrives. How will they know? Because he will be preceded by His forerunner. Before the sun of righteousness, before the sun rising from on high will come this prophet, this forerunner, and he will announce the arrival of the Messiah.
The silence then will be broken when the forerunner arrives. And then will come the Messiah and the saga of salvation. Because Luke is such a careful historian and because he is so comprehensive in what he wants to cover, he therefore has to begin his story with the arrival of that forerunner. And that's precisely what he does.
Look at verse 5. "In the days of Herod, king of Judea, there was a certain priest named Zacharias, of the division of Abijah. And he had a wife from the daughters of Aaron and her name was Elizabeth. And they were both righteous in the sight of God, walking blamelessly in all the commandments and requirements of the Lord. And they had no child because Elizabeth was barren and they were both advanced in years. Now it came about while he was performing his priestly service before God in the appointed order of his division, according to the custom of the priestly office, he was chosen by lot to enter the temple of the Lord and burn incense. And the whole multitude of the people were in prayer outside at the hour of the incense offering. An angel of the Lord appeared to him, standing to the right of the altar of incense." And with that the silence of God was broken.
"Zacharias was troubled when he saw him and fear gripped him. But the angel said to him, ‘Do not be afraid, Zacharias, for your petition has been heard and your wife Elizabeth will bear you a son and you will give him the name John.’" And we'll stop at that point.
This is where the story begins. It begins with the birth of John, John who would be the forerunner to the Messiah. At this point, before we can go further in the story, I have to cover some things that are very critical and fascinating. It is essential to begin the saga of salvation with the story of John the Baptist for several reasons. Let me give them to you and make note of them.
Reason number one, it connects the Old Testament with the New Testament. That is critical. Mark it. The Old Testament and the New Testament do not propose two different religions. There is not the religion of Judaism and the religion of Christianity. Rather, the Old and the New Testament are one revelation from God with continuity telling the story of redemption, of only one religion, one faith and that is faith in the true and living God which involves His Son, the Lord Jesus Christ. It is one complete revelation from God. And either the Old or the New is incomplete without the other.
Secondly, Luke begins the story of salvation with John the Baptist because that links John the Baptist as the fulfillment of Old Testament prophecies and that shows the accuracy of Scripture's prophecies, the accuracy of Scripture's predictions. Therefore we understand that the Old Testament, which is Scripture, makes predictions which the New Testament fulfills. Therefore the New Testament is the Scripture as well.
Beginning the story with John the Baptist also is important because John the Baptist's birth was the first point at which God spoke. It is the initial appearance of angels. You saw that in verse 11. "An angel of the Lord appeared." And with that the silence was broken, with that the 400 years with no word from God ended, with that the saga of salvation began.
And so, Luke wants to take us right back to the first place where God acted decisively, supernaturally and immediately in history and he has to go back to John. Not only is that the first place where angels appear and they will continue to appear through the two birth narratives, the birth of John and the birth of Jesus. As we know, the angels play a very important role in the annunciation to Mary as well as in the time of Christ's birth. This is the first of those angelic appearances.
It is also true that the birth of John was a miracle. His birth was miraculous, and so was that of Jesus Christ. And so by telling us the full story of the birth of John, the miracle of his birth, and the involvement of angels with a message from God, Luke is careful to begin the story where the story really begins, where God first initiates supernatural activity.
Furthermore, and this is critical, the story of John the Baptist establishes that he is the prophesied forerunner of Messiah. I'll say that again. The story of John the Baptist, as you will see, establishes beyond argument that he is the forerunner of Messiah. If we know that to be true, then we can therefore know who the Messiah is; it is whoever John identifies, right? Very important to know that. And there was a day, as we shall see, when Jesus came down to the Jordan River where John was baptizing and John turned toward Him and said, "Behold, the Lamb of God who takes away the sin of the world." John pointed to Jesus Christ as the Messiah of which he was the forerunner, very important. If you establish who the forerunner is and it's John the Baptist, then you know who the Messiah is; it's whoever he points to.
Now this is a major concern of Luke's, to link John the Baptist and Jesus. And, in fact, the stories of the angelic annunciation of John's birth, the miracle of his birth, the story of the annunciation of Jesus' birth, the miracle of Jesus' birth are woven together in chapters 1 and 2 of Luke's gospel. They're woven together because they're inseparable. You...you...you have the inseparable, convincing argument that Jesus is the Messiah because of His connection to the one who clearly is the forerunner who came to identify the Messiah.
Now there are all kinds of nuances in the way these are laid out in Luke's literary style which I'm not going to get into. We'll leave that for some other time. But, there are so many incredibly and marvelous insights expressive of the inspired brilliance of Luke as a historian that I can't resist taking you into some of them.
Luke doesn't begin his story like fiction. He doesn't say, "Once upon a time." Rather, he gives us history. So he begins in verse 5, "In the days of Herod, king of Judea." Now the argument among the elders this morning was whether I would get past that and I will get past that, you'll be glad to know. But that's where we have to start because that's the setting, that's the timing. “In the days of Herod, king of Judah,” he's not a fictional character, he's a very real character and history has left us an immense amount of information regarding this man. Luke places us in the accurate moment in history where the story begins to unfold. Herod... He was known as Herod I in terms of the fact that he was the first of a long list of Herods who ruled in one way or another in the land of Palestine. But he commonly called himself Herod the Great, Herod the Great, king of Judea.
Let me give you a little background so you kind of know this man a little bit. Herod the Great was the first of several Herods mentioned in the New Testament. One of the things that a New Testament student must do is sort out all the Herods, and this is where it all begins. This is sort of the patriarch of the Herodian dynasty.
Julius Caesar had appointed Herod's father, a man named Antipater, to be procurator, or to be governor of Judea under the Roman occupation. What the Romans did in the development of the great Roman Empire was they just took over all kinds of nations and when they established their control militarily of those nations they then placed someone in power there who was a representative of the Roman government so they would have control. Antipater was selected to do that in the land of Judea under the Roman occupation. He was the Roman-appointed governor in that land.
Antipater then managed to have his son, Herod, appointed prefect of Galilee. The northern part of Palestine is an area of Galilee and he managed to get his son the position of ruling and representing the Roman government in Galilee. Now in that office Herod was quite successful. He knew where he was going. He was a smart guy. He planned his strategy very well to achieve his goals. One of the problems that the Romans had to deal with in the land of Palestine was terrorism, nothing new under the sun, folks. Terrorism in the Middle East didn't just start in this century. There were all kinds of Jewish terrorists. There were some of them known as the sicarii, because that was the term for “little sword.” They were dagger carriers who went around in the crowds and when they found a Roman soldier or Roman citizen, they would assassinate them. There were terrorist activities going on in Galilee as well. Herod was very successful in bringing those guerilla bands of terrorists to accounting, to imprisonment, and really did away with them. He was very successful in that so he garnered an awful lot of...of goodwill from the Romans toward him.
The Parthians, another group of people, came into that area, actually invaded Palestine rather formidably while Herod was in that northern area, so he fled to Rome. He was in Rome. The Romans liked him because of what he was able to do. The Romans wanted him to go back and they wanted him to fight the Parthians and get them back out of the land of Palestine, so they gave him an army. He was declared by Octavian and Antony, with the concurrence of the Roman Senate, to be king of the Jews. That happened in Rome and they gave him an army and sent him back.
He invaded Palestine the next year and after several years of fighting, drove out the Parthians and established himself as the king of the Jews throughout Palestine. The year was 37 B.C.
Now he had a problem; he was not Jewish. Worse than that, he was an Edomite. And Edom had been cursed by God. He was an Edomite, often called an Idumaean. He worried about that. He was very concerned about his reputation, so he married a Jewish girl by the name of Mariamne. She was not just any Jewish girl; she was an heiress to the Jewish Hasmonaean house, a very, very well-established and noble family. He did it in order to make himself more acceptable to the Jews that he now ruled. He was a clever man. He was a very capable warrior. History tells us he was an immensely gifted orator and he was a diplomat. In times, for example, of severe economic hardship he had a surplus from taxation. He actually took the surplus and gave it back to the people, something that all of us are longing to experience.
There was in 25 B.C. a great famine in the land of Palestine and Herod, being the diplomat that he was, melted down some of the most beautiful objects in his palace to buy food for the poor, and thus in some way endeared himself to the people. He built theaters and he built racetracks and he built other athletic and entertainment structures in the land of Palestine, the ruins of which you can even see today if you go there. He revived Samaria, which had kind of fallen into...into a waste place. He built the most beautiful port city of Caesarea which you can still visit and...and see elements of his buildings there. He named it in honor of his benefactor, Caesar Augustus, which was the title of Octavian.
He embellished the cities of Beirut, and Damascus, and Tyre and Sidon and even the city of Rhodes. And he even contributed to the rebuilding of the great city of Athens, very successful as a leader and a ruler. He built the remarkable and frankly almost impregnable fortress of Masada; Masada down in the desert, down by the Dead Sea, elevated high up on a mountain top, Masada where in A.D. 73 nearly a thousand Jewish defenders committed suicide rather than be captured by the Roman general, Flavius Silva, who had besieged Masada. It was the summer home of Herod, actually.
Those are his achievements, but personally he was cruel and merciless and vicious beyond description. He was incredibly jealous, completely suspicious of everybody and afraid that someone was going to take his position and power. He feared every potential threat and every threat that was just manufactured in his own mind.
For example, he had the high priest, the Jewish high priest Aristobulus, drowned. That was bad enough, but it was his wife's brother, which made it worse. His wife wasn't happy about that. By the way, he attended the funeral of the brother-in-law he had drowned and wept in a pretense of affection, and then, to silence his wife about what had happened, he killed her. And then knowing, that mother-in-laws can be a problem, he killed her mother. Fearing that his sons might tell the truth about him, he killed two of them. Five days before his death, which is about a year after Jesus was born, he had a third son executed. One of the greatest evidences of his blood-thirstiness and his insane cruelty was having the most distinguished citizens of Jerusalem all rounded up and imprisoned just before his death. He knew he was dying. He got all of these nobles and put them all in prison. He knew that no one would mourn his death because everyone knew him as a slaughtering, massacring, serial killer, I guess you could say. He knew no one would mourn his death so he ordered that at the moment of his death all of those nobles who were in prison be instantly executed so at least there would be mourning in Jerusalem when he died, even if it wasn't for him. The press could put a spin on it.
That barbaric act, along with all the others, really pales in the light of the most horrifying thing that he ever did. When he heard that a king had been born in Bethlehem, in order to kill that king he slaughtered all the male Jewish children in Bethlehem and its surroundings from two years old and under in the hope of killing someone who might someday be a threat to his throne. How paranoid he must have been at his age to fear a child under the age of two. That's Herod.
"In the days of Herod, king of Judea, there was a certain priest named Zacharias." Now we go from Herod to Zacharias. From the king to the humblest of men, just a certain priest, not anything but a certain priest, common guy. That name, Zacharias, appears on behalf of thirty different people in Scripture, a very common name. It means "God remembers" in Hebrew. It's a wonderful name, “God remembers.” One of the things the Jews liked to celebrate was the fact that God remembered everything about them and that was a part of His care over them.
So now we meet the first character in the story. Not particularly notable, there were eighteen thousand priests in Palestine at the time, or about eighteen thousand. He was just a certain one of them, just one priest who lived somewhere out in a village somewhere and carried on his priestly duties like his eighteen thousand other priestly compatriots. But he becomes such an important character in the story, it's really remarkable. And actually we're going to look at five things about him, flowing all the way down to verse 25. Now we won't get through all of that today but by the time we get to 25 we will have seen five things about him, his personal righteousness, his priestly responsibility, his prophetic revelation, his perfidious response, and his punishing reproof, and you'll be able to hang your thoughts on those five hooks as we go.
Let's start with the first one, his personal righteousness. This is quite a remarkable guy. He was a priest and nothing more notable than just to say "just a certain priest." Judea was under Roman occupation, to be sure. It was under the fearful leadership of Herod. The Jews, however, even though it was under Roman occupation had the right to practice their religion freely so the priesthood was in full force and there were eighteen thousand or so priests actually functioning within the Jewish religion.
Now let me tell you a little bit about how priests function. The nation of Israel is a theocratic kingdom. That is, it's ruled by God. It basically was a kingdom ruled by God. And God mediated that rule for the officers of the kingdom who were priests. And all the priests were sons of Aaron. They call came through Aaron's loins and he had two sons, Eleazar and Ithamar in particular, and out of their loins came...came others who are identified with the priestly orders and he had other sons and they were priests. Everybody who came out of Aaron, every male child who came from the family of Aaron was considered a part of the priesthood. They were the agents of God. They basically operated the theocratic kingdom. They took care of the public issues and the public events and the teaching of Scripture, etc., etc.
To be a priest then was to be honored. It was to be a representative of God. It was to be a son of Aaron, if you will. It was to be a descendant of the one who was the originally high priest who was to be set apart by God for holy service. It was to be able to go...to go into the temple and offer sacrifice on behalf of the people. It was a very noble and respected position. They were pronouncers of blessing also. They were servants of the temple. It was... It was the priests who were the butchers who actually did all of the sacrificing of the animals for the people. It was the priests who interpreted the Scriptures. It was the priests who taught the Scriptures and who counseled people out in their villages where they lived. Zachariah was one of them. His name can be with an H or an S, either way. And now there were many of these, as I said, there were about eighteen thousand. In fact there were so many of them throughout all of the history of Israel that they had to be divided into twenty-four orders. Back in 1 Chronicles twenty-four, David, before the kingdom even divided into the northern and southern kingdom, in the reign of David he divided the priesthood into twenty-four orders because Eleazar and Ithamar, two of Aaron's sons, combined had twenty-four sons, so they just made those sons, all twenty-four of them, the head of an order of priests and their sons and their sons and their sons and all the way down the line would belong to those orders. There were twenty-four orders of priests. The eighth order, by the way, was named for the eighth son of Eleazar, Abijah. And it happened that that was the division, it says there, in which Zacharias did his priestly service.
Now why was it divided down into twenty-four orders? Because there were so many priests they couldn't all serve in the temple all the time and they had to be divided down. And they were divided down and here's how it worked. Any priest would serve in the temple two different weeks a year, two separate weeks a year. That was it. During the whole year you would only serve one week at one time of the year and another week at another time of the year, and that was how you were brought into temple service. Because there were so many you only were able to serve two different weeks a year in the temple.
Now all the priests came to the temple for Passover. It wasn't uncommon to slaughter as many as a quarter of a million lambs, a quarter of a million animals at Passover. If eighteen thousand priests went about to slaughter a quarter of a million lambs just in a week's period, that would be a pretty great undertaking. And remember, they were butchers. They were covered with blood to the top of their head all the way to the toe of their feet. They were butchers, they slaughtered all day long. That's what they did when they were there. But in the normal course of things they served in the temple just two different weeks a year. And that's where we find Zacharias at this particular time.
It's also interesting to note that it says Zacharias was of the division of Abijah. Just a note about that; it doesn't mean that he was a descendant of Abijah, and I'll tell you why. There were twenty-four orders of the priests until a great event occurred and that was the Babylonian captivity in 586 B.C. Up to that point those twenty-four orders, you know, basically were made up of the descendants of whoever the order was named for. They were all the sons of those twenty-four sons of Aaron. But what happened in the Babylonian captivity was all of Israel was taken captive. In three deportments, 605, 597, and 586 B.C. they're all carried into Babylon. Seventy years later they straggled back, you remember, they straggled back. Only four of those orders of priests came back and Abijah wasn't one of the four that came back. Only four of the twenty-four came back under Zerubbabel, and that's in the second chapter of Ezra. For the sake of tradition, however, they wanted back the twenty-four so they divided those four families of priests back into twenty-four and restored the old names, even though they actually weren't descendants of those people. They restored the original names for the sake of restoration and the sake of tradition. So Abijah was not one of the four that returned, but the name Abijah was brought back into the priesthood so that they might have those same twenty-four. So we can say then that Zacharias, while not in the line of Abijah necessarily, served in the division of Abijah and did his duty when that division was called to serve in the temple those two weeks a year.
Now it also tells us about him that he had a wife. I might just say he was... He was a priest and that would fill his life with religion all the time. He also had a wife who knew about that. He had a wife, look at this, from the daughters of Aaron. He married the daughter of a priest. And since all male descendants of Aaron were priests, her father was a priest, her brothers were priests, her uncles were priests, her grandfather, great-grandfather, she was in a world of priests. She grew up immersed in Jewish priestly function. He chose the best. I think this tells us a little bit about his devotion to the priesthood, his devotion to God, to his priestly duty. He married a girl who was most exposed to the devout involvement in the religion of Judaism.
And, you know, she must have come from a pretty good family, a pretty serious family of priests because they named her Elizabeth. Elizabeth is a beautiful name but did you know that Elizabeth, according to Exodus 6:23, is the very name of Aaron's wife? She was named after the wife of the original high priest Aaron. That tells you something else about this family that she came from. These are people who are serious about their religion. These are people who are serious about priestly function. And by the way, Elizabeth is a beautiful name. It means "My God is an oath," or "My God is faithful," or some variant of that. It celebrates the faithfulness of God. It extols God.
So here is this man, just a common ordinary garden-variety, vanilla priest out in some village somewhere, serious enough about his priesthood that he finds a woman to marry who has all her life filled with priests, who will understand his life and his love for the priesthood and for God. And one who so comes from such a devoted family as to have been named after the wife of the original high priest, Aaron. This is a remarkable couple. And this certainly provided tremendous heritage for John, didn't it? In a time of Jewish apostasy and a time of Jewish defection from true worship of God, a time of hypocrisy, a time of self-righteousness, this couple was devout. And we know that specifically because of verse 6, look at this, "And they were both righteous in the sight of God."
I have to stop you there. Oh, there's so much to say about this. They were both righteous in the sight of God. Now they weren't like the hypocrites. The hypocrites were righteous in the sight of men. You've got the distinction. They were very concerned about how they looked. That's why Jesus said about them in Matthew 23 that you're like painted graves, inside you have the stench of death but you're whitewashed on the outside. You're dirty on the inside. But that was the way Judaistic religion at the time was. They... They were involved in being righteous before men. That was the scribes and that was the Pharisees. And Jesus said to them in Matthew 23, "You hypocrites, you hypocrites, you hypocrites." He said it over and over and over and over again and told them they were going to get cast into eternal hell for their hypocrisy. These two were not righteous in the sight of men, they were righteous in the sight of whom? God, they were righteous in the sight of God. That's very different. As far as God was concerned they were right with Him and God doesn't look on the outward appearance, God looks in the heart.
You know, God said they're righteous. That couple down there, that Zacharias and that Elizabeth, they're righteous before Me. What does that mean? That means their sins were covered, doesn't it? It must. The only way God could declare someone righteous was if He didn't impute their sins to them. They were right with Him. Their sins were covered. Now how did that happened? The same way it happens all the time. Same way it happened in Genesis with Abraham, the first of all the Jewish line. It says in Genesis 15:6, "And he believed God and it was counted as righteousness unto him." God literally gives righteousness as a covering to those who believe Him. They believed in God. They believed in the true and living God. They believed the Word of God. They believed the revelation of the Old Testament. They believed God's holy law was right and true and just and good. They believed that they couldn't keep His law. They knew they were sinners who fell short of the law of God and they knew that the law of God called for penitence and repentance and they also knew that God was a God of mercy and grace and loving-kindness. They believed all that and so they saw the law of God, they saw its holy standard. They realized they fell short of it. They went to God with a penitent heart and they asked Him for grace and mercy. That's what the Old Testament reveals. That was what God said, here's My law, you can't keep it but I am a God of mercy and I am a God of compassion and I am a God of loving-kindness and grace and all you have to do is ask. They believed that.
I'm sure Zachariah and Elizabeth both knew Isaiah 61:10. They knew what Isaiah the prophet had said. This is what he wrote, "I will rejoice greatly in the Lord, my soul will exult in my God: and here's why “for He has clothed me with garments of salvation. He has wrapped me with a robe of righteousness." They knew that. They knew that even though they were sinful they could be covered with righteousness; that God would be merciful and gracious to them and cover them with a robe of righteousness so that when God looked at them He saw righteousness, not sin. He covered up their sins.
The question is, how could God do that? How could God do that and still be holy? How can a holy God be just and the justifier of sinners? How can God just cover up sin and still be holy? I think Zachariah and Elizabeth both knew how. I'll tell you, there's one other statement made by Isaiah that I'm sure they knew and it's the fifty-third chapter of Isaiah. Isaiah said, "There's One who's coming who will be despised and forsaken by men, a man of sorrows acquainted with grief.” Listen to this, verses 4 through 6. “Surely our griefs He Himself bore, our sorrows He carried, yet we ourselves esteemed Him stricken, smitten of God and afflicted. He was pierced through for our transgressions. He was crushed for our iniquities. The chastening for our well-being fell upon Him and by His scourgings we are healed. All of us like sheep have gone astray, each of us has turned to his own way, but the Lord has caused the iniquity of us all to fall on Him."
They knew. They knew there was coming someone who would bear their sins, someone who would be bearing their griefs, carrying their sorrows, who would be pierced for their transgressions, crushed for their iniquities. Their iniquity would fall on Him. That's how God could cover them with righteousness. How? Because someone else would bear their sin. Who was that someone else? Whoever fulfilled Isaiah 53. And who was it to be? The Messiah. And that's why when John first saw Jesus, when John was down at the river in his ministry and Jesus showed up for the first time, John didn't say, "There's the Messiah, there's the King." John said, "Behold the Lamb." John spent his life head deep in blood in the sacrificial system over and over and over and over day after day after day all through the year these orders of priests just slaughtered animals, slaughtered animals. And never ever did it take away sin. The people had to come back make another one, another one, another one, another one all their life long. He was looking for the final sacrifice, the one who would bear his sin. He was believing that God would provide a sacrifice. Doesn't that sound like Abraham, who took his son up on Mount Moriah way back in Genesis and believed that God would provide a sacrifice?
They were believing people, this couple. They believed in God, they believed in the true and living God, they believed in His law. They knew they fell short of it. They were penitent in their hearts. They cried out to God for mercy and they knew that God would have some provision for their sin. Someone would bear their sin. He of all people, Zacharias, and Elizabeth of all ladies would know their hopeless incompletion of the sacrificial system. Butchering, butchering, slaughtering day after day after day after day after day; same people over and over and over and over and never was sin taken away, never was the price finally paid, never were the souls of people truly ransomed. You can imagine the exhilaration in John the day he pointed to Jesus and said, "Behold the Lamb of God which takes away the sin of the world." Wow!
There would come one, Zacharias knew it, who would die the death for sin which fully satisfied the holy justice of God. God knew that that sin would be covered so He could take care of the sinner by covering him with a robe of righteousness based upon what Christ would do. This is justification by imputation.
We aren't righteous, but God looks at us and we're righteous in His sight because He covers us with righteousness because we believe. And by our faith our sins are placed on Christ. When Christ died on the cross He...He was bearing the sins of Zacharias and of Abraham and of Elizabeth and of Sarah and of everybody else who ever believed. He was the sacrifice.
Luke tells the story later in chapter 18 about a Pharisee who went to the temple and he said, "I thank You that I'm not like other men," and he goes on parading all of his external virtue. And there's this other guy beating his chest. He won't look up and he says, "God, be merciful to me, a sinner." And Luke records that Jesus said, "That man went home righteous and not the Pharisee."
Well that's the kind of person Zacharias was, the kind of person Elizabeth was. They were righteous because God had covered them with righteousness because they believed Him and they believed that God would provide a sacrifice for their sin. In the mean time, they cried out for His mercy.
They were really part of a remnant, true godly Jews in the midst of a nation of apostates. There were more. And we're going to meet more: Joseph, Mary, Anna, that old lady in the temple, Simeon, that old man. They were part of the remnant. They were part of the remnant who probably were hanging on to Malachi's words that the sun of righteousness is going to rise and hoping it would be in their lifetime.
They weren't just justified — justification and righteousness the same thing — they were also sanctified. Look at the rest of verse 6. They were walking blamelessly in all the commandments and requirements of the Lord. When God imputes righteousness to you, He also imparts righteousness to you. In other words, they weren't the same after they believed. They were declared righteous based upon Christ's carrying their...bearing their sin. They were covered with a robe of righteousness, which God did for them. But they also transformed. So we always say that justification, which is being declared righteous on the merits of Christ's substitutionary death, is never separated from sanctification, which is God making you different. They were different. They walked blamelessly in all the commandments and requirements of the Lord. That doesn't mean they were sinless. It doesn't mean they were perfect. It just means they were obedient. They had a reputation for walking according to the will of God, the law of God. They were like Job, of whom essentially the very same thing is said. Job was a faithful, obedient man. He was blameless, upright, fearing God, and turning away from evil, Job 1:1. This means that salvation is justification, being declared righteous because Christ cares for your sins, and it is also sanctification and they...they have to occur together. Holiness was imputed to them, that is, put to their account. It was also imparted to them. They were regenerated. They were converted. They were transformed. Psalm 19 says that, "The law of the Lord is perfect, totally transforming the whole inner man." They were made different people so that they could live a different way. They were able to live life as previously impossible.
They understood the Mosaic Law. They grasped its perfections. They knew they fell short. They came to God, they got His mercy and His grace. They then loved the law of God. They wanted to keep it, they wanted to do it. And God gave them the capability of doing that by changing them. They were then able to obey Joshua 1:8, a great verse, "This book of the law shall not depart from your mouth, you shall meditate on it day and night so that you may be careful to do according to all that is written in it, then you'll make your way prosperous, then you'll have success." They were Psalm 119 people, Psalm 119:97, "Oh how I love Thy law."
Now, you say, "John, why are you...why are you into all this stuff?" Because I think this is what Luke's trying to tell us and we have to have this foundation. We'll... We’ll get the speed going as we start going downhill here, but you have to understand this. Luke is giving us something here that is critical to the gospel, it's critical to the whole message of the Bible. He is... He is showing us, listen, folks, in describing Zacharias and Elizabeth he is laying an essential foundation for the story of salvation. What he's telling you is the gospel is not in conflict with true faith in Israel. It is in harmony with true faith in Israel. You understand that? These people would accept the gospel gladly because it's the next reasonable step because they're looking for their sacrifice. Contrast that with the apostle Paul, who was a...who was a Pharisee who was going around trying to establish his own righteousness and had to say about his entire life before Christ it was manure.
These people...these people evidenced for Luke the fact that the New Testament message is not in conflict with true faith in Old Testament Israel. It's not a new religion. It's not a new way of salvation. It's not a different way to God. And Jesus did not come to oppose the Old Testament law or to oppose the Old Testament sacrifice, He came to affirm them and fulfill them. Everything the Old Testament taught about salvation, being right with God, confession of sin, repentance, faith, the substitutionary death of a sacrifice for sin, obedience to God's law, that's all taught in the New Testament. Jesus said, "I'm not going to remove one jot or tittle,” not one little breathing mark and not one little tiny little mark till it's all complete.
God's law, man's sin, faith in God, repentance for sin, justification, which is imputed righteousness, sanctification, which is imparted righteousness which changes you, obedience to God's law, worship of the true and living God, that's all carried from the Old into the New intact. Continuity is there.
So Zachariah and Elizabeth were Psalm 119: 1 people. It says, "How blessed are those who walk in the law of the Lord, whose way is blameless." Two very righteous people, righteous in the sight of God.
But listen to this, this is fascinating. Probably, probably they weren't righteous in the sight of men. You know why? Verse 7, "They had (no what?) no child because Elizabeth was barren and they were both advanced in years." You want to know the most severe shame that a Jewish woman would ever bear was to be what? Childless. You know what the conclusion of people might be? "Well, you know what the Bible says, you know what the Scripture says, ‘Children are an heritage from God,’ Psalm 127, "they are a blessing from the Lord. And you know what Scripture says, that if you sin God can shut your womb and you will pay, Deuteronomy 28, there are curses, and when God curses you it can show up in barrenness." This dear couple, this dear woman lived, it says, into her old age, they were both advanced in years. That puts them over 60. And since there was no retirement age for a Jewish priest, they could be 80 or more. All their life, and they were probably married in their teens typically, all their life, all their life they bore the stigma, no child, no child, no child. And all the questions, I wonder what's wrong. I wonder what sin is in their life. The rabbis used to say seven people are excommunicated from God. Here's how they begin: A Jew who has no wife, or a Jew whose wife has no child. That was a terrible burden in that society.
You remember the story back in Genesis chapter 30. I'll just read it briefly. It's right there in the first verse. "Rachel saw that she had no children; Jacob, her husband. But his other wife did. She became jealous of her sister and she said to Jacob, “Give me children.” How serious was this? Or I what? “I'll die.'" Hannah, 1 Samuel 1, barren, weeping and weeping and weeping and weeping. To be barren was grounds for divorce. If your wife couldn't have a child, boot her out. She's probably accursed by God.
So here's this couple, righteous in the sight of God, maybe unrighteous in the sight of men. As godly as they were they bore the stigma. But Luke wants us to know that her barrenness had nothing to do with sin in their life. That's why verse 6 is there. But it had everything to do with something God was planning. Better you should have a bunch of unknowns, or worse, I should say, you should have a bunch of unknown kids than to have just one John the Baptist. God had something planned for them that was so much beyond their wildest dreams. To them was to be given the forerunner, the first prophet in 400 years, the last prophet of the Old Testament, and, listen to this, the greatest man who ever lived up until that time. They would have only one son. He would be the greatest human who had ever walked the earth, and that is from the words of Jesus Himself. This is not divine punishment, their barrenness, this is divine planning.
You know, their situation humanly was hopeless. And that's exactly where God often prefers it. And then you know what happened? Come back next week and find out. But I'll give you a hint, verse 11, "An angel of the Lord appeared." Wow, here God breaks in, this is really exciting. We'll have to wait till next time. And as I said, this foundational truth we need to take our time getting through and then we get into the flow of the teaching of the book. Let's pray together.
What a great time this morning, Father, to worship You and praise You and to just see the richness of this treasure of truth. We're just so thrilled to see the clarity with which the message of Scripture is opened to us and the power with which it comes to our hearts. We thank You that You are the God of history, You are the God of the universe and You are unfolding history in these most marvelous ways. We thank You for the reminder this morning that these two simple, humble people who had nothing about them that was distinguished, except they were righteous in Your eyes. Can anything more wonderful be said than that about someone? Thank You, that that righteousness, that robe of righteousness, can cover any of us who will believe and embrace the reality that Jesus Christ was the substitute for our sins. Embracing Him as Savior we are then covered with that same robe of righteousness for He has removed our sins. We thank You that they remind us of sanctification, the fact that when we are justified we are also regenerated, converted, transformed, born again so that we now have a new life and what we couldn't do we now can do and we can walk in Your ways and love Your truth and obey Your Word. We thank You for the example of this couple and with great anticipation we await the remainder of the story as You break through the silence to announce the birth of the forerunner of the Savior of the world.
Father, we just pray for every person here to be in the same situation that was true of these two folks, righteous in the sight of God and blameless, and walking in the commandments and requirements of the Lord. To that end we pray for our Savior's sake. Amen. | 2019-04-20T04:53:02Z | https://www.gty.org/library/sermons-library/42-3/zacharias-the-righteous-priest |
In learning about salvation there are different terms involved which basically mean the same thing. To avoid confusion let us briefly consider some of those terms.
1. SAVED. To be saved means to be saved from some thing. If a person is drowning and the lifeguard jumps in and saves them from drowning we know what they have been saved from. Spiritually many people are also drowning. They may or may not realize the danger of their situation.
May those in Heaven and hell visit with each other?
The rich man died and woke up where?
Is the rich man having fun in hell?
Is the rich man aware of having lost his opportunity of being saved?
Is the rich man aware of having lost blessings?
Is the rich man’s confinement to hell permanent?
Note: In verse 31 of this passage Jesus says, “If they hear not Moses and the prophets, neither will they be persuaded though one rose from the dead.” Moses and the prophets is a reference to the Scriptures.
Obviously there is something to be saved from, a real place where those without salvation go when they die to suffer eternal torment forever. They are forever separated from God and from the saved. They know they have missed out on the blessings of God.
2. BORN AGAIN. “Born again” means essentially the same thing as being “saved.” However the phrase carries additional meaning and information about what happens when you are saved. Jesus tells Nicodemus that he must be “born again” in the third chapter of the Gospel of John. Let us examine this passage of Scripture about being “born again.” The passage is found in John 3:1-21.
Who will be in the Kingdom of God?
Is Jesus talking about being born physically a second time or being born for a first time spiritually?
At what point do you have eternal life?
Once you have been “born again” and have eternal life can you lose that eternal life and become unborn?
How do we condemn ourselves?
Being saved is like a birth. We are birthed into the Kingdom of God by the Holy Spirit. Only those who have experienced this spiritual birth will be in Heaven.
We receive eternal life at the moment that we believe on Jesus as our Savior. Once we have eternal life how can it be taken away? If it could be taken away it would not be eternal life. Eternal life cannot become uneternal life.
For assurance of your salvation, that eternal life cannot become uneternal life and that even you cannot discard eternal life by your actions or nonactions please look at John 6:37-40.
What is the Father’s will?
Will Jesus lose any that come to Him?
Who will have everlasting life?
If you believed on Jesus it is not the Father’s will that you should be lost and Jesus will not lose any that believes on Him. Did you believe on Jesus for your salvation? If so it cannot be lost, you have eternal life and it cannot become uneternal life no matter what you or anyone else may do.
Paul describes the new life of a born again believer in 2 Corinthians 5:17 when he says, “Therefore if any man be in Christ, he is a new creature: old things are passed away; behold, all things are become new.” According to Paul things are changed at the moment that we are born again. Let us consider what this new life is like and how it has changed.
Have we received the spirit of the world or the Spirit of God?
What is one thing in this passage that clearly is freely given to us?
Does the natural man (the lost) understand the things of God?
Those who are saved can understand the things of God because of what?
Obviously if we are saved we received not the spirit of the world but the Spirit of God and because of that some things have been freely given to us that makes us different than we were before salvation was received. Before we were saved, according to this passage, we could not understand the things of God. This is why there are so many interpretations of the Bible. It is why some read and read and study and study the Bible but never seem to get anything out of it. It is also why it is many times pointless to argue with the lost because for the most part they will only be able to understand clearly the Holy Spirit calling them to salvation.
A little ten year old girl was saved at a summer camp and she shared with my wife that it was just different now when she heard someone preaching. When I was saved the Word of God changed for me and a hunger for God’s Word suddenly seemed to have been implanted into my heart that had never been there before.
We will know that we have “passed from death unto life” because we do what?
If you do not have love for other Christians and don’t want to be around them what most likely is the cause of that?
If we have been saved we will have a supernatural love implanted in us causing us to love other Christians. This love will cause us to want to be around other Christians and to have fellowship with them. We will have a desire to be in church, for that is where God’s power is most focused. Matthew 18:20 says what? Also, consider Hebrews 10:24-25. It has been said that if our religion is not strong enough to take us to church most likely it will not be enough to take us to Heaven. I believe there is an element of truth in that statement. It does not, however, mean that just because you are not in church that you are not saved or have lost your salvation. It is though a definite indicator of spiritual problems when we have no desire to be in church with other believers to worship our God.
Does the apostle Paul live a life without struggle with the old nature?
Is the apostle bothered by his failure to do good when he knows to do it?
Is there something hindering the apostle from doing good?
The apostle Paul did battle every day with the old nature just as do other Christians. Sin is not just what we do but as Paul reveals in verse 19 it is also the failure to do good when we know to do good.
What are some ways that you can give attention to the good nature?
What are some ways that you can give attention to the old/bad nature?
You might want to write out beside each verse how God spoke to you as you meditate upon it. These are excellent verses to memorize.
It is important to know that it is impossible to live the Christian life in your own strength. Only by abiding in Christ can we succeed in living the Christian life. Only through supernatural empowerment can a supernatural life be lived.
“And they overcame him by the blood of the Lamb and by the word of their testimony; and they did not love their lives to the death.” - Revelation 12:11.
The evangelist Kim Schmidt has a tremendous testimony. Kim tells of waking up one morning with a desire to go to church after a several day binge of drugs, alcohol, and huffing. He was frightened that he would return to a mental institution. He had imagined that a baby was being birthed in the palm of his hand. It was enough to get him to a church. He didn’t clean up and you can imagine what he looked and smelled like when he arrived at a nearby church. He didn’t know what time the services started so he arrived in time for Sunday school. Once in the class the Sunday School teacher did not condemn him. No, he just shared with Kim his own testimony of how God had saved him and taken the alcohol out of his own life.
When the worship service started Kim was sitting on a back pew and a 70 year old deacon came and asked if he could sit by him. Before the service had ended Kim had given his life to Christ. Wasn’t long before his wife had given her life to Christ as well. Why did Kim go to church that day? Maybe it was because a friend sometime before had gotten saved and shared his testimony with Kim. When it had gotten bad enough Kim remembered that God had changed his friend.
Do you have a testimony? Why not share it with someone?
“For those who live according to the flesh set their minds on the things of the flesh, but those who live according to the Spirit, the things of the Spirit. For to be carnally minded is death, but to be spiritually minded is life and peace.” - Romans 8:5-6.
Stuart Briscoe tells a story about the cuckoo bird. Now the European cuckoo bird is much larger than the cuckoo birds in the United States. The mother European cuckoo bird has forgotten how to build a nest. It flies around until it sees another nest with eggs in it and no mother bird around. The cuckoo quickly lands, lays an egg there, and flies away.
The mother thrush, whose nest has been invaded, comes back and gets to work hatching the eggs. It apparently does not bother her that there is an extra egg in the nest. What happens? Four little thrushes hatch, but one large cuckoo hatches. The cuckoo is two or three times the size of the thrushes. When Mother Thrush brings to the nest one large, juicy worm, she finds four tiny thrush mouths, and one huge cuckoo mouth.
Guess, which bird, gets the worm? A full-sized thrush ends up feeding a baby cuckoo that is three times as big as it is. Over time, the bigger cuckoo gets bigger and bigger, and the smaller thrushes get smaller and smaller. Stuart says that when he was a kid he could always find a baby cuckoo’s nest. You just walked along a hedgerow until you found dead little thrushes, which the cuckoo throws out one at a time.
Spiritually we are similar to the thrushes and the cuckoo. We have two natures in one nest (i.e.: in one body). James says in James 5:19, “Brethren, if anyone among you wanders from the truth....” I would submit to you that the primary cause of wanderers from the truth is the feeding of the sinful nature and not the spiritual nature. If we would grow spiritually then the spiritual nature must be fed. At the same time we must stop feeding the sinful nature. The sinful nature is just like the baby cuckoo. If we keep on feeding it the sinful nature will destroy us.
Which nature have you been feeding?
“Now the king of Syria was making war against Israel; and he consulted with his servants, saying, ‘My camp will be in such and such a place.’ And the man of God sent to the king of Israel, saying, ‘Beware that you do not pass this place, for the Syrians are coming down there.’” - II Kings 6:8-10.
Researchers at the University of California at Berkeley are building a tiny robot. Known affectionately as ``robofly,'' the gadget is a flying robot about the size of a housefly. It even looks a like a fly, although it will have four wings instead of two and one eye instead of two. The US government is funding the project with $2.5 million and they want to see robofly dodging flyswatters by 2004. Teresa McMullen of the Office of Naval Research said, ``the potential application of a robot based on a fly might be, in an urban environment, clandestine surveillance and reconnaissance.'' We would never have guessed Teresa! In other words, that fly might be a spy. Just the thing for keeping tabs on terrorists or citizens.
“And this is His commandment: that we should believe on the name of His Son Jesus Christ and love one another, as He gave us commandment. Now he who keeps His commandments abides in Him, and He in him, And by this we know that He abides in us, by the Spirit whom He has given us.” - I John 3:23-24.
We have to wonder if it had been a human being would there have been the same amount of concern? Now God is concerned about cattle (Jonah 4:11) but they are not made in the image of God (Genesis 1:26-27). Our concern for animals and disdain for humans may come from our experience with them. There is usually a good reason when an animal attacks and few of us have been on the receiving end. I have been chased by a cow but most people in Florida have probably not had the experience. However, nearly all of us have been on the receiving end of verbal or physical attacks from other humans. I believe there is something in us that wants to show concern, that wants be kind, that wants to love. It is because we were made in the image of God and God is love (I John 4:8).
It may be difficult (It was difficult for Jonah.) but it is God’s will and His command for us to be kind to each other and to love each other. We will never really be able to experience love until we begin to love each other. The next time we see someone stuck in the mud let us give them some help and demonstrate that we are truly made in the image of God (I John 3:18).
“Now to Him who is able to do exceedingly abundantly above all that we ask or think (imagine), according to the power that works in us, to Him be glory in the church by Christ Jesus to all generations, forever and ever. Amen.” - Ephesians 3:20-21.
How true Dr. Kulichev’s observation is! Prayer does not just happen. There must be a conscious effort on the individual’s part to pray. Usually, in order to pray something else must be given up to make time for prayer. For us to have a “Sweet Hour of Prayer,” as the hymn describes prayer, what would we have to give up? What would be necessary in our lives for us to have an hour of prayer? What priorities would need to be rearranged?
I read a story in Reader’s Digest (I think the year was around 1984.) written by a woman who began to pray for an hour a day. She had to begin her day an hour earlier to spend the hour in prayer. Her testimony was that it had completely changed her life and the life of her family for the better.
“Be sober, be vigilant; because your adversary the devil walks about like a roaring lion, seeking whom he may devour. Resist him, steadfast in the faith, knowing that the same sufferings are experienced by your brotherhood in the world.” - I Peter 5:8-9.
There was a new Christian scandal, which surfaced in the United States a few years ago. The president of conservative Hillsdale College in Michigan resigned. He resigned after his daughter-in-law confessed a 19 year long affair. She has since committed suicide. It is shocking and at the same time so very sad for this family and for this college. This scandal is only the most recent of a continuing saga of well-known Christians to have their immoralities publicly exposed.
Billy Graham has done some research, which reportedly shows at least 90 percent of Christians in the US are living defeated spiritual lives. The scandal at Hillsdale is shocking but does it really surprise us? It should serve as a warning of our own human weakness and fallibility. 90 percent living defeated spiritual lives? Most likely this includes some of us and if so how long before we crash and burn as well?
“This is My commandment, that you love one another as I have loved you.” - John 15:12.
It always warms my heart when I hear of how love overcomes. The title of a newspaper article I read that tells of that kind of love is “Daughter’s love unites husband, father.” The daughter fell in love and married, Sean, who is a paraplegic because of a motorcycle accident. She says he reminded her of her father who has health problems as a result of a wound received in Vietnam. Chanda’s parents initially resisted the relationship but now there is an increasing bond of love between them. It may have something to with Sean and Chanda’s Dad both being new Christians.
Have a relationship problem? Try filling up with the Love of God.
“A good man out of the good treasure of his heart brings forth good things, and an evil man out of the evil treasure brings forth evil things.” - Matthew 12:35.
The National Security Agency in the US reportedly is using technology to monitor keywords contained in emails. Of course, it has been believed for many years that telephone conversations are also monitored for keywords, which would indicate threats against the country or president. We see the progression: telephone conversations, email communications and next? It may be that spy satellites can nearly read the lips of those in its sights but how long before they can listen in? Or are they already? We can only hope and pray that they can listen in on Osama Bin Ladin and his leadership team!
We fear the ability of government to intrude on our most private moments. Sometimes we think out loud and don’t really mean what we say. Or, maybe we do and we wouldn’t want others to hear! Sometimes we click the send button when we haven’t really thought carefully through every word we have written.
“When a man’s ways please the Lord, He makes even his enemies to be at peace with him.” - Proverbs 16:6-7.
“But I say to you who hear: Love your enemies, do good to those who hate you, bless those who curse you, and pray for those who spitefully use you.” - Luke 6:27-28.
What do you do when you have an enemy? Keep on living for the Lord, pray for your enemy, and do good things to your enemy (Luke 6:29-36). I have had few enemies in my life, however, I know when I have retaliated it simply escalated the problem to a new level of hostility. But when I have refused to respond to evil with evil but instead responded with good my enemies have been neutralized. God has a way of redirecting the attention of our enemies. Some people just enjoy causing trouble and problems for others. It makes them feel powerful and in control. When we fail to react as they had hoped over time they grow tired of their game and look for others to trouble.
Praying for your enemy is a powerful weapon. It was through prayer that Jacob knew it was time to return to the land of his fathers (Genesis 31:1-13). As a result of obedience to God’s direction Laban was neutralized. Laban it seems had a dream warning him not to harm Jacob (Genesis 31:24). We know Jacob had left his homeland because Esau his brother was planning to kill him. However, after Jacob had wrestled with the Lord all night (Genesis 32:24-32) Esau was neutralized (Genesis 33).
God says, “Vengeance is Mine, I will repay (Romans 12:19).” We should let God take care of it. Pray for our enemies and do good to them. God may appear to them in a dream telling them to leave us alone. Or, God may give them a change of heart toward us. Or, God may give them some other things to occupy their attention. When your enemy comes to destroy send God to the door. Your enemy will be surprised and God will overcome him.
“...if indeed you have heard Him and have been taught by Him, as the truth is in Jesus: that you put off, concerning your former conduct, the old man which grows corrupt according to the deceitful lusts, and be renewed in the spirit of your mind, and that you put on the new man which was created according to God, in true righteousness and holiness.” - Ephesians 4:21-24.
Harry Truman while president of the United States in 1948 made a shocking discovery of the condition of the White House. When the honor guard marched him to a state dinner the crystal chandelier in his study swayed. When the butler walked in with breakfast Truman could feel the whole floor wobble. He called for engineers to examine the structure. The chief engineer reported the ceiling in the state dining room was only staying up from force of habit. Truman made a tough decision. He had the entire inside of the White House gutted. It was all torn out and rebuilt with only the shell remaining. When it was rebuilt it was with a steel framework which makes it as strong as any modern building.
There are many of us who wonder about the history that must have been lost in such a drastic reconstruction. Many were attached to the well worn floors with the smells of decades of momentous occasions. In much the same way we grow attached to our old lives, our old sins, our old circumstances, and habits. So when we are born again (John 3:3), becoming a new creature in Christ with old things passing away and all things becoming new (II Corinthians 5:17) it is a drastic change! Our old lives have been gutted and a complete reconstruction has taken place.
Have you been living in a tent? Why not get out of there and try out the new place!?
“My times are in your hands.” - Psalm 31:15.
So, what is the solution or is there one? I don’t have it but there is One who does. Who invented time? In whose hands are the times of our lives? God! How can God possibly do anything to improve my schedule or organize my life? God is the master scheduler, the master organizer. Why do I say that? He created the universe, world, all creation on a schedule that would be a nightmare for anyone else. Six days and rested on day seven. Right on schedule and everything worked! How can God do anything with our lives? You may be thinking it would take a miracle but you have to remember our God is a God of miracles. He is used to making the impossible into the possible. How? I don’t know He just does.
The bottom line is that if we trust God with our time by investing in prayer, bible reading/study, church attendance, and service the time will not be lost. Instead, God will add time back to our lives by organizing and improving our lives. Quality will be increased. God was an expert at quality time long before it became popular. Our energy level will be increased and our health will improve from what it would have been without God. When you are too busy to pray, too busy to read His Word, too busy to go to church some would say you are too busy. The truth is those are the times when you need to pray even more, read His Word more, be even more faithful in church attendance. Try it. He will not disappoint you!!
Commitments by themselves do not a Christian make. But can there really be a Christian without any commitments?
My mother for a short period of time had a pet snake. She had caught it and put it in a cage outside. Whenever she fed the snake she would always have to wear leather gloves because the snake would try to bite her. It didn’t matter how long my mother kept the snake or how much time she spent with the snake it would still try to bite her.
We are told in Romans 6:23, “For the wages of sin is death.” Sin is much like my mother’s pet snake. It doesn’t matter how much time we spend with our pet sin it is still going to give us death. Actually the more time we expend upon our sin the more death that we will receive.
“The mind of sinful man is death.” We have a choice each day. Let us choose life and peace!
“So Moses went into the midst of the cloud and went up into the mountain. And Moses was on the mountain forty days and forty nights.” - Exodus 24:18.
Isn’t it interesting how we usually find time to do the things we want to do? Not only do we find the time but we also find the energy to do those things. One of the things many of us have a desire to do but seem unable to accomplish is the spending of more time with our Lord. We have a desire to have the quiet time, to pray and to study His Word more but we don’t seem to be able to fit it into our schedule. There are so many things we have to do. We have to work; there are the family responsibilities, church responsibilities, and community responsibilities. By the time we finish with everything else we have little energy for a quiet time unless it includes sleep.
How was it that Moses was able to spend forty days and forty nights on the top of Mount Sinai? How was Jesus able to spend forty days and nights fasting in the wilderness? Moses and Jesus were supernaturally empowered by God. God provides supernatural energy for seeking Him and serving Him. Reorganize your priorities. Wake up thirty minutes earlier and spend that time with God. God will then provide the energy you need for everything else during the day. It is a matter of faith. Do you believe God has the power? If so do you believe He can and will do it in your life?
In Romans 3:23 the Bible says, “For all have sinned and come short of the glory of God.” Before we can have salvation we must first realize our need for a Savior. Before we can be forgiven of our sins we must first realize that we have sinned.
One of my first experiences with sin that I remember was when I was four or five years old. My mother had brought us with her to do the shopping and I noticed a large glass bowl full of small knives. These knives were shiny and glittery. The green one was the one that I wanted. But it cost five cents and I didn’t have five cents and I knew my mother wouldn’t give me the money. So I reached into the bowl and took the green knife. I was a thief. I knew it was wrong but I did it anyway. It was definitely sin.
Usually I can tell that story to a group of people and ask them if they have ever stolen anything and most will hold up their hand. I can then ask if they have ever disobeyed their parents and usually the rest will hold up their hands. Or have they ever cheated, or lied, or deceived anyone?
I was a Christian but I still remember having a discussion with a man working with me. In this discussion I came to realize that it wasn’t just the things that I did or didn’t do that could be sin. I suddenly realized that I could sin through my thoughts. Taking those thoughts captive (2 Corinthians 10:5) was not an easy thing to do. At that point there was definitely a war raging between my old nature and my new nature.
Have you sinned? Have you called upon the name of the Lord? Do you know someone else that needs a Savior? Why not let them in on the Good News? I wish I had heard about it when I was a little boy with a green knife in my pocket.
“These things I write to you though I hope to come to you shortly; but if I am delayed, I write so that you may know how you ought to conduct yourself in the house of God, which is the church of the living God, the pillar and ground of the truth.” - I Timothy 3:14-15.
There are so many wonderful benefits from church attendance that it would be difficult to list them all. So many people that I talk to say that they just do not have time for church because of the busy lives they lead. However, if they could somehow comprehend the benefits church provides for them they would never miss a service. Taking a few hours a week to attend church services will when done faithfully bring order and coherence to every area of our lives. Instead of taking away time from us church attendance brings quality to every hour we live.
One of the more recent studies demonstrating the importance of church attendance is a Canadian psychiatric study. The study measured the impact of religious commitment with psychiatric patients. The results demonstrated that those patients “who worshipped more often also benefited more.” The study was published in the March 28, 2002 issue of the Canadian Journal of Psychiatry.
The apostle Paul writing to Timothy also describes the importance of the church. The church is “the pillar and ground of the truth.” To take the church out of your life or to leave the church out is to leave out the “truth.” In many ways leaving the church out is to leave out the spiritual reality or truth of every situation and circumstance. However, when we include truth, the church we can sense a “meaning” and “coherence” in every area of our lives.
Once you establish the habit of church attendance you will never want to abandon it because you will know the difference that it makes for you and your family. Let us not forsake the assembling of ourselves together (Hebrews 10:25) as the church of the Living God.
“Indeed, we put bits in horses’ mouths that they may obey us, and we turn their whole body. Look also at ships: although they are so large and are driven by fierce winds, they are turned by a very small rudder wherever the pilot desires. Even so the tongue is a little member and boasts great things. See how great a forest a little fire kindles! And the tongue is a fire, a world of iniquity. The tongue is so set among our members that it defiles the whole body, and sets on fire the course of nature; and it is set on fire by hell.” - James 3:3-6.
“Out of the same mouth proceed blessing and cursing. My brethren, these things ought not to be so.” - James 3:10.
A survey conducted by Public Agenda found that 79% believe that the lack of respect and courtesy in the United States is a serious problem and most believed it was becoming worse. Surprisingly many people admitted during the survey that they were rude themselves and more than a third admitted to using foul language in public. Those surveyed blamed their rudeness on a variety of things from overcrowding in public places to busy lives. Some researchers such as Harvard University professor Robert D. Putnam say that rudeness is a result of increasing social isolation in our society.
Being a pastor I live in a somewhat sheltered environment rarely hearing a rude or unkind word because people are careful what they say when they are around me. I have heard the argument from some people that they cannot control their speech but this is not true. We can control what we say if we have a desire to do so. No, it will not be without effort but we can do it just as people usually control what they say when they are at church or visiting with their pastor.
While I was a parole officer a young man was brought into the city jail on several offenses. At first I didn’t know who it was uttering the foulest most offensive language I had ever heard. When I asked the jailer I found out it was a son of a couple that went to our church and I knew the young man. When I walked up to the cell and said “hello” the tirade instantly ended and he said “Mr. Wrather.” He began speaking in a completely different way including phrases such as “yes, sir,” and “no, sir.” Since that time he has gone from bad to worse and has been in prison for several years. I still have hope, however, that this young man will turn to God.
Our social isolation will end as we become fully functioning members of the body of Christ (Hebrews 10:24-25).
“A good man out of the good treasure of his heart brings forth good; and an evil man out of the evil treasure of his heart brings forth evil. For out of the abundance of the heart his mouth speaks.” - Luke 6:45.
The Fire Department in Denver, Colorado received a strange emergency call from the nearby city of Montbello. The woman who called claimed to be trapped in her home by tumbleweeds that had filled up her yard jamming against the house. Not only did they fill up her yard they had risen to a height of 16 feet. A spokesman for the Fire Department said there were “thousands” in the woman’s yard.
We have to wonder at what point did the woman in Montbello decide to call for help. Most likely the tumbleweeds piled up over a period of several hours or even days. She apparently waited until the situation was completely out of control. But the important thing to note is that she did finally ask for help.
When the weeds of bad thoughts, evil thoughts, impure thoughts are piling up in our heart at what point do we ask for help? At what point do we decide that instead of constantly imputing thoughts that are damaging we instead store up thoughts that are good? Do we wait until they have piled up to such a point that we are trapped? Do we wait until out of our mouths are coming hateful evil relationship damaging words? Do we wait until we are unable to make a good decision because our hearts are so polluted with evil?
We must be aggressive in controlling those weeds of evil thoughts or they will quickly overrun and ruin our lives. In Proverbs 4:23 we are told to “keep” our hearts or “guard” our hearts. We must filter or bring into subjection every thought, everything that enters our lives. The Bible tells us how to do that in II Corinthians 10:4-5, “For the weapons of our warfare are not carnal but mighty in God for pulling down strong holds, casting down arguments and every high thing that exalts itself against the knowledge of God, bringing every thought into captivity to the obedience of Christ.” In the Name of Jesus we must take captive, take control of every thought, everything that enters our lives. If those thoughts are evil we must take them captive in the Name of Jesus protecting out hearts from those evil weeds.
We must not wait until we are trapped and even destroyed by the weeds of the world. Guard your heart, take captive the evil in the Name of Jesus, and fill your heart with all the good things of God.
“To the pure all things are pure, but to those who are defiled and unbelieving nothing is pure; but even their mind and conscience are defiled.” - Titus 1:15.
In Albuquerque, New Mexico Amadeo Salguero was arrested for the carjacking of an Acura at the point of a gun from three people. The Acura had an excellent stereo system which most likely was what Salguero was after. Salguero was having difficulty operating the system and so he called one of his victims and asked, “I don't want there to be hard feelings, but, hey, how do you hook up your amp?" The call was traced to Salguero’s cell phone who lived just across the street from where the carjacking occurred.
One translation of Titus 1:15 instead of “defiled” says “corrupted” and both words could be used. With Amadeo Salguero we see a corruption of his conscience. His conscience is so corrupted that he sees little wrong with robbing someone at gunpoint. I’m sure he was quite shocked when the police arrived to arrest him after his call for help about operating the stereo system.
The solution for uncorrupting a corrupted conscience is found in Hebrews 9:14 which says, “How much more shall the blood of Christ, who through the eternal Spirit offered Himself without spot to God, cleanse your conscience from dead works to serve the living God?” Once our conscience has been cleansed we should strive to keep it that way as we see in the example of the apostle Paul who says, “I have hope in God, which they themselves also accept, that there will be a resurrection of the dead, both of the just and the unjust. This being so, I myself always strive to have a conscience without offense toward and men (Acts 24:16).” In other words Paul strived always to keep his conscience clear or pure. We must do the same!
“Now I saw a new heaven and a new earth, for the first heaven and the first earth had passed away. Also there was no more sea.” - Revelation 21:1.
Even before 1990 there had already been 59 or so failed end of the world predictions. Others say there have been 200 or more failed predictions and it may be there have been many more, which were not widely recorded. Would it make any difference in the way we live if we had a date as to when the end would occur? As Christians we will never know the precise date but we do know the end is coming.
He who is slow to wrath has great understanding, but he who is impulsive exalts folly. A sound heart is life to the body, but envy is rottenness to the bones. - Proverbs 14:29-30.
But the fruit of the Spirit is love, joy, peace, longsuffering, kindness, goodness, faithfulness, gentleness, self-control. Against such there is no law. - Galatians 5:22-23.
The good news, the great news, the wonderful news today is that Jennifer Wilbanks is alive and well!! The sad news is that Jennifer is a runaway. She is a runaway from at the very least the stress of a huge wedding that kept growing and growing. For a week, Jennifer Wilbanks of Duluth, Georgia was thought to have been kidnapped. As it is now known, she went out for a run and took a bus to Albuquerque, New Mexico. Jennifer is 32 years old and was to be married today in a huge wedding with some 600 guests expected. No one except the police gave any consideration to the possibility that Jennifer had skipped out on the biggest event of her life.
The actions of Jennifer Wilbanks may seem strange for some and for others of us they may be understandable. I think most of us have been under such stress at times that it would have been wonderful to have that stress removed from our lives. Very few would have taken the actions that Jennifer has taken but many have taken similar actions. Because every day across this world, there are people who have had all that they can take and they simply drop out. They drop out of their careers, lives, families and they leave it all behind. Some, most, tell others what they are doing and some do not. Stress works havoc on our emotions and can lead to making major mistakes. In fact, it can lead to destruction of most everything that is good in our lives when we let our emotions take control.
You can prevent a runaway in your life by having more and more of Jesus in your life. The more of Jesus that you have in your life the more of the “fruit of the Spirit” that you will have in your life. Continuing to grow day by day as a child of God will protect you from self-destruction. To grow you must take advantage of the resources of God. The three primary resources of God are the Bible, prayer, and the church. Are you reading the Bible? Are you praying? Are you faithful in attending church if you are physically able? If not you are just asking for trouble and heading for a…runaway.
(Please note: The Training Manual is a work in progress. There are many subjects that need to be touched upon in a work such as this. So if you have questions feel free to contact me and I will try to answer your questions. If I cannot hopefully I can point you toward someone or some work that can.
Copyright 1996 - 2002. Ed Wrather. Permission is given for use of this material on a non-profit basis with source credited. | 2019-04-25T20:44:04Z | http://fbc-chataignier.org/resources/New_Christian_Manual.htm |
This User Agreement ("Agreement") defines the terms under which Blue Gravity Hosting provides a user account. This Agreement is a binding contract between Blue Gravity Hosting ("Blue Gravity") and the individual or company ("User") defined when creating a user account on the order form.
BY COMPLETING THE FORM TO CREATE A USER ACCOUNT, USER AGREES TO BE BOUND BY THE TERMS OF THIS AGREEMENT, OUR ACCEPTABLE USE POLICY ("AUP") AND ALL AGREEMENTS, RULES AND POLICIES INCORPORATED HEREIN OR INCORPORATED BY REFERENCE. BLUE GRAVITY RESERVES THE RIGHT TO REVISE THIS AGREEMENT AT ANY TIME. USER'S CONTINUED USE OF SERVICE CONSTITUTES CONTINUED ACCEPTANCE OF THIS AGREEMENT.
For the management of services provided by Blue Gravity, a user account is used. A stand-alone user account can be created or a user account will be created as part of the process when ordering service.
User acknowledges that the contact information supplied when creating a user account or when modifying the contact information in the Account Manager will be the only information used by Blue Gravity to communicate with User. User agrees to immediately validate and update the contact information for the user account when necessary or upon notification from Blue Gravity to do so. User acknowledges that willfully providing false contact information may result in the suspension of the user account and some or all of the services associated with the user account.
User agrees that Blue Gravity is not responsible and will not be liable for disruption to any service as a result of User not able to receive notices of any kind because of invalid or out-of-date contact information.
A user account has an associated username and password. The username and password is used to gain access to tools necessary to manage services attached to the user account. Absolutely NO access will be provided without the user account's username and password. Blue Gravity is not responsible and will not be liable for unauthorized cancellations, modifications, or purchases made with the proper username and password combination. User acknowledges that the username and password should be guarded and not disseminated unless necessary.
In the event that User can not remember the username and password combination, Blue Gravity will provide the information provided the User can receive an email to the email address provided in the user account contact information, can validate an active credit card on the user account or provide details about a recent check or PayPal payment, or can provide proof of identity for the individual or company provided in the user account contact information. Blue Gravity will not provide the username and password under any other circumstances, no exceptions.
A user account can have a combination of accounts and services associated with it. When new service is ordered, the user account supplied on the order form is the user account to which the new service is associated. Existing accounts and services can be moved among user accounts provided the username and password of the user account to which the account or service is currently attached is supplied.
User acknowledges that the user account to which accounts and services is associated is the user account used to manage those accounts and services. User acknowledges that with the username and password of the user account, any account or service attached to the user account can be canceled or modified. Blue Gravity is not responsible and will not be liable for unauthorized changes made to accounts or services attached to a user account made with the proper username and password combination.
Blue Gravity will send notices concerning accounts and services attached to a user account via email to the email address provided with the user contact information. User agrees that notice to this address via email is sufficient for all notifications for all accounts and services. User agrees that Blue Gravity is not responsible and will not be liable for any outcome related to a notice not being received.
Blue Gravity will periodically send email messages to the email address provided with the user contact information containing promotions, specials or reminders about services offered. User acknowledges that the periodic messages contain information pertaining to an account or service User has with Blue Gravity. Blue Gravity will provide the User the option to opt-out of receiving promotional email messages only. Messages sent to User pertaining to an account or service already provided are not promotional and no option to opt-out of receiving them will be allowed.
Blue Gravity respects the privacy of every user. Blue Gravity will never disclose contact information of user accounts to any third parties other than the disclosure required for public contact information on domain name registrations if the contact information on a domain name is the same as that on the user account. Blue Gravity will never willfully sell, lease, or rent any personal information about user to any third party without permission.
User acknowledges that Blue Gravity will disclose any information requested by subpoena or court order. User acknowledges that Blue Gravity will fully cooperate with and will disclose any information requested pursuant to criminal or civil investigation by any Federal government or law enforcement agency.
User acknowledges that all agreements shall be governed by and construed in accordance with the laws of the State of California. User agrees that any dispute under any agreement may only be brought in a court in Los Angeles County, California. Any provision of this Agreement which is prohibited or unenforceable in any jurisdiction shall, as to such jurisdiction, be ineffective to the extent of such prohibition or unenforceability without invalidating the remaining provisions hereof.
User agrees to indemnify, defend and hold harmless Blue Gravity and its parent, subsidiary and affiliated companies, and each of their respective officers, directors, employees, shareholders, attorneys and agents (each an "indemnified party" and, collectively, "indemnified parties") from and against any and all claims, damages, losses, liabilities, suits, actions, demands, proceedings (whether legal or administrative), and expenses including, but not limited to, reasonable attorney's fees threatened, asserted, or filed by a third party against any of the indemnified parties arising out of or relating to User's use of Blue Gravity's services, any violation by User of the AUP, any violation by User of the Web Hosting Service agreement, if applicable, any breach of any representation, warranty or covenant of User contained in this Agreement or any acts or omissions of User. The terms of this section shall survive any termination of this Agreement.
This Acceptable Use Policy ("AUP") sets forth the principles that govern the use by customers of services provided by Blue Gravity Hosting ("Blue Gravity").
Services provided by Blue Gravity can be used to host any web site, send or receive any email communication, or forward or point through the Domain Name System ("DNS") or other means to any location provided the service, content, or products offered, displayed, or transmitted do not violate the laws of the United States or the State of California, any part of this AUP, and all rules, policies, and agreements incorporated herein or incorporated by reference.
BLUE GRAVITY RESERVES THE RIGHT TO REVISE THE ACCEPTABLE USE POLICY AT ANY TIME. CUSTOMER'S CONTINUED USE OF SERVICE CONSTITUTES CONTINUED ACCEPTANCE OF THIS ACCEPTABLE USE POLICY.
The sending of unsolicited bulk email ("Spam") or aiding, in any way, the sending of unsolicited bulk email including but not limited to promoting the sale or use of software or services to facilitate the sending of bulk email using any service provided by Blue Gravity is strictly prohibited. The sending of unsolicited bulk email using or referring to an email address or web site provided by Blue Gravity or a domain name using the DNS service of Blue Gravity, regardless of whether Blue Gravity's service was used to send the email, is prohibited.
Cross-posting messages to a large number of Usenet groups, posting unsolicited advertisements to web-based bulletin boards, or posting obscene or threatening messages anywhere while using or referring to an email address or web site provided by Blue Gravity or a domain name using the DNS service of Blue Gravity is prohibited.
The use of servers provided by Blue Gravity as a mail or message drop for responses to activities described above is prohibited. Linking from a web site provided by Blue Gravity under the hosting service or a web site using a domain name that uses the DNS service of Blue Gravity to providers of the activities listed above is also prohibited.
A web site or email address provided by Blue Gravity or a web site or email address using a domain name that uses the DNS service of Blue Gravity can not to be used to distribute "cracked" versions of copyrighted software (a.k.a. warez), serial numbers for copyrighted software or copyrighted multimedia files (i.e. music files or MP3s). Linking from a web site provided by Blue Gravity or linking from a web site using a domain name that uses the DNS service of Blue Gravity to pirated software or illegal contraband or to other locations providing pirated software or illegal contraband is also prohibited.
Web sites containing adult material, adult-oriented merchandise or links to adult material or adult-oriented merchandise may only be provided to individuals that can provide proof, upon request, that he or she is over 18 years of age. Blue Gravity, at its sole discretion, will determine what constitutes adult material or adult-oriented merchandise.
Any attempt to circumvent system security, including but not limited to, trying to access another customer's files or database or trying to gain shell access to an Blue Gravity server is prohibited. Attempting to manipulate any server or another customer's content is prohibited.
System Abuse, including but not limited to, excessive server CPU use, excessive server RAM use, excessive server disk I/O, or any thing that may affect other customers is prohibited. The installation of bots, or scripts or applications shared with a web site hosted by an outside provider is not permitted. Blue Gravity, at its sole discretion, will determine what constitutes system abuse.
Disk space provided in association with the hosting service may only be used for files and content linked from or in direct support of the hosted web site. The provided disk space may not be used at any time as a location to archive or backup files not directly related to the hosted web site.
The terms "affiliate", "you", and "your" refer to, whether as an individual or entity, to you as the one applying to Blue Gravity Hosting's affiliate program. The terms "we" and "our" refer to Blue Gravity Hosting.
IMPORTANT-READ CAREFULLY: THIS AFFILIATE PROGRAM AGREEMENT IS A LEGAL AGREEMENT BETWEEN YOU AND BLUE GRAVITY HOSTING FOR PARTICIPATION IN BLUE GRAVITY HOSTING'S AFFILIATE PROGRAM AS MANAGED BY BLUE GRAVITY HOSTING'S INTERNAL PROGRAM. BY REGISTERING FOR AND PARTICIPATING IN OUR PROGRAM, YOU AGREE TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, DO NOT SIGNUP FOR OR PARTICIPATE IN THE PROGRAM. IF YOU ARE ALREADY AN BLUE GRAVITY HOSTING AFFILIATE AND DO NOT AGREE TO THE ENTIRE AFFILIATE AGREEMENT, THEN IMMEDIATELY TERMINATE ALL USES OF BLUE GRAVITY HOSTING'S MATERIALS AND ANY LINKS TO BLUE GRAVITY HOSTING'S WEBSITE.
· Promotion of any unlawful behavior or conduct.
· Any other material deemed inappropriate or offensive by Blue Gravity Hosting.
Blue Gravity Hosting reserves the right to make changes to the affiliate agreement at anytime and solely at our discretion. Continued participation in our affiliate program constitutes your agreement to any and all changes made to this agreement.
Affiliates earn $75 for every new 12 month (or greater) hosting account, $50 for every new VPS and $100 for a new dedicated server sale generated.
· Each new sale must be by a new and unique visitor to Blue Gravity Hosting.
· All web hosting sales must remain active for 30 days before credit will be given. VPS and Dedicated Server sales must remain active for 90 days before credit is given.
· Each new sale must remain in good standing. Commissions will not be credited for sales that have been cancelled, terminated, charged back, refunded, or have outstanding balances within the 30 - 90 day activation period.
All sales must originate from the affiliates unique tracking URL. The tracking URL we provide must not be altered. It is unique to each affiliate and any changes could result in inaccurate statistics generated and for commissions not to be credited for a sale. Please test your unique tracking URL each time you use it. Blue Gravity Hosting will not be responsible for, nor give credit for, sales that does not have your unique tracking URL attached to it.
Affiliate generated sales that do not meet these requirements, will not be eligible for commission credit.
Commissions are paid when affiliates reach a $75 commission balance. Commission balances that have not yet reached $75 will carry over to the next month until the $75 minimum has been reached. Commissions are processed at the end of each month and paid by check. Checks will be made payable to the "name" you provided in your affiliate account. All funds are paid in U.S. dollars.
The following restrictions apply to all affiliates. If at anytime these restrictions are not adhered to, this agreement will be terminated and any unpaid commissions will no longer be valid.
· Commissions earned through our affiliate program cannot be transferred to another user, hosting account, or Blue Gravity Hosting program.
· Affiliates cannot earn commissions on their own hosting accounts or domain registrations.
· Affiliates are prohibited in utilizing our protected keyword "Blue Gravity Hosting" or any variation, misspelling or combination of words with our keyword, in advertising and search engine sites.
· Affiliates are prohibited in making a representation, either expressed or implied, that visitors to your site are visiting Blue Gravity Hosting's site.
· Affiliates are prohibited in using spam or any other unsolicited mass email campaigns.
Blue Gravity Hosting does not express or imply any warranties or representations in respect to our affiliate program or an affiliate's potential to earn income from our affiliate program. We make no representation that either our site or that of the affiliate program will be uninterrupted or error-free and we will not be liable for any consequences of interruptions or server down time. Determination of compliance with all terms and conditions will be solely up to the discretion of Blue Gravity Hosting.
This Domain Name Registration Agreement ("Agreement") sets forth the terms and conditions of your use of Blue Gravity Hosting to register an Internet domain name and/or to transfer a domain name from another registrar to Blue Gravity Hosting. To complete the registration process, you must read and agree to be bound by all terms and conditions of this Agreement and any rules or policies that are or may be published by Blue Gravity Hosting. By submitting your registration and service request, you agree to be bound by all terms and conditions of this Agreement. You acknowledge that Blue Gravity Hosting may modify or amend this Agreement at anytime.
Blue Gravity Hosting is a reseller for an accredited registrar with the Internet Corporation for Assigned Names and Numbers ("ICANN") for Top Level Domain Names (TLDs), currently .com, .net, .org, .biz, and .info. ICANN oversees registrations and other aspects of the TLDs. As an accredited domain name registrar, Omnis Network, LLC is, upon accepting your domain name registration application, your sponsor for that application.
All domain name registrations we register for TLDs are not effective until we have delivered the domain name registration information you provide us to the registry administrator for the TLDs, as applicable, and the registry administrator puts into effect your domain name registration. Currently, the registry administrator for the .com and .net TLDs is VeriSign Global Registry Services. The registry administrator for the .info TLD is Afilias Limited ("Afilias"). The registry administrator for the .biz TLD is Neulevel.
You agree and acknowledge that Blue Gravity Hosting is not liable or responsible in any way for any errors, omissions or any other actions by the registry administrator arising out of or related to your application and receipt of, or failure to receive, a domain name registration.
You further agree to indemnify, defend and hold harmless the registry administrator and their directors, officers, employees, and agents from and against any and all claims, damages, liabilities, costs, and expenses (including any direct, indirect, incidental, special or consequential damages and reasonable legal fees and expenses) arising out of, or related to, your domain name registration.
Blue Gravity Hosting uses a user name/password protection system to identify individuals authorized to maintain domain names. This user name/password combination will be absolutely required to make any modifications and renewals to the domain name registration. This information will be emailed upon request to the email address on record for the user account associated with the domain name registration. It is the responsibility of the user to keep the contact information on record up to date. You agree and acknowledge that Blue Gravity Hosting is not liable or responsible in any way for domain name cancellations or related actions resulting from incorrect contact information.
As consideration for the domain name registration services provided by Blue Gravity Hosting, you agree to pay Blue Gravity Hosting, prior to the effectiveness of the desired domain name registration, all applicable initial registration and renewal fees. All fees are nonrefundable, in whole or in part, even if your domain name registration is suspended, cancelled or transferred prior to the end of your then current registration term. Blue Gravity Hosting reserves the right to change fees, surcharges, and renewal fees or to institute new fees at anytime, for any reason, at its sole discretion.
Your requested domain name will not be registered until Blue Gravity Hosting receives actual payment of the registration, renewal and reinstatement fees as applicable. In the event of a chargeback by a credit card company or similar action by any payment provider allowed by Blue Gravity Hosting in connection with the payment of the registration fee for your domain name registration, you agree and acknowledge that the domain name registration shall be transferred to Blue Gravity Hosting as the paying entity for that registration to the registry and that we reserve all rights regarding such domain name including, without limitation, the right to make the domain name available to other parties for purchase. We will reinstate your domain name registration solely at our discretion and subject to our receipt of the initial registration or renewal fee and any reinstatement fees we may charge.
You will be notified via email to the email address on record as the billing contact at regular intervals beginning sixty (60) days before the registered domain name expiration. Payment must be made by credit card or such other method as we may indicate in the registration application or renewal form. Should renewal fees go unpaid beyond the domain name's expiration date or within the time specified in a notice or reminder regarding renewal, your registration will be cancelled.
Cancelled registration will result in the deletion of the registered domain name from the applicable registry. Deleted domain names may enter a Redemption Grace Period status. The Redemption Grace Period provides an opportunity to restore the domain name and retain ownership. Restoration from the Redemption Grace Period may require a fee in addition to the registration and renewal fee and must be paid prior to a domain name being restored from Redemption Grace Period.
You agree and acknowledge that Blue Gravity Hosting is not liable or responsible in any way for domain name cancellations or related actions resulting from our inability to notify you of the domain name renewal because of incorrect contact information or your failure to renew a domain name registration before the expiration date for any reason.
You agree to submit to proceedings under ICANN's Uniform Domain Name Dispute Resolution Policy that is incorporated herein and made a part of this Agreement by reference. The current version of the dispute policy may be found at ICANN's website: http://www.icann.org/udrp/. This policy has been developed by ICANN and/or the specific Registration Administrator and is a required component of every registration agreement. Please take the time to familiarize yourself with this policy.
You agree to indemnify, defend, and hold harmless ICANN, Blue Gravity Hosting, Registry Administrators and their respective directors, officers, employees and agents from and against any and all claims, damages, liabilities, costs and expenses, including reasonable legal fees and expenses arising out of or related to your domain name registration and any disputes regarding same.
You acknowledge that the domain name system and the practice of registering and administering domain names are evolving and, therefore, you agree that Blue Gravity Hosting may modify this Agreement and the Dispute Policy if necessary to comply with its ICANN Agreement, and any other Agreements that Blue Gravity Hosting is currently bound by or will be bound by in the future, as well as to adjust to changing business circumstances. Such modifications will be at the sole discretion of Blue Gravity Hosting. Your continued use of the domain name registered to you shall constitute your acceptance of this Agreement and the Dispute Policy with the new modifications. If you do not agree to any of such changes, you may request that your domain name registration be cancelled or transferred to a different domain name registrar. You agree that such cancellation or request for transfer will be your exclusive remedy if you do not wish to abide by any changes to this Agreement or the Dispute Policy.
You agree to submit all contact information requested during the domain name registration process. Blue Gravity Hosting's agreement with ICANN and the registry administrators, requires the collection of this contact information. You further agree to immediately validate and update the registration information for the domain name during the registration term of the domain name when changes are made or upon notification from Blue Gravity Hosting to do so. Willful provision of inaccurate or unreliable information, failure to update registration information or respond within fifteen (15) calendar days to a request to validate registration information shall constitute a breach of this Agreement and will result in the cancellation or suspension of the domain name registration.
You agree and acknowledge that Blue Gravity Hosting will make available domain name registration information you provide or that we otherwise maintain to ICANN, to the registry administrators, and to other third parties as ICANN and applicable laws may require. You further agree and acknowledge that Blue Gravity Hosting may make publicly available, or directly available to third party vendors, some, or all, of the domain name registration information you provide, for purposes of inspection (such as through our WHOIS service) or for targeted marketing and other purposes as required or permitted by ICANN and applicable laws.
When registering a domain name under the .info TLD, you consent to the use, copying, distribution, publication, modification, and other processing of registration information you provide by Afilias and it designees and agents in a manner consistent with the purposes specified pursuant in its contract.
Blue Gravity Hosting will not process data about any identified or identifiable natural person that we obtain from you in a way incompatible with the purposes and other limitations that we describe in this Agreement. Blue Gravity Hosting will take reasonable precautions to protect the information it obtains from you from our loss, misuse, unauthorized access or disclosure, alteration or destruction of that information.
You agree that, if you are registering a domain name for someone else, you represent that you have the authority to nonetheless bind that person as a principal to all terms and conditions provided herein, including the Dispute Policy.
You further agree that you will furnish the requested information to identify the appropriate person as domain owner.
You agree that if you license the use of the domain name registered to you to a third party, you nonetheless remain the domain name holder of record and remain responsible for all obligations under this Agreement including, but not limited to, payment obligations and providing and updating, as necessary, both your own full contact information and accurate technical, billing, and zone contact information adequate to facilitate timely resolution of any problems that arise in connection with the domain name and domain name registration.
Blue Gravity Hosting, at its sole discretion, reserves the right to refuse to register your domain name or to enroll you in any services. In the event Blue Gravity Hosting does not register your domain name or enroll you in any services, no fees applicable to the rejected services will be collected. Furthermore, Blue Gravity Hosting, at its sole discretion, reserves the right to delete or suspend your domain name registration or cancel access to any services at any time if the domain name is used in any manner in unsolicited email (spam), if the domain name is used in any activity prohibited by United States law or if the domain name is used in any activity deemed unacceptable by Blue Gravity Hosting. After five (5) calendar days all applicable fees associated with deleted or cancelled registrations or services are non-refundable.
You agree that the registration of your domain name is subject to suspension, cancellation, or transfer pursuant to any ICANN adopted specification or policy, or pursuant to any registrar or registry procedure not inconsistent with an ICANN adopted specification or policy to correct mistakes by Blue Gravity Hosting or a registry administrator in registering the domain name or for the resolution of disputes concerning the registered domain name.
You agree that Blue Gravity Hosting shall not be liable to you for loss or damages that may result from our refusal to register your domain name or enroll you in any service, the suspension of your domain name registration or service or the deletion or cancellation of your registered domain name or service.
You agree that you will be prohibited from changing the registrar of your domain name for sixty (60) calendar days following the initial registration of the domain name with Blue Gravity Hosting. Beginning on the sixty-first (61st) calendar day following initial registration, Blue Gravity Hosting will notify the owner of the Omnis Network user account responsible for the domain name in question via the email address on file whenever we receive a request to transfer the domain to another registrar. The user may then access the Account Manager to authorize or deny the transfer. If a rejection or authorization is not explicitly provided via the Account Manager within five (5) days of the initial request, the request to change registrars will be automatically granted by the registry. Your request to change registrars may be denied in situations described in the Dispute Policy, your pending bankruptcy, a dispute over the identity of the domain name holder, and default in the payment of any fees due.
Although Blue Gravity Hosting will accept changes to domain name contact and name server information through the Domain Name Control Panel, Blue Gravity Hosting's record of the domain "owner" can only be changed via the following procedure. To transfer ownership of the domain to another party, the customer must pay all outstanding registration fees and submit through the Domain Name Control Panel the applicable form that describes the intent to relinquish ownership of the domain to a specific party. The new domain owner, who must be the specific party designated by the old domain owner, must then follow the online procedures for obtaining ownership of the previously relinquished domain name. The new domain owner must also pay a transfer of registration fee.
You represent and warrant that all information provided by you in connection with your registration is complete and accurate. Furthermore, you represent and warrant that the domain name registration or the manner in which it is directly or indirectly used will not infringe the legal rights of any third party and will not violate United States law.
Blue Gravity Hosting makes no representation or warranties of any kind in connection with this Agreement. Blue Gravity Hosting does not represent or warrant that registration of your domain name will immunize you from challenges to your domain name.
This agreement shall be governed by the laws of the United States of America and the State of California. For the adjudication of disputes concerning or arising from use of the domain name registered with Blue Gravity Hosting, you shall submit, without prejudice to other potentially applicable jurisdictions, to the jurisdiction of the courts of your home or business and where Blue Gravity Hosting is located.
YOU AGREE THAT BLUE GRAVITY HOSTING WILL NOT BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY LOSS THAT MAY OCCUR DUE TO (A) ANY LOSS OF REGISTRATION OF A DOMAIN NAME, (B) THE USE OF YOUR DOMAIN NAME, (C) ACCESS DELAYS OR ACCESS INTERRUPTIONS TO BLUE GRAVITY HOSTING'S REGISTRATION SYSTEM, (D) THE NON-DELIVERY OR MISDELIVERY OF DATA BETWEEN YOU AND BLUE GRAVITY HOSTING, (E) EVENTS BEYOND BLUE GRAVITY HOSTING'S REASONABLE CONTROL, (F) THE PROCESSING OF YOUR APPLICATION, (G) THE PROCESSING OF ANY MODIFICATION TO THE RECORD ASSOCIATED WITH YOUR DOMAIN NAME, (H) THE FAILURE OF YOU OR YOUR AGENT TO PAY ANY FEES HEREUNDER, OR (I) THE APPLICATION OF THE DISPUTE POLICY. FURTHER, BLUE GRAVITY HOSTING WILL NOT BE LIABLE FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND (INCLUDING LOST PROFITS) REGARDLESS OF THE FORM OF ACTION, WHETHER IN CONTRACT, TORT (INCLUDING NEGLIGENCE), OR OTHERWISE, EVEN IF BLUE GRAVITY HOSTING HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOU AGREE THAT BLUE GRAVITY HOSTING'S ENTIRE LIABILITY, AND YOUR EXCLUSIVE REMEDY, WITH RESPECT TO ANY SERVICES PROVIDED BY BLUE GRAVITY HOSTING UNDER THIS AGREEMENT AND ANY BREACH OF THIS AGREEMENT IS SOLELY LIMITED TO THE AMOUNT YOU PAID FOR SUCH SERVICES. IN NO EVENT SHALL BLUE GRAVITY HOSTING'S MAXIMUM AGGREGATE LIABILITY EXCEED THE TOTAL AMOUNT PAID BY YOU FOR INITIAL REGISTRATION OF THE DOMAIN NAME AND ANY RENEWALS THEREOF IN THE PAST THREE YEARS. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, IN SUCH STATES, OUR LIABILITY IS LIMITED TO THE EXTENT PERMITTED BY LAW.
This Web Hosting Service Agreement ("Agreement") defines the terms under which Blue Gravity Hosting provides web hosting service ("Service"). This Agreement is a binding contract between Blue Gravity Hosting ("Blue Gravity") and the individual or company ("Customer") defined on the order form when an order for service is submitted.
BY COMPLETING AN ORDER FOR SERVICE, CUSTOMER AGREES TO BE BOUND BY THE TERMS OF THIS AGREEMENT, OUR ACCEPTABLE USE POLICY ("AUP"), AND ALL AGREEMENTS, RULES AND POLICIES INCORPORATED HEREIN OR INCORPORATED BY REFERENCE. BLUE GRAVITY RESERVES THE RIGHT TO REVISE THIS AGREEMENT AT ANY TIME. CUSTOMER'S CONTINUED USE OF SERVICE CONSTITUTES CONTINUED ACCEPTANCE OF THIS AGREEMENT.
The term of service is determined by Customer's selection on the order form during the order process or by Customer's request to Blue Gravity's Customer Service Department ("Customer Service") to change to a different currently offered term. The term shall begin upon the processing of Customer's order, which may not necessarily coincide with the commencement of service, or upon completion of requested changes by Customer Service.
Upon completion of the term, Customer acknowledges and agrees that the term will renew automatically for successive terms of length equal to the prior term.
Blue Gravity may refuse to accept an order for service at its sole and exclusive discretion. Blue Gravity provides no guarantee or assurance to the time in which a new order will be processed. Any fees charged to Customer for an order that was refused will be returned in full.
Customer authorizes Blue Gravity to automatically bill and charge the credit card provided, if applicable, for each term unless service is terminated or cancelled by either party prior to the term's expiration. Customer acknowledges if using a payment method other than credit card, payment must be received prior to term's expiration to ensure uninterrupted service. Blue Gravity may, at its sole discretion, suspend or terminate service without notice if Customer fails to provide payment for the new term.
If Customer initiates a chargeback with the provider of a credit card or initiates a similar action to a payment provider allowed by Blue Gravity for charges billed by Blue Gravity for service, service will be immediately cancelled without notice. Reestablishment of service following a chargeback or similar action will require sufficient explanation for the action and payment of the disputed charge and Blue Gravity's bank dispute fee. Blue Gravity, at its sole discretion, will determine whether any explanation provided for a chargeback or similar action is sufficient.
Blue Gravity may offer a money back guarantee for select new hosting service. If a money back guarantee is available for service, Customer must request cancellation of service within the time frame permitted by the guarantee and refund must be explicitly requested. If cancelling service in accordance with a Money Back Guarantee, any promotions received in combination with the service will not be fulfilled.This includes but is not limited to any domain name registration provided free of charge with hosting service. If cancelling an account in accordance with a Money Back Guarantee, the refund applicable will be reduced by any discounted or rebated domain name registration fees. If necessary to recoup the discount or rebate provided for a domain name registation, the credit card provided for the service may be charged.
Blue Gravity reserves the right to cancel service at any time without notice and without refund upon breech of any Agreement, violation of our Acceptable Use Policy, or violation of any rule or policy.
Customer can voluntarily cancel service at any time by contacting Customer Service. Customer agrees that authorization information in the form of the user account username and password or the current active billing credit card number must be provided for a cancellation request to be processed. Cancellation requests without proper authorization will not be processed. Blue Gravity is not responsible for charges billed to Customer following a cancellation request received without proper authorization.
Customer acknowledges, upon cancellation of service, that content including but not limited to web site files, database data, and email stored under space allocated for Customer's service may be deleted at any time following cancellation.
Customer agrees, upon cancellation of service, that Blue Gravity will not automatically refund any service fees. Customer must request a refund for any unused service fees by contacting Customer Service. Upon request, a prorated refund for the unused term will be issued through the same method with which the service fee was collected.
An Acceptable Use Policy ("AUP") is in effect for hosting service. Any violation of the AUP may result in the immediate cancellation or suspension of any or all service without warning.
Customer acknowledges that the real-time resources allocated for hosting service are dynamically allocated based on the amount of overall resources used by Customer. Real-time resources include but are not limited to bandwidth, MySQL connections, email connections, web server CPU, and web server RAM. Real-time resources may be affected by things such as, but not limited to, bandwidth and disk space used, the number or size of configured email accounts, the number of web sites configured under hosting service, or the number of or activity on connections to MySQL databases.
Blue Gravity uses Network-attached storage devices to store Customer's files. The nature of this type of storage requires that Blue Gravity limit the number of files Customer can store with the hosting service to prevent exhaustion of the total number of files permitted on the storage device. This limit is 81920 files. Customer acknowldeges that this limit exists for all hosting service and can not be adjusted.
The hosting service provided to Customer includes email service. Customer acknowledges that email is not an instant message service and email delivery may be delayed by many factors beyond Blue Gravity's control.
Blue Gravity employs various techniques to hamper unsolicited email and virus dissemination through email. Customer acknowledges that some of the techniques may prevent receipt of email from some senders. Blue Gravity can assist in determining the cause of the failure but it is the sender's responsibility to resolve the condition that caused the failure. Customer agrees that Blue Gravity is not responsible and will not be liable for any outcome related to the failure to receive an email.
Email accounts provided by Blue Gravity may not be used for permanent archival of email messages. Blue Gravity may, at its sole discretion, suspend an email account if the email account's disk usage is abusive or grossly exceeds the normal usage of other customers or detrimentally affects the service of other customers in any way.
Email accounts have a per mailbox limit of 2 gigabytes and 10,000 email messages, whichever comes first. Once that limit is reached, messages destined for the affected mailbox will be refused by inbound mail systems using industry standard methods.
Email messages stored in folders of an email account meant to hold deleted messages or messages marked as spam will be purged. Messages older than 7 days in folders meant to hold deleted messages will be deleted. The folders defined by Blue Gravity to be intended to hold deleted message are 'Trash' and 'Deleted Items'. Messages older than 14 days in folders meant to hold messages marked as spam will be deleted. The folder defined by Blue Gravity to be intended to hold messages marked as spam is 'Spam'.
Customer acknowledges that email accounts left dormant will be removed. Blue Gravity considers an email account dormant that has not been accessed for a period of 6 months following prior usage or that has never been accessed for a period of 90 days since creation. Customer agrees that when an email account left dormant is removed the email stored in association with the dormant email account will be deleted. Customer agrees that Blue Gravity is not responsible and will not be liable for any content lost when a dormant email accounts is removed.
Blue Gravity acknowledges that the data stored in support of hosting service, including but not limited to web site files, email messages, web site logs, and database content, is confidential. Blue Gravity will never willfully access, review, or disseminate stored data unless necessary to provide customer service and troubleshooting, in reviewing for policy compliance, when administering hosting services, or in response to a subpoena, search warrant, or court order.
Blue Gravity uses industry standard practices to protect stored files, email messages, web site logs, database content and any other data stored for support of a hosting account. Blue Gravity makes no guarantee to the security of applications installed by Customer including but not limited to third party applications installed through the Account Manager. Customer acknowledges they are solely responsible for the security of all applications installed by Customer even if the installation was facilitated through the Account Manager.
Customer acknowledges that the Internet is a volatile environment and Blue Gravity is not liable for confidential information stored by applications installed by the Customer. Customer must take all appropriate precautions to secure confidential or sensitive information including encrypting if Customer deems necessary. Customer acknowledges they are solely responsible for ensuring the security of stored data and agrees that Blue Gravity is not liable for release of stored data.
Blue Gravity provides the option for Customer to enable and use tools to generate web site statistics for a hosted web site. The web site statistics will be generated automatically based on the web server activity associated with the hosting service. Blue Gravity makes every attempt but does not guarantee to provide web site statistics on a daily basis. Customer acknowledges that the analysis of web site statistics is a system intensive process and the analysis may occasionally run behind. Customer agrees to hold Blue Gravity harmless against claims related to delayed web site statistics analysis.
Blue Gravity provides the option for Customer to be provided with raw log files containing the web server activity associated with a hosted web site. Log files will be written periodically to a directory unique to each hosted web site. Blue Gravity makes every attempt but does not guarantee to provide log files on a daily basis. Customer acknowledges that the creation of the log files may occasionally run behind schedule. Customer agrees to hold Blue Gravity harmless against claims related to delayed access to log files.
To preserve disk resources, logs files will be deleted on a periodic basis. Customer is solely responsible for obtaining the log files prior to deletion. Blue Gravity is not liable for logs files not retrieved by Customer prior to periodic deletion.
Customer acknowledges that web site construction and management is Customer's responsibility. Blue Gravity is not responsible for web site management or files lost or damaged by Customer. Blue Gravity recommends that Customer maintain backups of content outside of space associated with hosting service.
Blue Gravity maintains system backups that are intended only to recover from system failure. The system backups are not intended for restoration of files to individual sites. A fee of $100.00 may be charged should Customer require any files from system backups. Blue Gravity does not guarantee that the files contained in the system backup are the most recent copies for a given site. System backups are available for at most 6 days.
Blue Gravity fully complies with U.S.C. Title 18 � 2257. Blue Gravity does not produce, publish, buy, or sell any adult-oriented content. Blue Gravity does not hire, provide contract to, manage, nor otherwise arrange in any capacity for performers engaging in the production or publication of adult-oriented cotent. Blue Gravity is an Internet web hosting service provider that does not select or alter the hosted web site content in any way and is therefore exempt from the provisions of U.S.C. Title 18 � 2257.
All systems copyright Blue Gravity Hosting 2019. All rights reserved. | 2019-04-23T14:55:40Z | https://www.bluegravityhosting.com/policies/ |
Here's my piece defending New Year's Eve from today's Daily Express.
Can anyone guess who the old misery guts was who wrote 'I am proud that I hate New Year's Eve'- and who assures us he'll be tucked in his bed by 10.30pm tonight?. Here's a clue- he also hates Christmas Day- but does get pleasure from cheering on illegal wars of aggression, (from a safe distance of course).
Yes, it’s that time of the year again when gloomy and misanthropic social commentators dip their pens in acid and explain why they just can’t stand New Year’s Eve. Here’s one in suitably wrist-slitting mood. “To me, there is always an element of sorrow and pity involved, possibly at the idea of a load of idiots celebrating another year wasted, another load of opportunities passed by, another year of life gone”. Another writes: 'I am proud that I hate New Year’s Eve. Every year it serves up the same combination of discomfort, expense and misery…it is quite beyond me how any sentient human being could actually enjoy it’. The author of these words, who claims that his ‘proudest moment’ was going to bed at 10.30pm on December 31st 1999, and who assures us he will be doing the same this year, would no doubt heartily concur with the sentiments expressed in Woody Allen’s 1987 film Radio Days that ‘only creeps and crazy people go out on New Year’s Eve’. Expressing a hatred of New Year’s Eve and everything it stands for seems to have become fashionable in recent years-and there are no doubt millions of Britons who tonight will be long before Big Ben rings in 2006. I, however, will not be one of them. The saying ‘Youth is when you’re allowed to stay up on New Year’s Eve, middle aged is when you’re forced to‘- may hold true for some- but for me- New Year’s Eve is simply the most wonderful night of the year. I have loved New Year‘s Eve ever since, as a seven-year-old, I was allowed to stay up to watch Big Ben chime on television. More than thirty years later, I am just as excited about the coming of this most unique of evenings as I was then. In common with thousands of other ‘creeps and crazy people’, my wife and I will be spending tonight, not in bed with mugs of Horlicks, or in our living room watching Jools Holland and Natasha Kaplinsky usher in 2006 on t.v.- but celebrating New Year’s Eve in the best possible way: in the company of other members of the human race. The idea of celebrating with people you have never met before in your life-is repugnant to our misanthropic New Year’s Eve haters but the genuine camaraderie the night engenders is for me its great attraction. On 31st December 1999, while the gloom-mongers were tucked away in his bed, my wife and I were at a party in an ex-servicemen’s club in central London. Having enjoyed a few dances with the other couples and families present, we started talking with a family group at an adjoining tabel, who on hearing that our son was away in Hungary, insisted on giving us money to phone him to wish him a happy New Year we didn’t own a mobile then). As midnight approached, we made our way across to Trafalgar Square to see Big Ben chime in the millenium and to enjoy twenty minutes of greeting, kissing, and embracing total strangers. The atmosphere in central London that night was quite remarkable and the memories of it will remain with my wife and I for as long as we live. It’s true that for some, the coming of New Year’s Eve is a genuine cause of sadness. The loss of a loved one in the year which is just about to pass is heightened at the very moment the calendar changes. We all know, too, that calls to the Samaritans increase around Christmas and New Year’s Eve and that anyone who is in a bad way is going to feel worse if everyone else in the world appears to be enjoying themselves. Melancholic as the passing of the old year may be, there is every reason to accentuate the positive on New Year’s Eve. However disappointing 2005 was, here’s the perfect opportunity to start afresh. And if 2005 was a good one, let’s try to make the next year, even better. The New Year’s Eve Haters say that it’s all so arbitrary- why should one pay more attention to midnight on the 31st December than 3.47am on 15th April? What utter nonsense! New Year’s Eve denial is a sad business and the pretence that it is ‘just another night’ masks the fact that New Year spooks an awful lot of people. It forces us to take stock, to look back at the year just gone, to think about where we’re going and what we can do to make things better. Could it be that it is this process of self-analysis which the hater really wants to avoid?Whether its taking more exercise, not drinking so much, not being so grumpy in the mornings, or remembering Auntie Maud’s birthday, is there anyone who can say, in all honesty, that there is no aspect of their livesor their behaviour, which they could not improve? But before we can overcome our failings, we must first own up to them, which is why // making New Year‘s resolutions is a good idea. Even if we only keep a couple on our list -the important thing is that we at least have sat down to think about ourselves and our lives in an objective and critical manner. New Year’s Eve may indeed mark the end of one chapter but it also marks the start of another. T.S. Eliot put it beautifully: ‘For last year‘s words belong to last year‘s language/And next year‘s words await another voice/And to make an end is to make a beginning’. Far from being a night on which to take to our beds early, the passing of the old Year- and the coming of the new- really is cause for celebration.
Here's my review on the books 'Neo-Conservatism and Why We Need It' by Douglas Murray and 'Anti-Totalitarianism: the left-wing case for a Neo-Conservative foreign policy' by Oliver Kamm from today's Daily Telegraph.
Did neo-conservatism meet its end in 2005? The collapse of the levees in New Orleans and its exposure of President Bush's policy of paying for wars of intervention abroad, by cutting back on public provision back home, led many thinkers to believe that it had. Douglas Murray and Oliver Kamm are not among them. For these two young British writers, neo-conservatism is not only still alive and kicking- its finest hour is yet to come. Murray, described by historian Andrew Roberts as 'the Right's answer to Michael Moore', believes that the creed of Leo Strauss, Paul Wolfowitz and Irving Kristol should not only be the ideology of a rejuvenated Conservative Party, but of 'any political party committed to the ideals of freedom at home and abroad'. For Murray, neo-conservatism can provide the 'moral and practical answers' to the political and societal malaise of our country. As to the extent of that malaise there can be no dispute: Britain has the highest level of violent crime, drug abuse, teenage pregnancies and one parent families in Europe. But would the neo-con domestic agenda which Murray advocates make things any better? His attacks on welfare dependency, the glorification of misanthropic rap culture and other examples of multicultural idiocy are justified, and his call for 'broken windows' policing, an increase in church schools and for the state to withdraw from its life-long support of single mothers makes plenty of sense. Yet on what is arguably the main cause of 'societal defects' in Britain today- the pernicious effect of uncontrolled consumer capitalism, Murray is strangely silent. The problem for Murray is that economic liberalism -which he likes- fuels social liberalism which he doesn't. If we really want to see happy families promenading together again on Sunday afternoons, we need to erect “Keep Out” signs to stop the encroachment of market forces into areas they have no right to go. This is something which Murray, in his enthusiasm for a low-tax, deregulated economy, is unwilling to do. And when it comes to our political malaise- most visibly demonstrated by our leaders' failure to tell us the truth over Iraq- Murray once again falls short. Murray would have us believe that the government really did think Iraq possessed WMDs, and incredibly castigates Blair, Campbell and co for 'telling the public too much'. But if our leaders did think Iraq possessed the stockpile of chemical and biological weapons the various dossiers claimed- why on earth would they do the one thing which would provoke Saddam to use them? History tells us that countries attack others only when they are sure of their opponent's relative weakness- something one might have expected Murray to have learnt during his years at Oxford. In trying to put the case for “Left-wing” case for war against Iraq, Oliver Kamm is equally unconvincing. Having told us how the principle of deterrence worked so well during the Cold War, he fails to explain adequately why the deterrence of Saddam, which Secretary of State Powell had been lauding only months before 9/11, could not have continued. Kamm has fun baiting the woolly minded peace activists of the 1930s, and the supporters of unilateral nuclear disarmament in the 1980s, but is on much shakier ground when trying to portray those who opposed the invasion of secular, Ba’athist Iraq as apologists for Islamo-fascism. In fact, it is the neo-cons themselves who have a track record of siding with Islamic extremists- either in Afghanistan in the 1980s or in the Balkans a decade later. Similarly, while lambasting the “amoral quietism” of the Major government for its non-intervention policy in Bosnia, Kamm fails to inform readers that the Bosnian leader Alija Izetbegovic- whose separatist cause neo-conservatives enthusiastically championed- not only wrote “the first and most important lesson from the Koran is the impossibility of any connection between Islamic and non-Islamic systems”, but also recruited for an SS division in the Second World War. It is difficult to think of a man for whom the term “Islamo-fascist” could be more appropriate - yet that didn't stop arch the neo-con Richard Perle acting as an adviser to Izetbegovic's delegation at the Dayton Peace Conference in 1995. On the issue of terrorism, there are double standards too. Terrorists, according to Murray and Kamm, should be always be condemned wherever they are found- but not it seems if they are the gun-runners, drug-smugglers and civilian-murderers of the Kosovan Liberation Army, on whose side NATO acted, with strong neo-cons approval- as an armed proxy in the war against Yugoslavia in 1999. And amid all their words of praise for Israel, there is nothing from either Murray or Kamm on the role that Zionist terrorism played in that state's foundation. If neo-cons really want us to take their ideas more seriously, a little more consistency- and honesty- is surely called for.
Before we all settle down to watch Scrooge- let's hope that all the self-serving politicians- the warmongers and those journalists who peddle their lies- are visited tonight by the ghosts of Christmas Past, Christmas Present and Christmas Yet to Come. And that we wake up tomorrow to read that George Bush and Tony Blair publicly acknowledge their lies over Iraq, that Harry's Place has decided to advocate a left-right anti-war alliance and that Stephen Pollard has joined the campaign to release Slobodan Milosevic.
'At least he died enjoying what he did best' -the words of trainer Philip Hobbs on his Champion Hurdle winner Rooster Booster, who collapsed and died while exercising on the gallops.
Am I the only one to feel that on this occasion the oft-repeated words we hear on a racehorse's death somehow have a hollow ring to them? Those of us who defend horse-racing against its many critics don't have our job made any easier by the decision to keep in training a former Champion Hurdler- a horse who had achieved all there was to achieve- up to just days away from his 12th birthday. Amid the tributes to a wonderful horse we should not shy away from asking some awkward questions.
Here's my piece on the merits of cigar clubs from The First Post. These clubs, which are widespread in Europe and the US- but sadly not in Britain- don't have to be exclusive- membership of La Cape D'Epicure is not much more than £100 a year.
France has over 70, Switzerland has 20 and in Berlin there are two for women alone. Yet London, home to eight million people, has none.
While anti-smoking campaigners will no doubt be rejoicing that Britain has missed out on the cigar club culture sweeping Europe and the US, there is, I believe, a good reason to hope that cigar clubs will eventually spring up here too.
The point about these clubs is not so much the smoking, but their underlying philosophy. "Networking" and the exchange of business cards may sometimes play a part, but it is the spirit of epicureanism which predominates. Nowhere more so than at La Cape D'Epicure, a club for les amateurs de cigares, based in northern France.
its members meet not only to smoke and compare notes on cigars, but to enjoy the pleasures of friendship, conversation and good food.
Sadly, the spirit behind La Cape seems to be woefully lacking in modern Britain. Although Epicurus taught that "pleasure is the beginning and end of a happy life", he also emphasised moderation in all things, for the simple reason that excess leads to pain instead of pleasure.
Anyone doubting how far Britain is away from the Greek philosopher's ideal only needs to spend a night out in any of our towns and cities. Binge drinking, and the manic shrieking and undercurrent of violence which usually accompanies it, are not the signs of a society that knows how to enjoy itself - quite the opposite.
Cigar clubs, by contrast, represent cultures that still understand that having a good time does not mean indulging in excess but calmly savouring the things which really make us happy.
Where have all the chickhawks gone?
One week after I issued my challenge to seven prominent pro-war writers and the bloggers at Harry's Place to enlist in the Territorial Army, I have had my first reply, from Mr David Aaronovitch.
Come on you others!- please explain why you will not be answering the T.A.'s call for more recruits.
Here's a great piece on the important of a good night's sleep from today's First Post by William Leith.
For anyone who doubts the thesis, I have just two words: Margaret Thatcher.
I know what you're thinking, because I'm thinking the same thing, too. I'll set the alarm an hour early. Six hours sleep - possibly six and a half, if I can get off immediately - should just about do it. That way, I'll be able to finish everything tonight. I pick up the alarm clock and wind the nasty stumpy little hand a few degrees backwards. And then I lie there for a few seconds, feeling smug.
More and more of us are doing this. We have to work harder, and stay later, and the rush hour is longer. And everybody's solution is the same: reach for the alarm clock. Take the extra hour from the unconscious part of our lives. And of course, it's a vicious circle - when one person works a 10-hour day, everybody else must work a 10-hour day, too, just to keep up. And then the first person winds the stumpy little hand a smidgen further.
So you get more tired. So you drink more coffee. So what's the problem?
Actually, the problem is huge, and extremely sinister. Sleep is not just a chunk of time that you can't remember. It's amazingly complex. Left to sleep naturally, you would typically have five distinct dream sequences, the final one acting as a summing-up of the whole narrative. And dreams, as we know, counteract depression - they wash our minds clean, if you like, of negative feelings.
So that last hour of sleep is the most important bit. It's what keeps us human. It's the bit that keeps you calm when you get stuck in traffic.
If you're thinking of activating that nasty little thing on your bedside table, do us all a favour - don't go there.
They really are quite insatiable. Not content to have hijacked our two main parties- pro-war neo-liberals now want the Liberal Democrats to fall into line. The neo-conservative induced smearing of Charles Kennedy has nothing to do with Kennedy's perceived failings- but the fact that Kennedy stood at the last election on a programme of opposition to the Iraq war, renationalisation of the railways and higher taxes for the wealthy. The pro-war neo-liberals can never forgive him for that- and now want 'regime change' within the Liberal Democrats too. Stephen Pollard in particular seems to be obsessed with the removal of Kennedy- see his piece in yesterday's Daily Mail and in today's Times. Pro-war neo-liberals like Pollard purport to be great believers in 'democracy'- but what they really want is our three main political parties to be saying the same thing on the economy and foreign policy. What kind of democracy is that?
Another year, and still no call from Sue Lawley.
As it's Christmas, time for a little self-indulgence. Here's the twelve records I would take with me to the desert island (I know you're only allowed eight, but it's Christmas!).
Below is my selection ( in no particular order).
What about yours? The Exile, Holocaust Child, Bob, and all our other regular readers-I'd like to hear from you!
The Territorial Army announced today it needs another 7000 volunteer recruits to stem the flow of people leaving the organisation (currently running at 600 a month). The T.A. denies that the Iraq war is having an effect, but it's hard to believe otherwise.
To bolster the numbers of Britain's reservists, I would like to make an open challenge.
ps the challenge is open to Melanie Phillips and Andrew Roberts too.
I wonder how many British readers watched the first episode of BBC2's new series 'The Oligarchs', last night? The sight of robber baron Boris Berezovsky strolling around Riga with Neil Bush, brother of the U.S. President will have shocked many. But the links between Russia's oligarchs and Washington's neo-conservatives go back a long way. Here's a piece I wrote for the NS in 2003 on the unholy alliance between the oligarchs, the neo-cons and Israel's Likud party.
It is well documented that a cabal of Likud-supporting American neoconservatives played an important role in bringing about this year's illegal war against Iraq. What is less well known is the link the group has with the billionaire oligarchs in Russia and how theyare trying to use the arrest of Mikhail Khodorkovsky to harden USpolicy towards Moscow. Richard Perle's gang of regime-changers andadvocates of total war are taking advantage of their disproportionate influence in the western media to portray the arrest of the billionaire businessman as a major international scandal and evidence thatVladimir Putin, a man whose elevation to power they largely welcomedthree years ago, is now the new Stalin. Perle's interest in Russiagoes back a long way. As for most Likudniks of his generation, the Soviet Union was the "evil empire" - not so much for its clampdowns on western-style freedoms, but for the support it gave to secular Arab regimes and its sponsorship of Palestinian liberation movements. Perle helped draft the 1974 Jackson-Vanik amendment which, to the chagrinof supporters of detente, made US-Soviet trade deals dependent onthe Soviets facilitating Jewish emigration. In the 20 years that followed, more than a million Russian Jews left for Israel, boostingthe electoral prospects of Likud and the far right. This also produced new settlements in the occupied territories, which did much to provoketoday's troubles.
The eventual disintegration of the Soviet Union and the shock therapyof Russia's road to a "market" economy were widely welcomed by Perle and his supporters, even though this led to the impoverishment ofswathes of the population. With the rapid transition to capitalism came the emergence of the oligarchs - seven businessmen who usedtheir connections with the corrupt Yeltsin administration to seize valuable state assets at knockdown prices. In the oligarchs, Perleand his fellow hawks saw a way in which the US and Israel could, by proxy, gain political and economic power in Russia and, by doing so,eventually gain control of enormous energy resources.
But seven years on from the heady days of 1996, when the intervention of the oligarchs and their backers in the west guaranteed re-electionfor the "reformer" Boris Yeltsin, things have gone very wrong. BorisBerezovsky, the "Godfather of the Kremlin", and his fellow oligarchVladimir Gusinsky are both in exile. Earlier this year, Russia'sstubborn holding of its line on Iraq infuriated the neoconservativesand increased their determination to work towards regime change atthe next presidential elections in 2004 - and to accelerate theirplans to secure Russia's energy resources.
Before his arrest, Khodorkovsky had been in talks with US oil companies over a merger with Yukos. Now, with their man in Moscow behind bars,it is time for the neoconservative propaganda war against Putin to go into overdrive. Perle was first out of the blocks, calling for Russia's expulsion from the G8 and its exclusion from any postwarIraq oil contracts, and accusing it of collusion with Iran's nuclearpower programme.
Bruce P Jackson - like Perle a member of the Project for the NewAmerican Century and president of the hawkish Project on Transitional Democracies - used his column in the Washington Post to arguethat Putin had established a "de facto cold war administration inMoscow" and that the Russian president's actions were motivated by anti-Semitism (a claim echoed by Ariel Sharon). "In dollar terms weare witnessing the largest illegal appropriation of Jewish property since the Nazi seizures during the 1930s."
For Jackson, Putin is not just a new tsar and a new Stalin, but a newHitler, too. In Britain, the Daily Telegraph, a paper not known forhanding its comment pages to refugees wanted for criminal activities in their own country, did just that. Boris Berezovsky condemned the"increasing totalitarianism" of the Putin regime.
In the unrelenting pro-Khodorkovsky, anti-Putin propaganda we have beensubjected to, much has been made of the oligarchs' role in buildingRussian "democracy" - as opposed to the crude attempts of the Russianpresident to shunt his country back to the days of Peter the Great. Butthe "democracy" that Berezovsky and Khodorkovsky stand for is the"democracy" of an elite of billionaire businessmen to buy themselves not just political power, but immunity from the laws of the land.
"We hired First Deputy Chubais," Berezovsky boasted in 1997. "Weinvested huge sums of money. We guaranteed Yeltsin's re-election. Now we have the right to occupy government posts and use the fruits ofour victory."
True democracy in Russia would mean not only the return of propertyheld by the oligarchs to their rightful owners - the Russian people -but the formation of a government that puts the needs and interestsof Russia first, rather than those of the US or Israel.
For all their lip-service to the democratic ideal, that is the last thing Richard Perle, the oligarchs and their supporters in the west really want.
believe that 'Islam will dominate the world' and are trying to make it so.
-and, if they get the chance, recruit for divisions of the SS in the Balkans in the 1940s.
ps the answer is not a or b.
Here's my piece from today's Times on why the last thing we want is more consensus politics. We already have far too much!
DAVID CAMERON says he wants an end to “Punch and Judy politics”. But the problem is not that we have too much Punch and Judy politics, but that we don’t have anywhere near enough.
On the biggest issues of the day — from Iraq to globalisation, from law and order to our economic system — both HM Government and HM Opposition have, for the past few years, been singing from the same hymn sheet. And it is this mind-numbing, anti-democratic consensus that is alienating voters; not that there are too many verbal brickbats at PMQs.
It wasn’t always like this. As recently as 1983, voters could still enjoy thrilling Punch and Judy politics and the cut-and-thrust of a real ideological debate. The choice was between the undiluted socialism of Michael Foot’s Labour, with its pledges to remove nuclear missiles from British soil and pull out of the EEC, and the full-blooded neo-liberalism of Margaret Thatcher’s Conservatives. During the campaign Denis Healey (a wonderful Mr Punch if ever there was one) accused Mrs Thatcher of “glorying in slaughter”; Mr Foot accused Lord Hailsham of “licking Hitler’s jackboots” and Kenny Everett called for Mr Foot’s stick to be kicked away.
The result of the rudest and most knockabout election since 1945 was a turnout of 72 per cent. Contrast that with the last two general elections, in which only 60 per cent voted in sleep-inducing contests between a pro-war, pro-privatisation government and a pro-war, pro- privatisation opposition.
With the election of Mr Cameron, things look like getting a whole lot worse. He not only dislikes Punch and Judy politics, he also thinks the Tories ought to stop “grumbling” about modern Britain. This narrows the debate still further — millions of people feel they have perfectly good reasons to grumble about modern Britain. With a “modernised” Tory party embracing Cool Britannia, who will there be left to speak for the Victor Meldrews?
Rather than extending consensus politics, here’s a better idea. Let’s have Mr Cameron call the Prime Minister a liar who led the country into an illegal and disastrous war. And let’s have Mr Blair retaliate by calling Mr Cameron an out-of-touch Hooray Henry. If it’s democracy we want, that’s the way to do it.
David Cameron, new Tory leader, says he wants an end to 'Punch and Judy' politics. But the problem is not too much 'Punch and Judy' politics in Britain, but not enough. On the biggest issues of the day, both H.M. Government and H.M. Opposition are singing from the same hymn sheet. Both are enthusiastic supporters of the global capitalist system, which puts a price tag on every human value. And both are enthusiastic supporters of the policy of perpetual war-and the use of B52s to make the world safe for western multinationals. This is the reality of 'democracy' in the New World Order- you can have any government or opposition you like, so long as it's neo-liberal and likes cluster bombs.
Here's a brilliant piece from today's Guardian by the consistently excellent Madeline Bunting. A couple of years ago my wife Zsuzsanna wrote a piece for the Guardian entitled 'Goulash and Solidarity' on how much better things were for the majority of people under 'goulash communism' than they are under capitalism.
We're not talking here only about real wages and living standards- but about the feeling of solidarity and warmth between fellow human beings. In the absence of religion or other value systems, capitalism destroys solidarity as sure as night follows day. The aim of the game is to turn us into selfish, acquisitive consumers- spending our whole lives trying to keep up with the Jones. But there is another way. It's called being human.
Consumer capitalism is making us ill - we need a therapy state Britain is becoming unhappier as depression, crime and alcoholism grow.
Having done so much damage to the self-image of Slough in The Office, the BBC had to make amends. So they made a series about trying to make Slough happy. Tomorrow, in the final episode, we get to hear if they succeeded. It has been a cheerful but loopy series that left happiness to be defined by a collection of endearing "experts" indulging their own idiosyncrasies, from dancing in woodland to launching a choir. They didn't achieve their aim (although it didn't stop them from claiming they had) but along the way, they made a fair bid at introducing a mainstream audience to a fascinating emerging territory of public debate.
The funny thing was that, while the series may not have been gripping TV, it ended up making you feel, well, rather happy. It's heart-warming to see a woman who has always hated her voice singing lustily on stage, and to see the 50 volunteers for the project making new friendships and enjoying themselves. It generated the kind of feelgood factor you get from the school summer fete: not a thrill, but a gentle glow.
The hunt for happiness is an ancient human preoccupation, so there is nothing new in all this, but it is being reframed in order to challenge our prevailing political assumptions. The argument starts from the fact that Britain may have got very much richer in the past 40 years but it has not got happier. In fact, by measures such as depression, crime, obesity and alcoholism, we have got very much unhappier. So isn't the preoccupation with rising GDP misplaced? Shouldn't politics be focused around more than just economic growth? Shouldn't politics be as concerned with measures of human happiness?
Second, research has established more clearly than ever what the most likely predictors of happiness are, and there are now proven methods to treat unhappiness - particularly cognitive behavioural therapy which aims to break cycles of negative thinking. Happiness is no longer an elusive fuzzy feeling; a body of data gives us the tools to analyse what it is and what causes it. Happiness has gone respectable, and it's been tagged to intellectual disciplines - the science of happiness, happiness economics - so it will be taken more seriously.
But neuroscientists and psychologists apart, there is an even more pressing reason to take happiness seriously and this is what is grabbing the attention of Whitehall - unhappiness is an expensive business. Most striking is the huge chunk of claimants who are on incapacity benefit because of mental health problems: a whopping 900,000 or 38% of the 2 million total. Mental ill-health is the biggest single cause of incapacity and costs the country an estimated £9bn in lost productivity and benefits. The weight on the NHS is enormous: GPs spend a third of their time on mental health and the prescription cost of drugs is rising.
Plus, there is a whole range of political issues which have roots in mental ill-health, from obesity and alcoholism, to parenting, the respect agenda and antisocial behaviour among children and young people. The combination of incapacity-benefit reform and this "behaviour" politics is giving unprecedented impetus to mental health, the long-time Cinderella of the NHS.
The most dramatic development of the "therapy state" will come with the announcement, expected later this week, of a big increase in the availability of cognitive behavioural therapy on the NHS. But there has been a rash of smaller initiatives as government departments grapple with how to integrate this new dimension into policy. The Department for Education and Skills launched new guidelines earlier this year on the social and emotional aspects of learning (Seal). The Department for Environment, Food and Rural Affairs is now proposing to introduce indices of welfare and life satisfaction and how they relate to sustainability.
Most of it is piecemeal and still relatively small-scale, but the old liberal concept that the emotional life of citizens is no business of the state is crumbling. It raises the prospect of a future politics where emotional wellbeing could be as important a remit of state public health policy as our physical wellbeing. In 10 years' time, alongside "five fruit and veg a day", our kids could be chanting comparable mantras for daily emotional wellbeing: do some exercise, do someone a good turn, count your blessings, laugh, savour beauty.
We might also be discussing how to regulate emotional pollution in much the way we now discuss environmental pollution. Top of the list would be advertising, which is bad for our emotional health. It induces dissatisfaction with its invidious comparisons with an affluent elite. Television is not much better for us with its disproportionate volume of violence and fraught relationships. It makes people unhappy, less creative and cuts them off from emotionally healthy activities such as sport or seeing friends. Meanwhile, there would be a strong rationale to increase subsidies for festivals, parks, theatres, community groups, amateur dramatics, choirs, sports clubs and lots of other lovely things.
To some, these kinds of interventions represent a nightmare scenario of a nanny state, an unacceptable interference in personal freedom. If people want to pursue their own unhappiness, then the state has no right to stop them. Critics conjure up the nightmare prospect of Brave New World and its soma-imbibing placid citizens.
But the problem is, as Richard Layard argues in his book Happiness: Lessons From a New Science, that the decline of both religious belief (which is a strong predictor of happiness) and the social solidarity movements of the 20th century has left a vacuum of understanding about what constitutes a good life and how to be happy.
The church has lost sway, and the state has retreated behind the single rationale of promoting economic competitiveness with its overtones of Darwinian selection (a major source of unhappiness in itself with its vision of life as a competitive struggle). That leaves the market a free rein to describe happiness - the new car, new sofa, new holiday - and to manipulate our insecurities around status.
Leave things as they are and the state will increasingly have to pick up the bill for how consumer capitalism effectively produces emotional ill-health - depression, stress, anxiety. Leave things as they are and the state is part of the problem, promoting a set of market values that produce emotional pollution. Take education for example, where the needs of the labour market have been the driving influence for more than a generation. Has the regime of testing, league tables and competitiveness had a cost in emotional health? Layard cites an international study of schoolchildren in which the 11-15 age group were asked whether they agreed that "most students in my class are kind and helpful". England came last of eight developed countries, below Russia.
The huge ambition of the small but growing happiness lobby is that the state resumes a role in promoting the good life, not just to chivvy us along in the global rat race, anxious and insecure. | 2019-04-24T14:32:23Z | https://neilclark66.blogspot.com/2005/12/ |
What factors determined the use of film as a television technology in the development of aesthetics in the action-adventure television genre of the 1960s? The use of film on television, instead of in the cinema, led to a debate about ‘technical quality’. Celluloid’s superiority to video gave rise to a cultural understanding of TV aesthetics that could be built on notions of fashion, art, and conspicuous consumption. The action-adventure genre of the 1960s deployed these pop aesthetics and a comic strategy to appeal to an audience fascinated by glamour and youth, and amused by the ideological eccentricity of The Avengers and The Prisoner . The absurd narratives of both of these series refused to different degrees to engage with the real world, but The Prisoner represented an attempt to produce entertainment that relied more on notions of ‘seriousness’. The two series reflect the way television, with its endless dialectic of variation/replication, continued to produce new developments in the action-adventure genre.
Inherently like film, yet antithetical to it. Contradictory theories abound regarding what television can and cannot do, about what it does best. In the early years British television was governed by Reithian values of 'public service' and 'high culture'. But the emergence of a transatlantic market in television programmes in the 1950s — together with the use of celluloid — opened up the televisual in Britain. This process will be examined by focusing on two examples of the action adventure genre, The Avengers and The Prisoner. The article will explore the material industrial processes involved in the creation of a new set of conventions in the genre.
When Radio City Music Hall in New York was opened with a seating capacity of 6200 by RKO in December 1932, it became the world's largest motion picture house and marked the acme of film's development as a big screen theatrical presentation.
By the mid-1950s, corporate interests in Hollywood had their eyes on the potential of filmed drama on the small screen. By now, the contrast between the relative poverty of the studio-based 'live' image and the potential of film was readily apparent. Live plays were often characterised by disaster striking in many forms, from the leading man falling sick to the side of the camera falling off and hitting the floor during a whispered love scene.7 In the U.S., shows were sponsored by advertisers and each live play typically had three acts interrupted by the sponsor's 'message'. The advertisement was often in the form of a slickly-edited piece of film and the quality of the image and the pace of the editing reflected badly on the studio-bound play that contained it. The new television industry was slowly being positioned in relation to its significant economic 'others' – the advertising industry, and later, the motion-picture industry. The dominant interests in television's commercial development had succeeded in producing a synthesis of old radio's programming and merchandising goals with the persuasive tools of Hollywood's film-making, ensuring that the new television medium would not ignore sales-making opportunities by ignoring the value of 'entertainment'. The major Hollywood studios, encouraged by the advertising industry, turned over much of their spare studio capacity to making the filmed action adventure series to meet the networks' seemingly insatiable demand.
A report by Philip Mackie on the widespread use of film on American television appeared in Sight and Sound in 1954. Mackie made a useful distinction between two styles of TV film. One school of producers tried to reproduce on film the virtues and limitations of the 'live' show, perhaps best exemplified in Groucho Marx's comedy. The other school 'made their film look like films, with chases and running fights shot against location exteriors'.9 Such films would continue to proliferate and the mid-1950s saw a big expansion of filmed western series, the entry of Alfred Hitchcock into telefilm production, and in Britain, the opening up of ITV, whose sharpest entrepreneurs quickly recognised the economic possibilities of using film. ABC's Robin Hood was an early British example of the quickly-filmed action series that copied the American technique of industrial television production using film: repeatable and exportable, it became a profitable commodity.
The use of celluloid in television opened out the televisual experience and helped to rescue television drama from its theatrical affiliations (where it would have continued to be a relay device for a pre-existing, live performance). The popularity of the western in America, and even more so the action adventure genre in Britain — in series such as ITC's Danger Man, The Prisoner, and ABC/Thames Television's The Avengers — suggests that film medium gave to early television audiences a sense of the 'epic' and a feeling of the width of cinema that was in sharp contrast to the confined world of the 'live' studio drama. The sense of scale was achieved because it was inscribed into the iconography of the genre as it developed. Patrick McGoohan's protagonist, John Drake, in Danger Man was frequently called upon to intervene in the internal politics of islands in the Caribbean, and in the episode Colonel Rodriguez (1960), he facilitates the release of an American from the island of Montique. The settings and place names could carry resonances of the genre's epic space. However, what was evoked was an imaginative rather than an actual geography. The imaginative space was evoked through every aspect of costume, set design and mise-en-scene, no matter the budget restrictions.
To understand how the debate on celluloid aesthetics on television in Britain took on a particular character, it is necessary to consider the relationship between the technology of film and the technicians using it. Although television is an electronic medium, it has often relied heavily on the film for a large proportion of its programme origination. Throughout the 1970s and 80s, with the ascendancy of video, a variety of questions around an implicit hierarchy of mediums appeared. Film began to look like a messy, outdated mode. It is reasonable to ask why it had not disappeared altogether. However, film appears to have fulfilled the needs of the programme makers, and it continued to be used, not only for technical and economic reasons, but also for aesthetic and cultural ones. Frank Watts, cameraman on television's Hammer House of Horrors, has stated that atmospheric shadows, silhouettes, movement of both camera and cast, and lighting levels, are largely responsible for the success of a good horror movie. Shooting on video, on the other hand, appeared as a real limit to creative potential.
Much has been said and written about the look of images on film. Attempts have been made not only to define it, but also to reproduce it by using videotape. It is doubtful that there is any one factor that produces the 'film look'; rather, it is the product of techniques and technology that have evolved over a period of more than one hundred years.
Stuart Hall in the 1970s asked whether there was a formal aesthetic which could embrace the heterogeneous contents and occasions of television within a single coherent language. 'Despite its massive heterogeneity, there does seem to us a single, coherent language of television to which all its different practices can be referred. The language is, for all practical purposes, indistinguishable from the cinema.'11 Although television continually cannibalises and hybridises the content and presentational forms of other media and events or occasions, the universal set of practices by which this heterogeneous raw material was transformed into television was a set of conventions that, according to Hall, derived from the cinema.
For Hall, there was the danger of regarding television as unmediated, because it appeared that what made television distinctive was the relatively low level transformation of the bulk of its contents, and the very high proportion of television's raw material that was itself the content of another medium, e.g. live theatre or a cinema film. He blamed this on the lack of a 'social aesthetic' on television because of the institution's often innate conservatism. He believed that television did not lack an intrinsic form, but that its powers to transform its content were subjected to a sort of collective repression by the staff involved in the creation of television programmes. For Hall, television's use of a set of conventions taken from the cinema was on one level an acknowledgement that they shared many similarities, but also a condemnation of what he believed was television's formal underdevelopment.
However, it can be argued that television does not represent a different medium, but should be understood rather as a continuum with cinema. As such, it can be best described as a single medium that has undergone a constant process of renewal since the invention of moving pictures. The modes of transmission may have changed from the theatrical to the domestic, but the cinema viewer has become a television viewer as programmes have been reduced in terms of size and scope but expanded in terms of information and activity. Instead of assuming cinema's pre-eminence, as the bearer of a greater cultural capital, it can be argued that false distinctions are often made between cinema and television, and that there has often been a convergence in their development. The latter has involved a two-way process in which the existing modes of representation were updated in both cinema and television to secure further relevance within moving images.
The creation of a specifically televisual rhetoric using celluloid for a domestic rather than a theatrical cinema can be assessed by examining how far the issue of 'technical quality' — the degree of control over the visual style — took second place to the scripting of action and narration in a show such as The Avengers. In 1967, The Avengers was at the point when it ceased to be shot on video and in black and white and was updated by the 'new medium' of colour and 35mm film. The decision to shoot on film led to a more frequent use of exterior shots, and production teams coming to the series sought to create a 'film look' that was more artistically pleasing in the quality entertainment/drama field.
The 'hard work' of making a genre series shot on film needs to be understood in relation to the industrial and economic context of the series. An examination of the conditions of production of the series (rather than, say, an analysis of the role of professional ideologies in the organisation of a television production) will help to clarify the situation here. Firstly, it will tell us about the existing ideologies with which the production team were concerned, and secondly, it can also expose the contradictions between an ideological project conceived by the programme makers and the final programme as it is read and consumed by audiences.
This operates against the notion of literary works conceived of as 'created' and 'finished' products and towards the analysis of literary texts as they are re-inscribed in a variety of different institutional and ideological contexts. Studying a particular text does not require elevating it and isolating it from its history of productive consumption, but looking at everything about it, 'everything which has collected on it, become attached to it – like shells on a rock by the seashore forming a whole incrustation.'13 In other words, the production of a fictional work is a process, and the labour involved in that process can transform the ideology held by its producers and may be symbolised within the finished text. The ideological is given a visible form within a programme and the conditions of production reformulate its particular articulation.
A fictional work is a process, and the collaborative nature of film-making can allow a solution to a technical problem that can lead unexpectedly to the creation of a scene content that is artistically more interesting than that envisaged by the script. Of course, the degree of difference could amount to a complete break from the script, but Hume makes it clear that a crew's overriding purpose was to maintain the integrity of the script, and to serve it rather than alter or replace it. Nevertheless, the diligence of the 'professional' crew should be seen as opening out the televisual experience as much as the use of film as a technology. One reason for setting up a film company in the 1960s to produce for television was the degree of flexibility in working practices that it made possible. For the producers of The Avengers the experience, first at ABC and later Thames Television, demonstrated that freelance working could produce a change in the social relations of production, which can affect the final textual meanings that are being offered in a programme. Instead of the often alienated workforce of permanently staffed technicians in the television studios who were unlikely to work consistently on a long-running drama series, Thames' employees producing The Avengers had the chance of a closer involvement with the programme as a whole and crew members were rarely unwilling to work overtime because they were more actively involved in a production.
By the end of the third season in 1964, The Avengers was on the verge of a major technological change. Until that point , the series had been recorded on videotape, which was difficult to edit, and so the performance had often to be done in a single take with only a handful of exterior scenes shot on film. These technical limitations were overcome by the use of interior sets, close shots and a visual style that used low-key lighting and expressionist angles to create an unreal world that was marked off as different from the realism of a near-documentary series like Z Cars. For the fourth series in 1965, however, The Avengers moved onto film, which was more expensive, but allowed a greater use of location filming, exterior sequences and a more expressive use of visual style. The reason for the change was in large measure due to the desire to sell the series in America where filmed entertainment had been established much more firmly than in Britain.
The move to film necessitated changes in the production base of the series and its personnel. If there was a moment when The Avengers can be said to have changed decisively, this was it. The production base of The Avengers moved to British National Studios at Elstree. Julian Wintle, a former film editor turned producer who had co-founded Independent Artists in 1958 and whose credits included Tiger Bay (1959) and This Sporting Life (1963), was brought in as supervising producer. Yet the credos of actual personalities such as Wintle and Thomas were not as important as a set of complex 'signature' codes that suggests both authorial and cultural importance. From the critical tradition of authorship came the still-dominant popular view that individual, artistic directives were at the heart of the creative enterprise in film. However, the personalities of each studio in the classical era of Hollywood were not a priori to the film, but added in because of the controlling oversight of the studio bosses.15 This worked because specific production modes distinguished each studio. Similarly, ITC and ABC/Thames utilised a 'house' mode of production; they also shared 'house styles' with other filmed entertainment on the lot.
Television programmes are industrial products produced for a mass audience, and therefore the study of popular TV demands that the critic recognises that programmes do not stand alone, but are produced and consumed in runs and sets, groupings that may be understood in terms of generic qualities, or the casting of stars, or shared iconographic elements. Rather than the discrete programmes, it is the continuities across groups of films that the audience recognises, and that become the principal focus of critical attention. The primary object of study is not the single programme, but the series that was shaped by several factors; occupational ideologies that influenced the use of film on television; the cultural understanding of television aesthetics and technology. Steve Neale has argued that 'genres cannot be systematically characterised and differentiated from one another' on the basis of abstracted formal properties — a set of codes and conventions — as if such properties 'constituted specific generic essences'.16 Rather, he argues, genres can more usefully be viewed as sets of expectations through which the possibilities of understanding a text are organised. Such expectations are neither lodged within nor produced by the properties of individual texts or even groups of texts viewed in isolation. The determination as to which genre rules will be operative in organising the possibilities of reading is thus linked to a production culture, rather than a fixed set of conventions within a text.
As television production moved to involve an international market, there was a growing Americanization of the action adventure genre. This relied on the industrialization of the aesthetics of film that had happened in America. In The Avengers the comic strategy of the series also operated to recruit new audiences. The parodying of some aspects of post-imperial ideologies such as consumerism and fashion, combined with the buttressing of others, was not only endorsed by British audiences, but also allowed The Avengers to engage with international audiences. This, in turn, fed into American views of the British class system as an outdated anachronism, and served as an amusing ideological eccentricity when used in the service of the West (i.e. the United States). In this way The Avengers can be understood as linking together American and British audiences.
The importation of the American filmed television series whetted British audiences' appetites for this style of entertainment, and the imposition of quotas on foreign material that could be shown on British television stimulated the production of the filmed series in the UK. It was Lew Grade who first began to finance the production of the TV film series under the BFPA (British Film Producers Association) agreements, after convincing the unions that this would not affect the production of television programmes within ATV (Associated Television), but would allow him to break into the American market, and provide an additional source of employment. After his TV series Danger Man was shown successfully in the US, but not networked, Grade sold his first TV series to America in 1965. The Saint, which had cost ATV £50,000 a show to make, was bought by NBC, and was the first British-made TV series to be shown on the American network. It ran in the US for 117 episodes. Meanwhile, in 1965, Howard Thomas, at ABC, switched The Avengers from tape to film and scored a notable success, including an American network sale.
The main aesthetic that appeared in the new filmed version of The Avengers was the pop ethic. By then the action adventure genre had become the dominant fictional form of the 1960s pop ethic, because the genre had become additionally coded with discourses related to tourism, conspicuous consumption and sexual pleasure. In particular, the action adventure successfully appropriated the new pop aesthetic of the designer gadget. The use of the gadget, omnipresent in The Avengers, Danger Man and The Prisoner marks a radical break with previous conceptions of modern technology and instead, the micro-electronics of the gadget foreshadowed a future in which advanced technologies were to be consumer products on a mass market. Pop art became the freeing of the art of technology from its military-industrial connotations. The gadget was deployed without brute force, but coolly in the hands of a professional individual.
The gadget is designed for a precise, functional use and plays an important role in the accomplishment of the mission of the protagonist. The use of miniaturised, concealed cameras, listening devices, tape recorders and closed-circuit video enabled Drake, the main character in Danger Man, to gather information that would otherwise be beyond the resources of a lone agent. The deployment of gadgets allowed the secret agent to overcome the passivity of his fellow lone operator, the private eye. In Danger Man, the information giving role is transferred to the gadget, freeing encounters with others for ideological rather than narrative ends, and enabling the planting and monitoring of electronic bugs to become an 'active' process which slows down the narrative to the strains of cool bass lines and jagged harpsichord notes. The series testifies to an art/technology combination.
In the episode Parallel Lines Sometimes Meet, there is a condensation of the pop alliance between the worlds of fashion and advanced technology. Drake is always impeccably dressed, his clothes barely ruffled even after fights and chases: most episodes could also be read, at least in part, as a prolonged demonstration by a male model. At the same time, he is also a skilled manipulator of gadgets and instruments. As well as his technical skills, his missions also demand a vast general cultural understanding in order to appear convincing in his various impersonations. Drake thus assembles within his character, the roles of technician, artist and intellectual that form different aspects of the new middle class. The art/technology mix is also a blend of the old and the new. Drake is a carefully crafted design of the new, modern person, running a line of continuity between yesteryear's spy of morality and patriotism, and the ironic view of the old that is receptive to the new. He is emblematic of the modern individual, the spy of technical and social skills that can avoid having his cover blown by not making mistakes.
Pop irony and moral seriousness are constantly in tension, the signs of consumption and technology straining against older values. The positioning shots of London and other capitals are a sign of pop's cosmopolitanism in which the foreign is able to signify the modern and the progressive. Continental values are similarly marked as signs of stylish consumption in Danger Man. Drake's presence in foreign cities, rather than reinforcing his Britishness, is a chance for him to show off his cosmopolitanism and his ease in another culture. By the end of the 1960s, the action adventure genre had fissured into two distinct forms. On the one hand, filmed entertainment of playboys who carried out vague missions in tourist playgrounds against mysterious international organisations; on the other, the ultra-realist genre and the return to a 'live' studio-bound mode in Callan (1967-74), in which unglamorous, shadowy characters went about their way in a morally ambiguous world.
The Avengers and The Prisoner were both nominally espionage-related dramas, and both deconstruct the spy genre, though in different ways and with different intentions. They incorporated sci-fi elements, helped to create the hybrid genre, spy-fi, to feature strange robotic menaces, and strayed from the standards of their genre as they became politically charged and consistently satirical.
The achievement of The Avengers was to contain within itself the pendulum swing from realist aesthetics based on a 'live' mode of television to surrealism based on notions of entertainment associated with film. This demonstrated the flexibility of the television series as a form and the centrality of its style to the way it was marketed. So, for example, a series like The Avengers could reach a key demographic for advertisers — 18 to 35 year olds — by offering entertainment that was sensitive to all these different demands, and which exploited television as a medium and film as a technology within television.
During the 1960s the primary point of cultural reference for a television programme remained the first moment of transmission. Unlike cinema, television programming was heavily tied to specific times that were used to construct a sense of intimacy with a domestic audience. Consequently, regardless of the genre or the fact that it was 'popular' or 'serious', programmes usually made reference to a common present moment and involved programme makers and audiences with shared assumptions. For example, the representation of fashion in The Avengers, which became more evident in series four, was manifestly of the moment. The Emma Peel outfit was the first publicly available clothing collection designed for TV and the retail sales it inspired followed a show at the Courtaulds Fashion Theatre in August 1965. Diana Rigg would soon be associated with her iconic target beret, and the signs and images that denoted conspicuous consumption were used to place the characters of Emma Peel and Steed and enable the audience to relate to them as being emblematic of pop style, youth and glamour. It is worth stressing that this everydayness of TV, where references are constantly being made to a common present moment, can present additional problems of textual and generic interpretation that may not exist to the same degree in cinema.
One of the pop elements deployed by The Avengers was a series of inter-textual references and quotations from other media, often referred to as 'bricolage'. The show was more rigorously 'pop' than Danger Man, which presented 'pop' style within a framework of political dilemmas. Foregrounding the pop obsession with designed surfaces, later episodes of The Avengers eliminated all trace of psychologically realistic characters from its content. These features were an integral part of another style of series that began in America at the beginning of the 1960s, exemplified by The Man From Uncle, which eschewed the 'realistic' illustration of social and psychological truths in favour of glamour and consumption. The focus on surface appeared thematically and we see 'speed' and 'modernity' revealed in a number of forms. Certain clothes become 'as fast and slick as a jet plane'.17 The reduction or flattening out of the idea into real objects was integral to pop style, for instance, in the episode, The Interrogators, an undercover informant is shot dead while kicking a football (bucket).
Psychological identification with characters was dismissed as unsophisticated. The pop gaze established a new regime for the television series, no longer based on the outside world but on the higher reality of design. The development of modern consumerism meant learning to pay attention to detail. This type of fetishism invested objects with systems of signification, and the inability to read surfaces correctly amounted to a lack of 'sophistication' on the part of the audience.
With The Avengers, the enjoyment for some people is tied to the fact that less sophisticated viewers will view it as alien. The quality of the text worked as a social marker rather than providing an objective basis. The pure gaze of the cultivated, sophisticated arbiters of culture defined itself by its opposition to the simplicities of the popular. The analysis of television drama as both a quality and popular form opened up a means of linking the aesthetics of television drama to the dialectics of sense-making and taste-making. In Britain, Stuart Hall argued that the general rule is that the more serious or 'high culture' a dramatic production is, the less it will be conceived for television and the more television will borrow forms from other media. Television will either transmit a 'serious' play as a piece of theatre or else transmit a popular piece of drama as a piece of cinema instead of finding a form more appropriate to television. However, The Avengers challenges this simple dichotomy. The distinction between a popular and the high aesthetic was bound up with the struggle between a populist, and classless American television that came to be associated with filmed entertainment, and a much more class-based British form of television with aspirations to art and seriousness more associated with 'liveness' and the single play on television. It is precisely because The Avengers exemplifies technological changes in the television industry, moving from 'live' performance to film and from black and white to colour in 1965-67, that it also exemplifies stylistic changes that occurred in the action adventure genre in television from a low-key, realist mode of representation to a more colourful, fantastic style strongly influenced by pop art and fashions of the time. It is as a product of the 'high sixties' that The Avengers is most celebrated. As such, it made visible the ideologies of consumerism, in the process 'opening out' the televisual experience on celluloid.
With film recording, television programmes began to acquire the definitiveness and fixity that is normally associated with a separate text, and repeats of viewers' favourite programmes came to occupy a significant part of the schedule. With repetition, recorded programmes also acquired the status of commodities or 'tradeable goods'.19 Filmed drama, and eventually, the new technology of magnetic recording after 1958 meant an enormous expansion of television's programme base. Stockpiled recordings could be used not only for delayed or repeated transmission but as goods that could be traded among broadcasters.
With its foregrounding of signs of expensive consumerism and conspicuous consumption — the cars, clothes and champagne drinking — The Avengers was well placed to become a highly commodified text, taking full advantage of the new market in programmes. Not only could the series be traded among broadcasters; it was also the first television series to employ an 'exploitation manager' to sell product placement to companies anxious to have their commodities showcased. Props such as Emma Peel's sporty Lotus Elan were signifiers of modernity, just as Steed's vintage green Bentley reinforced the character's links with other fictional agents and advertising totems such as James Bond. The prominence accorded to designer clothes and other consumer items was an integral element of the series' production strategy. The Avengers was 'packaged' to present an image of England as a place of high-living and sophistication that would appeal to affluent overseas audiences who might wish to invest in British consumer culture.
In the mid-1960s, at the time of programmes such as The Avengers and The Prisoner, popular culture was enjoying unprecedented prestige and influence. 'The characters often had elaborate biographies, couched in a weirdly serio-comic style, the fruit of earnest script conferences,' records one contemporary journalist.20 Meanwhile, on television, programmes like Armchair Theatre, and the Wednesday Play, and topical magazine programmes such as Panorama and Huw Wheldon's Monitor continued to be shaped by social realism — and the still prevalent Reithian patrician principle of public service broadcasting. The popular genre of the action adventure series with its various sub-categories was all too often dismissed as imitative of American television, and lacking the social realist import or the literary pedigree seen as the hallmark of the 'best' (meaning the most critically respectable), British television. When a popular genre did receive some critical acclaim, it was not done on the basis of its own generic characteristics, but through its perceived relation to the realist tradition (as in the case of Doctor Who).
The cultural status of the action adventure genre is controlled by attitudes to high and popular culture, and what constitutes art and quality. The Avengers, like many popular shows, was not taken seriously by most television critics of the 1960s, and was believed to be ephemeral because it privileged style over content and refused to engage with the 'real' world. However, Kingsley Amis suggested a different way of appreciating The Avengers that was not determined by conventional notions of narrative logic. For Amis, the absurd narrative was a sign of a sophisticated production strategy.21 In fact, the desire to avoid social reality was a deliberate production strategy of the series from 1965 onwards. Bruce Merry argues that while 'espionage fiction trips over itself to play the game of culture', it does so only to debunk the game, to deflate the signs of culture and knowledge which the text displays precisely by foregrounding them as a 'paraded literariness'.22 According to this view, a show such as The Avengers could be read as a subtle anti-literalising device, a parading of signs of value which reveals them as valueless, and furthermore calls into question the making of signs.
The Prisoner was broadcast in 1967-68 and ran for only seventeen episodes. It centres on a secret agent who resigns from his job and is then abducted and held in a mysterious 'village' where the authorities try and make him reveal the reason for his resignation.
Contemporaries did not know what to make of The Prisoner. When it began it was welcomed as a bold and innovative experiment that offered a different entertainment pattern from the formulaic norms of popular television. However, the appeal to aesthetic value was linked to a strong emphasis on the generic elements of The Prisoner as an action adventure series.
It adopted in many ways the generic conventions of the 1960s television spy series found in earlier series such as Danger Man and The Avengers. These series pitted their spy protagonists against villainous individuals and organisations, combining elements of the detective and thriller genres in the use of intriguing narratives and action-packed denouements. In the first episode, The Prisoner promised to fulfil all of these generic expectations. The opening credits showed McGoohan driving into London, entering a building and resigning. The central London setting, the costuming of McGoohan as Number Six, and the man he resigns to in a dark suit suggested a government agency. A shot of a vast underground filing system confirms this is a powerful and large, secret organisation. The exotic location to which Number Six is kidnapped to is also in keeping with the conventional use of exotic locations in Danger Man. However, although The Prisoner sets up these generic expectations, they are consistently undercut and unfulfilled. The identity of the organisation from which Number Six resigned is never revealed, and references to the spy genre are only implied rather than asserted. The Village that the prisoner is taken to may be run by a villainous organisation or by a government. Number Six may be a spy concealing information. The Village may be set in a foreign locale, but this is never confirmed.
In the 1960s, television was still a relatively new form of mass entertainment. Although it had become a force in its own right, the medium had not yet become self-reflexive. Few programmes addressed the nature and effects of television itself. The Prisoner was the first television series to be about television. It explored the technical and expressive possibilities of the medium, and probed the viewer's status as watcher. The portrayal of technology was anything but attractive and consumer-oriented – a condemnation of technology-oriented Western materialism. The essential purpose of The Prisoner was to raise questions about the relationship between self and society in the technocracy of the global village.
In Danger Man, and particularly The Prisoner, McGoohan's professional identification with the television industry was evident in his very 'visual signature' and use of the latest television technology. The earlier classic realism of Danger Man had been overwhelmed by the over-proliferation of authorship. However, the institutional rather than the personal or biographical logic of authorship in production became the key factors here. Television needs to be viewed as an industrial — rather than artistic — practice and a television production could demonstrate authorship to be unavoidably collective, and contested.
In some ways, The Avengers and The Prisoner both used an aesthetics that occupied a space beyond ideology, that of pure pleasure. The extreme self-conscious use of style attributed to both these series in the late 1960s, is explained not only through reference to individual aesthetic or cultural influences, but through attention to the transformation of the TV industry into a new transatlantic form of entertainment that depended on celluloid television. Television is a process that brings the social and technological together. The notion of ideology as the chief mediator between the televisual and the non-televisual which implies that television technology is ideologically complicit assumes that there is such a thing as a neutral technology. Although technology is not ideological in itself, it is ideological in its use in specific historical situations, and therefore, an historical examination of a technological development is required.25 Television's specificity cannot simply be defined in terms of the 'film look' and the similarity of the television genre to film genre, but must be seen in terms of the ideologies used to create such cult shows as The Avengers and The Prisoner, a combination of imperial decline, notions of Britishness, and conspicuous consumption represented by the worlds of fashion and art.
1. John Hill and Martin McLoone (eds), Big Picture, Small Screen (London: John Libbey Media, 1995), p. 62n. Desilu is a production company formed by Lucille Ball (of I Love Lucy fame) and her husband Desi Arnaz – their most famous and recognisable show was Star Trek.
2. Thomas Edison, in 'The World's Columbian Exposition Illustrated', May 1893, quoted in Gordon Hendricks, The Edison Motion Picture Myth (Berkeley and Los Angeles: University of California Press, 1961), p. 104.
3. Peter Kramer, 'The Lure of the Big Picture: Film, Television and Hollywood' in Hill and McLoone (eds), Big Picture, Small Screen, p. 16.
4. http://en.wikipedia.org/wiki/File:Telephonoscope.jpg> [accessed 19 May 2010].
5. Roy Armes, On Video (London: Routledge, 1988) p.34.
6. William Boddy, 'The Shining Centre of the Home: Ontologies of Television in the Golden Age', in Television in Transition, ed. by Phillip Drummond and Richard Paterson (London: BFI, 1986), p.131.
7. Nigel Kneale,' Not Quite So Intimate', Sight and Sound, 28 (1959), 86-88 (p.87).
8. Richard Patterson, 'Introduction', in Television: An International History, ed. By Richard Patterson and Anthony Smith, 2nd edn (Oxford and New York: Oxford University Press, 1998), pp. 1–6; p. 3.
9. Philip Mackie, 'Six Hundred Hours a Week', Sight and Sound, 24 (1954), 45–48 (p. 48).
10. Quoted in D. J. Kimbley, 'Survival of celluloid in the age of the microelectronic in television', The Journal of the Royal Television Society (September–October 1981), 21–24 (p. 21).
11. Stuart Hall, 'Television and Culture', Sight and Sound, 45 (1976), 246–252 (p. 249).
12. Pierre Macherey, A Theory of Literary Production, (London: Routledge, 1978), p.49.
13. 'An interview with Pierre Macherey', Red Letters, 5 (1977), 3–9 (p. 7).
14. Alan Hume, 'Filming for Colour Television Series', British Kinematograph Sound and Television, 50 (1968), 3–5 (p. 3, 5).
15. Thomas Schatz, Hollywood Genres: Formulas, Filmmaking, and the Studio System (New York: Random House, 1981).
16. Steve Neale, Genre (London: British Film Institute, 1980), p. 48.
18. Harry Craig, as quoted in Buxton, p. 98.
19. John Caughie, Television Drama: Realism, Modernism and British Culture (Oxford: Oxford University Press, 2000), p. 54.
20. Peter Black, 'Undercover and out of mind except for that Mrs Gale', Daily Mail, 13 October 1962, p. 4.
21. As quoted in TV Times, 9–15 February 1964, p. 7.
22. Bruce Merry, Anatomy of the Spy Thriller (Dublin: Gill and Macmillan, 1977), pp. 162–3.
23. 'New on Southern This Week', TV Times, 30 September – 6 October 1967, p. 4.
24. Alain Carraze and Helene Oswald, The Prisoner (London: Virgin, 1990), p. 53.
25. James Spellerberg, Technology and the Film Industry: The Adoption of Cinemascope (Ann Arbor, MI: University Microfilms International, 1980), n.p.
Armes, Roy, On Video (London: Routledge, 1988).
Black, Peter, 'Undercover and Out Of Mind Except for That Mrs Gale', Daily Mail, 13 October 1962, p. 4.
Carraze, Alain, and Oswald, Helene, The Prisoner (London: Virgin, 1990).
Caughie, John, Television Drama: Realism, Modernism and British Culture (Oxford: Oxford University Press, 2000).
Drummond, Phillip, and Patterson, Richard, Television in Transition (London: BFI, 1986).
Hall, Stuart, 'Television and Culture', Sight and Sound, 45 (1976), 246–52.
Nigel Kneale, 'Not Quite So Intimate', Sight and Sound, 28 (1959), 86–88.
Hendricks, Gordon, The Edison Motion Picture Myth (Berkeley and Los Angeles: University of California Press, 1961).
Hill, John, and McLoone, Martin (eds), Big Picture, Small Screen (London: John Libbey Media, 1995).
Hume, Alan, 'Filming for Colour Television Series', British Kinematograph Sound and Television, 50 (1968), 3–5.
D. J. Kimbley, 'Survival of celluloid in the age of the microelectronic in television', The Journal of the Royal Television Society (September–October 1981), 21–24 (p. 21).
Mackie, Philip, 'Six Hundred Hours a Week', Sight and Sound, 24 (1954), 45–48.
Macherey, Pierre, A Theory of Literary Production (London: Routledge, 1978).
—— 'An interview with Pierre Macherey', Red Letters, 5 (1977), 3–9.
Merry, Bruce, Anatomy of the Spy Thriller (Dublin: Gill and Macmillan, 1977).
Neale, Steve, Genre (London: British Film Institute, 1980).
Patterson, Richard, 'Introduction', in Television: An International History, ed. by Richard Patterson and Anthony Smith, 2nd edn (Oxford and New York: Oxford University Press, 1998).
Schatz, Thomas, Hollywood Genres: Formulas, Filmmaking, and the Studio System (New York: Random House, 1981).
Spellerberg, James, Technology and the Film Industry: The Adoption of Cinemascope (Ann Arbor, MI: University Microfilms International, 1980), n.p. | 2019-04-25T07:59:13Z | https://dandelionjournal.org/article/id/224/ |
по производителю - 2J 3-5lab 3L 3M 3Rwave 4CARMEDIA 8devices A123 Systems AAC AAEON Aavid Thermalloy ABB Abbotec ABC Taiwan ABC Taiwan Electronics Corp. Abracon ACCORD Accro Gaskets ACE Climatic Ace Dragon Corp. Ace Technology Acme Electric/Amveco/Actown ACME Portable Machines GmbH ACP Spain ACQUITEK Acromag Actel/Microsemi Actron Adactus Adafruit Adam Tech Adaptec Adavnced Photonix ADDA International Adels Contact Adesto/Atmel Adeunis Adhesive Dispensing Ltd ADI Advanced Interconnections Advanced Micro Devices Advanced Micro Lites Advanced Photonix Inc Advanced Power Technology Advanced Semiconductor Advanced Thermal Solutions, Inc. Advantech Equipment ADVANTECH Equipment Corp. ADVANTECH EUROPE GMBH Advantech prog AEC AEM AEP AEROFLEX Aerovox AFI American Fibertek AFT Microwave Agere Systems Agilent Semiconductor/Avago Agilent Technologies Agilent/Keysight Technologies AHA Ai-Tricker (wi-fi modules) AIC Aiconics Aimtec Airborn Connector Airpax Airzero Aishi Aituo Automation Device AKER AKM Akros Silicon Alcoswitch/TE Alcoswith ALDEC Alesis Semiconductor AlfaMag/Amgis Allegro MicroSystems LLC Allen & Heath Alliance Memory Alliance Semiconductor Allied Controls Allmotion Allwinner Alpha ALPHA TETRA Alpha Wire Alpha&Omega Semiconductor Alpha-Photonics AlphaWire Alphine Components Alps Alps (Japan) Altera/Intel Altinkaya Enclosures Alutronic Amber Wireless AMCC AMCOM AMD Amega Tech Amega Tech American Fibertek American Fibertek, Inc. American Microsemiconductor, Inc. American Microwave Corp. American Technical Ceramics American Zettler, Inc Ametherm AMGLO AMIC Technology Corporation Amotech Amphenol Amphenol Connex Amphenol Industrial Amphenol Industrial Global Operations Amphenol Infocom Amphenol LTW Amphenol RF Amphenol Socapex Amphenol Spectra Strip Amphenol Tuchel Amphenol-Air LB Ampire Co, Ltd. AMPL (Astra Microwave Products Limited, Hyderabad, Ampleon Netherlands B.V. Ampleon USA Inc. Amplifier Systems AMS Amtek Amveco, Inc. Anadigics Analog Devices Analogic Tech Anamet Anaren Anderson Power Products Andrew Heliax Coax Cable Andrew Heliax Connectors & Adapters Anhui Mingguang Life Electronic Co,. Ltd. Anla Technology Co., Ltd. Anly Electronics Anovay Technologies LTD Ansmann Antenova Antenova Anthro Anytek Technology AOS AOTAI INDUSTRY Apem API Delevan API Technologies APLUS APM Communication, Inc Apollo Applied Micro APS APS (Applied Power Systems, INC) APS-Printers Aptina AR-Electronics ARCO Arcol Arcolectric switches plc Arcolectric/Bulgin Arcotronics Arduino Ariane Controls Aries Electronics Arizona Microship ARM Aromat-Matsushita ARRA (Antenna & Radome Research Associates) Array Connector Corp. Arrow Development Tools Artesyn Embedded Technologies ARTS Energy Arvan ARX ASB ASE SERIES ASI Asiliant Technologies ASJ ASM Assemtech Europe Ltd Assmann Astec Astra Microelectronic Technologies Limited Astra Microwave Products Limited Astro Tool Corp Astron Technology Co., Ltd. Astrosystems Limited Atheros Atheros-drivers ATI Technologies Atmel/Microchip Atom ATP Electronics Inc. Attansic Attend AU Optronics Augat AUK Contractors AUK CONTRACTORS CO., LTD AUO Aupo Aurel Auris Aurora Technology Co., Ltd Austin Semiconductor Austria Microsystems Austriamicrosystems Autec Power Systems Autonics Autotronik Avago/Broadcom Aveo Engineering Avery Dennison AVX AVX-ELCO Axelite Axicom Axiomet Axon Cable Axon Mech AXTAL AXTAL AYVAZ B&K Precision Babcock BACEI Baco Controls Bad_Raychem Bahar Baikang Optical Co.,Ltd. Baldwin Boxall BARCO BAT-ELECTRONICS Battery Innovation Group Baytek BC Components BCC/VISHAY BCD Semiconductor BCEsud Passive Components BeagleBoard BECK Becker Bel Fuse Bel Power BEL Stewart Connectors Belco Belden Belfuse Bell Belling Belzer Benchmarq Beneq Berg Electronics BERGQUIST Bernstein Bestar BetLux Electronics Beyondoor BHC Aerovox BI Technologies Biakom Ltd. Binder BIOHMSA Bitek Bivar BK Precision Blue Creation Blue Giga Bluegiga BM Group BMZ BOCHEN Bolymin Bomar Interconnect Bonitron Bonka Bonkot Bopla Bosch Bosch Sensortec Bose Bosh Bosh-Sensortec Bossard Bothhand Botthand Bourns BQ Cable BRAND REX BREN-TRONICS Breve Tufvassons Breyden BRI Bridgelux Bright Led BRIGHTEK Brightking BrightView Brilliance Semiconductor Broadcom Limited Bud Industries Bujeon Bulgin Components Bungard Burndy Burr-Broun Burr-Brown Bussmann BYD C&D Technologies C&K Components C-MAC Caddock Electronics Inc. Cal Test Electronics Calex CALIFORNIA EASTERN LABORATORIES California Eastern Labs Canal Components Canal Electronic Cannon ITT Industries Cantherm Cantherm Capax Caplugs CapXon Carambola Carclo Cardinal Components Inc. Carl Kammerling Carling Technologies Carliste Interconnect Technologies Casino Technology AD Casino techology CAST Catalog Analog Device from Future El Catalog Anytek Catalog Arrow Central Europe Catalog AUK Catalog AVNET Time Catalog Bright LED Catalog C&D Tech. Catalog Chungsong Electronics Ltd Catalog COSMO Catalog Dacpol Catalog Degson Catalog Digi-Key Catalog Diptronics Catalog Elhurt Sp.z o.o. Catalog ERSA Catalog Eurodis Catalog Evox Rifa Catalog Farnell Catalog Figaro Catalog Forward Catalog Future Electronics Catalog HAHN - Elektrobau GmbH Catalog Hongfa Electroacoustic Co,, Ltd catalog huai Catalog Industrias Lorenzo Catalog Innovative Technology Group Catalog Karson Catalog Kemet Catalog Lambda Catalog LinkCom Manufacturing Co., Ltd Catalog Marquardt GmbH Catalog Microtips Catalog Money Controls Catalog Mouser Catalog Multisort Elektronik Catalog National Rejectors Inc., GmbH Catalog OKW Catalog Optosupply Catalog Panasonic Ind Catalog Panjit Catalog Pro Kit's Catalog Profusion plc Catalog Royal Ohm Catalog RUTRONIK Elektronische Bauelemente GmbH Catalog Schukat Catalog Setron Catalog Silicon Laboratories Catalog Siward Catalog Suntan Catalog Supreme Catalog Suzo Catalog Tyco/AMP Catalog ZTS Maszczyk Catalyst Semiconductor CATIS CDE Ceccoils Ceibo CEL (California Eastern Laboratories) CELDUC Celem Cellevia CENTELLAX Central Semiconductor Corp. CeramTec CEVIANS Chang Changzhou Chuanglian Power Supply Technology Corp. CHEMET Chen Guang Electronic Factory ChenYang Technologies GmbH & Co. KG Chequers Electronic Co., Ltd. Cherry Cherry Electrical Products CHI MEI Optoelectronics Chilisin Chimall China Aviation China Aviation China Aviation Lithium Battery Co., Ltd China Sunshine Technology Chinfa Chip Cap Chipcom Chiplus Chiplus Semiconductor CHONG-IA Precision Ind Chuangwei Chungsong Electronics Chunwang Cinch Connectivity Cinch-Trompeter Cincon CIRC Circuitco Electronics LLC Cirlan Cirrus Logic CIRS Cissoid Citel Citizen CIXI DAFA CJT Clare/IXYS Cleco Clicktronic Cliff CM Computer CML CNC Tech CNIR CNR Cobham COHU Coilcraft Coilcraft (Passives) Coiltronic Coiltronics COILWS COM, INC Colibrys Comair Rotron Combiplast Comchip Technology Comestero COMF Commital CommScope COMON Compaero Compex Comtech Comunication Tracking Innovation Comus International Conair Rotron CONCO Concord Condor Conec Conel Ltd Conesys Conexant Coninvers Connect One Connectblue Connex Connector Connfly Connor Winfield Contelec CONTRANS TI Sp. z o.o Conxall/Switchcraft Cookson Electronics Assembly Materials Kft. Cooling Source, Inc. Cooper Bussman Cooper Electronic Technologies Cooper Interconnect Cooper Tools Copal Electronics Inc Cordial Core Solid Storage Core Tech CoreLogic Cornell Dubilier Coroplast Corsair Electrical Connectors, Inc Corsy Cortina Cortina Systems Cortologic COSEL Cosmo Cosmo Electronics Corp. Coto Technology CPI CPT Coil CR Magnetics INC CRC Contact Chemie CRC Industries Cree/Wolfspeed Cristek CRM Synergies Crouzet Crown Connector Crydom Crystal Clear Technology Crystek Corporation CSR CT-Concept CTi CTR CTS Cubelets CUI Inc Cuminus Cursorcontrols CUSTOM Custom MMIC Cvilux CW Industries Cyber i-Tech Cyg Cylconn Cymbet Corporation Cynel Cynergy3 Cyntec Cyoptics Cypress Semiconductor CYT Daco Dacpol Daier Electron Dallas Logic Daniels Manufacturing Corporation Danoterm Electric A/S Danube Data Power DATALOGIC Datatronics Datel Datum DAVICOM Davies Molding Dawn VME Products Daygreen DB Unlimited DBM Reflex DC Components DC Components DDK DECA DEFA Degson Electronics Co., Ltd. Degson Electronics Co.,Ltd. DEKTEC Delphi Delta Design Delta Electronics Delta Product Groups Deltatechnika Deltron Demiurg Denon Deutsch DFRobot Dialight Dialog Semiconductor Diamond Antenna Dielectric Lab Inc. Digilent, Inc. Digisound Digital Core Design Digital core design Digital Persona DIGITAL VOICE SYSTEMS Dingong Automation Equipment Co., Ltd Diodes INC. Diodes/Zetex Diotec Semiconductor Diptronics Discera Display Electronic Gmbh. Display Elektronik Displaytech DIV DIV DIVERSE/IMPORT DIY DK Thermal Solutions DK Thermal Solutions DLP Design DMC Tools Dobeter Electronics Dominant Semiconductors Dow Corning Dow-Key®Microwave Corporation DPA Dr.Storage Draka Industrial Cable DRAKA NK Cable Ltd. Dremec DRI Relays Dubilier Dubox Ducati Dunkermotoren DYNACARD Dynapro Dynawave Inc Dynex E+E Elektronik E+E Elektronik e-Magin E-Switch E-T-A Elektrotechnische Apparate GmbH E.S.G. E2V Eagle Tools Eaglerise Eaglerise Electric & Electronic (China) Co., Ltd. EAO EAO Secme Earda Electronics Co.,Ltd Earda Electronics Ltd. EAST Eastrising EasyMeter GmbH EATON Eaton Bussmann EATON ELECTRIC EBM-Papst Industries INC EBSO EBV ECE Echelon Ecliptek ECS ED ED1 EDAC Inc. EDI (Electronic Devices Inc.) Edison Opto Corporation EDT EE Controls EEMB Batteries EIC EIKON Elantec Elantek ELATEC Elco (AVX) (Interconnect) Elecsound Electro-PJP Electrocube Electrolube Electronic Assembly Electronic Devices Electronic Hardware Corp Electronics solution group LTD Electroswitch Eles Industrial Elesa+Ganter Elesta Relays Elite ELMA Elme Elmer Elmos Elmwood Sensors Elna Elnec Elo Touch Elpida ELYTONE EM Marin Microelectronics Em-Marin Emaggo eMagin Embedded Artists Embit EMC Technology, Inc EMCO Emerson Connectivity Solutions Emerson Network Power Emmerich Emmerich Batterie AG EmpowerRF Systems Emtrion Encitech Energizer Battery Company Energy Micro Enersys Engicam Engineer Eniac Enpirion Epcos/TDK Epitex Epson Epson Toyocom Corporation EPT EQUIP-TEST Ericsson ERNI Electronics ERSA ES & S ESK ESKA ESMT/EMP Espressif systems Essemtec Essentra Components ESSEX Esskabel Esterline ETG Corporation ETG Corporation Ethertronics Inc ETL Systems Ltd Eudyna Devices Europe Ltd. Eupec EUPEC Eurobolt Euroclamp European Installation Bus Evans Capacitor Everest Everlight Everspin Technologies Inc Everwin EVL Evon Evox Rifa Exar Corporation Excelics Semiconductor Excelitas Excelsys Exel Cell Electronic Co. Exicon Explorer Cases Exxelia EZ Form Cable EZURIO F & S F&S Electronic Systeme GmbH Fagor Fair-Rite Fairchild/ON Semiconductor Fancort FARA LED LAMP Faratronic Fastener Specialty Fastprint Fastrax Fastron Faulhaber Fchild FCI FCI / Berg FCT Electronic FDI FDK America Inc. Federal Mogul Feig Felder Fenghua FERRAZ Ferrocore Ferroxcube FIBOX Figaro Figaro Engineering Inc. Filtercon Filtran FILTRONETICS Filtronic Finder FINETECH Finisar Fionda Connectors FireStick First Sensor First Sensor FIS FIS INC. Fischer Electronik Fix&Fasten Flann Microwave Limited FLEx Lighting Flexa Florida RF Labs Flourishing Relay Fluke FNR FORDATA Fortune Forward Industrial Co. Forward-relays FORYARD Foshan Nationstar Fox Electronics Foxconn Foxconn Optical Interconnect FPD Design Group Fraba Posital Fractus FRAEN Franmar Free2move Freescale Semiconductor/NXP Freescale Wideband RF Frei Fremont Micro Devices (FMD) Friendly Elec Fromtier FSM FTCAP Fischer & Tausche FTDI FTDI FTDI Chip FTTX Fuantronics Fuji Electric Fuji Semiconductor Fujicon Fujikura Fujitec Fujitsu Fujitsu Microelectronics Fujitsu Quantum Devices Europe Ltd. Fujitsu Takamisawa Fujitsu Takamisawa America Fujitsu-Siemens Fusingtronics Fuyu Technology Co., Ltd Fuzetec G-NOR Electronics Co., LTD G-Tek G-Tek GAINTA Garufo GC Electronics GE Critical Power GE Energy GELIN GELON LIB Gem Manufacturing Gemalto M2M GEMS Sensor General Cable/Carol Brand General Dynamics SATCOM Technologies General Electric General Semiconductor GENESIS Gennum GENNUM Genteq GEOSPACE Technologies Getelec Geyer GHI Electronics Ghz Technology Inc. Gigadevice Gigalane GIGAVAC GiPlast Glenair Global Connector Technology Global Power GLVAC Golledge GOOBAY GOODSKY Gore GP Batteries GP Battery Marketing Germany GmbH Grayhill Greenconn Corporation Greenliant GSI Technology Guangzhou Waytronic Technology Co., Ltd Guardian Electric Gunther H&D Wireless H&M Semi HAHN Electrobau GmbH Hahn Elektrobau Hahn GmbH & KG (Hungen) HAHN TRAFO Hahn-Elektrobau GmbH (Gusten) Hahn-Trafo Haitaik Hakko Halo Electronics HALTER LOSE Hamamatsu HAMEG Hamlin Hammond Manufacturing Hanho Hanlong Industrial Co.,Ltd. Hanlong Industrial Co.,Ltd. Hanrun Hantouch Harbour Industries HARRIS Harting Hartmann Hartu HARVATEK Harwin Haverhill Cable & Mfg HBL Power Systems Limited HBM Germany Headcon/Leaguer HEC Hefei Sensing Electronics Co., Ltd Helistrand Hellermann Tyton Hellermann Tyton HELLERMANNTYTON HELUKABEL Heraeus Heraeus Noblelight Ltd Herga Herley General Microwave Inc Herley GMI Eyal Microwave HEROTEK Heva (Germany) Hewlett Packard Hexachain HGPOWER HH Smith/Abbatron Hi-Link Hi-optel Hico High Energy Corp. High Power Lighting High Tech Highland Electronic Co. Ltd HIGHLY Highly Highly Elecrtic Hipot Hirose Hirose Electric Co Ltd Hirschmann Hit Point Hitachi Hitano Hitron Hittite Hittite/Analog Devices HJC HKC HLW Technology HN-Power Ho Tien Precision Industry Co., Ltd. Hoffman Hollyland HOLT Holt Integrated Circuits HOLTEK HOLUX Honeywell Hongfa Hongfa Electroacoustic Co., Ltd. Hongli Zhihui HONY Electric Ind Co.,Ltd Hope Microelectronics co.Ltd. Hornby Electronics HOSONIC Hottinger Baldwin Messtechnik HR ELECTRONICA HSI Sensing Hsuan Mao Technology Co.,Ltd HTC Huai Electronics Huanan Ultrasonic Equipment Co., Ltd. Guangzhou HUAWEI Huber-Suhner Huey Jann Electronic Huizhou Haicheng HULYN Hummel Hurricane Huzhou Jiwei Electronics Technology HVCA&CKE Hwasung Hynix Semiconductor Hyundai Electronics America I-SFT IAR Systems IBL IBM Microelectronics IC Swtiches Ico Rally Icore International ICS ICSI Ideal Industries Ideal-Tek IDS Innomic IDT IDW IEE IFI IFM Illinois Capacitor Illuma Illumination Management Solutions ILME Ilsi Imi-Sensors IMP Impinj IN&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp INCO INDEL Indu Key Inductor Supply Inc Industrial Fiberoptics Industrias Lorenzo Infineon Technologies Infiniti Microwave IniNET Innalabs Innolux InnoSent Innovations , Inc Innovative Technology Group Inova Semiconductors INTEGRA TECHNOLOGIES Integrated Circuit Systems Integrated Sircuits Systems Intel Intelecsa Interflux Electronics Interlink Intermatix Corporation International Rectifier International Rectifier/Infineon International Wire CC InterSelect Intersil Introlines Industrial Invensense Inventek Systems INVENTRONICS Ioxus IPP IQD IRC (TT Electronics) Isabellenhuette Heusler ISD (A WINBOND CO.) ISKRA Isocom Isola Isolink ISSI ISYSTEM ITE ITF Co Ltd. ITT Cannon ITT Electronic Components ITT Industries, Cannon Switch Products ITW McMurdo ITW Pancon ITW Switches IXYS/Littelfuse J&K J.S.T. Deutschland GmbH Jackcon Capacitor Electronics Co., LTD JACOB JAE Jameco Electronics Jamicon Janssens Jauch JB Capacitors Company JBC Tools JDI JDI Jennings Technology JFW Industries JGD Semiconductors JHDLCM electronics Co.,Ltd Jiahui Wire&Cable Co., Ltd Jiaxing Beyondoor Electronics Co.,Ltd Jinan Hongye CNC Machine Jinke Jinlong Jite JKL components corporation JL World JLW Johanson Dielectrics JOHANSON MANUFACTURING CORP Johanson Mfg Johanson Technology Johanson Technology Inc Joint Tech JONHON OPTRONIC Joyin JQL ELECTRONICS INC. JRC JST JST Sales America Inc JST Sales America Inc. JST не робоча Judd Wire Inc. Junhao Junkosha JW Miller A Bourns Company Jyebao K-lIne Kabatec KAI SUH SUH KAIMEI Kaiven Kamaya Kanghongjin Kangyuan Shares Limited Kaptone Karson Technology Kaschke Kaschke (Passives) KDI Triangle Corporation KEC Keeppower KEFA Keil Keithley Keko Varicon Keli Kemet Kendeil KENDIN Kepo Kerlink Kern Engineering Kester Key Security Keystone Keytec Khalus Monolit Kilovac Kingboard Kingbright KINGS by Winchester Kingsignal Technology Co., Ltd KINGSING KINGSTATE Kingtronics Kinji Kinsun KIONIX Kipp & Zonen B.V. Kissling Elektrotechnik GmbH Klixon KLS ELECTRONIC CO LTD Knipex Knitter-electronic Knitter-Switch Knowles Syfer Knox Semiconductor KOA Kobiconn KOMAX Konfektronic Kontakt Chemie Korchip Kortek Kostal Kradex Kraftberg Kraus & Naimer KSS WIRING Kuantech(Shenzhen)Company Limited Kundo XT Kunshan Kunway Kunze KVH Industries Inc Kycon Kyocera Kyzen L&I s.r.o. L-Com L3 L3 Electron Devices L3 Narda-ATM Labworks Laird Technologies Laird Wireless Product Laird-Signal Integrity Products Lake Shore Lakeshore Lambda LAMIREL Lamtec LANTIG Lantronix Lappgroup Lappkabel Lascar Laser Components Lasr Componenets Lattice LC Elektronik Leach Leadtek Lear Corporation LEDIL Ledlink LEDs-ON Leenol Legerity Lelon LEM LEMO Lemo LESHAN RADIO COMPANY LG LGE Lian Da Jin Lian Dung LiConn Light Country Co., Ltd Ligitek Electronics Co., Ltd Lime Microsystems Ltd Lineage Power Linear Technology/Analog Devices Lingva LINK-PP INT'L LinkCom LinkCom Manufacturing Co., Ltd Linx technologies Liontech Lite One Lite-On Litec LiteMAx Lithiumwerks Littelfuse LittleBits LKPF Locosystech Inc. Loctite Lodestone Pacific Logic Logical Systems Inc. Logilink LONYUNG LED LIGHTING CO., LTD LONYUNG LED LIGHTING CO.LTD Lorch LORLIN Loudity Loupot Low Noise Factory LPKF LS Mtron UC LS Research LSI Logic LSR LUCENT TECHNOLODIES Lucky Light Electronics LUM LUM Lumberg Lumex Lumileds Lumileds Lighting, LLC Luminus Lumotech Luna Optoelectronics Lyontec Inc Lyontek M-A-Com M-Tron M/A-COM M3 Distribution INC Mabuchi motor Macom Technology Solutions Macroblock Macronix Magnetics MAGNETRON MAGTOP Makeblock Mallory Manncorp Manshun Int`l Ltd. Marathon Marchner Marki Microwave Marktech Optoelectronics Marmon Marquardt GmbH Marschner Marvell Mascot Master Instrument Corporation Masterfix Maszczyk Matrix Matsuhashi MATSUO Matsushita (NAIS) Matsuta Maxbotix Maxim/Dallas MaxLinear, Inc. MAXON Maxstream Maxwell Tech. MCC MCI COIL Mean Well Measurement Specialties Inc. MEC Switches MECCON Mechatronic Systems Mechatronika Meder MegaChips MegaSensor Megatron Megawin MEGGITT Meisei Meisongbei Melexis Meltric Memory Protection Devices MENTOR Merawex Merrii Messtechnik Metalvis METDA Corp. Metrofunk Meuro Microwave Corp. MG Chemicals MH Connectors MIC Master Instrument Micrel/Microchip Micro Commercial Components Micro Crystal Micro Linear Micro-Coax Micro-star international Microchip Microcrystal Microlab MicroLinear Micrometals Micron Micronas AG Automotive Micronas Semicon Micronetics MicroPower Direct Microsemi Microsoft MicroStrain Microtech Ltd. Microtips MicroTouch Microwave Solutions MicroWave Technologies, Inc. Midas Midcom Transforming Magnetics Miesongbei MikroEletronika Mill-Max Manufacturing Corp. MILLION SPOT MIMIX MIN SHIN MACHINERY CO. LTD. Min-Tec Minamoto Mingda Mini-Circuits Mini-Circuits MiniRF Minsound Minwa Electronics Co., Ltd Mirae Mirtec Mitel Mitsubishi MIYAMA ELECTRIC MJK Modular Robotics Module House Moffat Products Inc. Molex Money Controls Monolithic Power System Montage Technology Montavista MOOG Inc. Morethanall MoreThanIP Mornsun Mosel Vitelic Mosel-Vitelic MOTIEN MOTO Motorola MPD MPE-Garry GmbH MPM MS Power GmbH MSB MSI MTA MTM POWER Mueller Electric Multi Circuit Boards Ltd Multi-Contact MULTICOMP Multisort Elektronik Multitech Murata Murathon MURR Elektronik MYIR TECH Myrra NAIS NamA Electronic Nanoplus Nanotec NanYa Narda Microwave East National Electronics National Rejectors Inc. GmbH National Rejectors, Inc., GmbH National Semiconductor/Texas Instruments National Trad &Telecom Co.,Ltd. Nationalchip Nationstar Navman NCR Industrial NDK NEC Electronics America NEC LCD NEC Tokin NEDITEK NELTEC SA Neltron Nemic Lambda (Israel) NENGSHI Nenshi Neosid Neoway NESSCAP NessCap Co Ltd NETRONIX Neutrik New Age Enclosures New Japan Radio New Japan Radio Co., Ltd. Newhaven Display Intl NEXANS Nextchip NexTek NEXUS NIC Components NIC Eurotech Ltd. NICEAD Nicera Nichia Corporation Nichicon NICHIFU Nicomatic Nidec Copal Electronics Ningbo Forward Relay Ningbo Kepo Electronics Co Ningbo Sanhe Enclosure Ningxia Xingri Electronics Ninigi NIP Nippon Chemi-Con Nitronex NJR NJRC NKK Switches NMB NNK Noisecom Noisecom Nokiwave Norbain SD Norcomp Inc. Nordic Semiconductor Novacap Noves NOVES Electronics Novotechnik NRI NSC NSI-be NTE Electronics Nujira Numonyx Numonyx/Micron Nuventix Nuvoton Technology Corporation of America NVE Nvidia NXP/Nexperia/We-En NXU OBD Solutions ODU Ohmite OKI Semiconductors Oktek Okuma OKW Olimex Olimex LTD Omerin OMI Omnirel OmniVision Technologies Omron Omron Omron неробоча ON Semiconductor On Shore Technology Inc On-Bright On-Bright Electronics Onder Kablo Onpow Opnext Optek Technology (TT Electronics) Opto Opto Plus LED Corp. Optoflash Optolab Optosupply Optosupply International Ltd OPTREX Orgtechnica ORICO Technologies Co.,Ltd Orion Fans Osa Opto light Oshino Lamps OSRAM Osram Opto Semiconductors Osterrath Otto Oulun Electric Ouneva OWEREX Oxford Instruments Oxford Semiconductor Ozguven Kablo P1dB Panasonic Panasonic (passive) Panasonic Electronic Components Panasonic Industrial Battery PanCon Panduit PanJit Panox Papst Para light Paradigm Paralight Parallax Parlex Corp. Passive Plus Pasternack Enterprises Payton Planar Magnetics PCA PCB PIEZOTRONICS PCD PDI PDR PEAK Devices PEAK Electronics PEAK Systems Peak Tech Peerless Electronics Pelegrine Semiconductor PEPPERL+FUCHS Peregrine Semiconductor Pericom PerkinElmer Optoelectronics Permacol BV PFLITSCH Phihong Philips Lumileds Philips/NXP Phoenix Phoenix Passive Components Photonis Phycomp Phyton Pico Corporation Picotech Picvue PIERGIACOMI Piher Planar Plessey Pletronics Pluspark electronics Technology Co.,ltd PLX Technology PMA PMC Sierra PMC-Sierra PNY Pokoj Polam-Elta Polamco Pollak Poly Surg Polyfet RF Devices Polyphaser Pomona Electronics Poschel Posital Fraba Positronic Power Dynamics Power Innovations Power Integrations Power Mate Power Mate Technology Co Power Plaza Power Stor Power System Technology Power Trends Power-One POWERCAST Powerex Powerld Powersem PowerTip Powertip Technology PowTech PowTech PowTech PQI PR electronic Preci-Dip Precidip Precision Resistor Co.,Inc Preh Werke Premier Devices Premier Magnetics Premier Magnetics PRINCETEL Inc. prisemi PRO TONSIL Pro-An PRO-AN Electronic Co., Ltd Professor Co.,Inc. Proffuse Profichip GmbH PROJYE Prokit's Industries Co PROKIT`S INDUSTRIES CO., LTD PROLIFIC TECHNOLOGY INC. PROLIGHT Promet Promotive Industrial Co., Ltd PROTEK PTC Jinkeptc PTR Messtechnik GmbH & Co. KG Pudenz (Wickmann) Pueschel PUI Audio Puloon Pulsar Microwave Corporation Pulse Pulse (power supplies) Q-Logic QANTEK QIDI TECHNOLOGY Qimonda QINGLONG ELECTRONICS QingPu Electronics Qorvo QP Semiconductor QT Optoelectronics Quadrangle Products Qualcomm Qualitek Qualitek Qualtek Quanshang Quantum Quectel Quick Qwyconn R&B Electronics R&M R. G. Allen Co. Rabbit Semiconductor (DIGI) Radial Magnet Radiall Radian Radiel - Fondam Radiel Fondam Radiocrafts Radiohm Radiometrix Radiotechnika Marketing Sp. z o.o. (Польша) RadiSys Radmor RAFI RainSun Corp. Rakon Ralink Raltron Electronics Corporation Ramtron/Cypress RASPBERRY Raychem/Littelfuse RAYEX ELECTRONIC Rayson Raystar Raytheon RDL Reactor Realtek RECOM Recreus Rectron REDPOINT THERMALLOY Redtree RELEK Relpol RELSIS Renaissance RENATA Renco Electronics INC. Renesas Electronics Renesas Technology Rennsteig Reyax RF Circulator Isolator, Inc. RF Doorknob Caps RF Industries RF Lambda RF Micro Devices RF MICROWAVE RF Monolithics RF Solutions RFbeam RFGain Ltd. RFHIC RFM RFMD/Qorvo Rhopoint Ricco Richco Plastic Co Richey Richo Richpower Richtek USA Inc Ricoh Ricon Riedon RIGOL Rittal RMS Connectors Robert ROBOTIS CO., LTD Robustel Rochester Electronics Rogers Rohm Ronbo Rose Rosenberger Roving Networks Royal Ohm RPM System Corp RSCC Aerospace & Defence RSCC Wire & Cable Rubycon S+B Saab AB Sabritec Saft Battery Sagem Saint fun Samar Enterprises Sambers Italia Samsung Samsung Electro Mechanics Samsung LED Samsung passive Samtec Samwha Samxon San Jose Technology San-Tron Sanco Sanco SanDisk Sangshin Elecom Sanhe Sanken Sanken (Allegro) Sanyo Sanyo Capasitor Sanyo Semiconductors SAPA SaRonix (Pericom) Sauro Sawtek SC-TECH Scantool SCC specialty cable corporation Schaffner Schaffner Schaffner EMC Inc Schlegel Schlemmer Schleuniger Schnider Schrack Schrack Energietechnik GmbH Schroff Schurter SCHUTZINGER SCI Scott SDT Technology Seconix Seeed Technollogy Segger Seiko Instruments Seiko Instruments Selcom SELS Semikron Semileds Semitec Semtech Semtech International Sennheiser Sensata Sensirion Sensitron Semiconductor Sensolute Sensor Electronic Technology Sensor Switch Sensoray Sensortech (SGX) Sensus Metering Systems GmbH Seoul Semiconductors Serpac Servo Sesamesee SFERINCE SGC Technologies SGS-Thomson Shallin Electronics Shallin Electronics Co.,Ltd. Shanghai Beginor Shanghai Tuyue Electronics Co. Ltd. Shareway SHAREWAY TECHNOLOGY CO., LTD. Sharp Sharp Microelectronics (America) Shenzhen Baikang Optical Shenzhen Best Electronics Co., Ltd. Shenzhen BoXing World Technology Co.,Ltd SHENZHEN CHIP-PRINT CO., LIMITED Shenzhen Chunwang Shenzhen Crystal Technology Shenzhen Hi-optel Technology Co., Ltd Shenzhen Jiatemei Audio-Visual EquipmentCo.,LTD Shenzhen Jinghua Displays Co., Ltd Shenzhen Maxsharer Technology Co., LTD Shenzhen Sunbow Insulation Materials Shenzhen ZhongChen Electronics Co., Ltd Sherborne Sensors Ltd. Shibaura Shindengen Shinepower Shinepower Shing Yih Technologies Shinhom Shori Electric Shoulder Electronics, Ltd Shunde Zhongbao Thermostats Cp., Ltd Shure SHX (Shanghai Huaxiang Computer Communication Engi SIBA SICCOM Sick SIEMENS Sierra Wireless Sifam SiGe Semiconductor Sigma Desins Inc Signal Transformer Signal-Construct Signum SII Silan SILERGY Silicon Labs Silicon Radar Silicon Sensor GmbH Silicon Storage Technology Silicon Touch Technology Silicon Touch Technology Inc. Silvan Chip Electronics Silver Telecom SimCom Simtek Corporation SINGSUN Sipex Sipower Sirectifier Sirenza SiTIME Siward SJ Inno Tech SKS Kontakttechnik Skyworks SLEEK CO., LTD Smart Circuit Smart Way Smarteq Smartrac SMC SMC Diode Solutions SMC Pneumatics SMG SMI SMK SMSC SNJ Corporation Soaring DigTech Socionext SOKYMAT Solar Energy Source Solidyne Solomon SoMLabs Sommer Cable Song Huei Songshan Electronics Co., Ltd SoniCrest Sonitron Sonnenschein SONY Sony Ericsson Sorny Roong Industrial Souriau Southuire SP Devices Spacecraft Components Corp Spanawave/Giga-tronics Spansion SparkFun Electronics Sparklan Specialty Cable Corporation Spectrolab Spectrum Control Spectrum control GmbH Spectrum Digital Spectrum Digital Speedtech SPI Sprague-Goodman Sprintek Corporation Square D SR Passives SRC Devices SRI Connector Gage SSC SSI SST ST-Ericsson Stackpole Electronics Stancor Standard Standard Microsystems Standex-Meder Electronics Stanford Stanley Electric Stannol STARMEN OPTO-ELECTRONICS CO., LTD Starpower Stelvio S.P.A Stencil (Lazerine) STEPN COMPONENTS LLC Steward Stewart Connector STMicroelectronics STOCKO Stonecold Stratasys Strong Magnetics Sullins Connector Solutions Sumida Sumitomo Electric Device Innovations, Inc. SUMORE Sumsung Sun Electronic Industries Sun Microsystems Sun Rise Sunbank SunLED Sunny Sunny Computer Technology Europe Sunon Sunon USA Suntan Suntech Development Co. Ltd. Super-Temp Supertex Supreme Susumu SUZHOU Suzhou Sky Special Packing Material Co.,Ltd SUZO SV Microwave SWISSBIT Switchcraft Switronic Industrial Corp. SWT Optical Syfer SYHitech Sylex Sylvania Sylvania Synapse Wireless SyncMOS Synergy Synflex SynQor SYS TEC System General Taconic Tadiran Batteries TAEHWATRANS Tag-Connect LLC Tagarno TAI-SAW Technology co., ltd. Tai-Shing Tai-Shing Electronic components corp. TAITEK Taitien Taiwan TAIWAN ALPHA Taiwan Oasis Taiwan Semiconductor Taiwan Supercritical TAIWAY Taiyo Yuden Taizhou Fu Sheng Electronic Technology Co., Ltd. TAK Talema TAMUKA Tamura Tantalum Taoglas Taoglas Limited Tappex Tasker Tatarek TDG TDK TDK Invensense TDK-Lambda TDK-Teridian TE Connectivity (Tyco Electronics) TE Technology TE Technology, Inc. TE-Polamco Teapo Tecate Group Tecate Group TECCOR Techflex Technokabel Techtoys TECXUS TED Manufacturing Teko Telecom Design Telecontrolli Teledyne Telefunken Telegärtner Telegesis Telit Telpod Temex Temex Components Temic Temwell Tensility TENSOLITE Terasic TESA Tesat Testec Testo TEWS Technologies Texas Instruments TFC Ltd Thai Lin Radio Coil Thales That Corp. The Progame Electronics Inc. Thermaltronics Thermax Thermometrics Thies Clima THine Electronics, Inc. THINKING ELECTRONICS Thomas & Betts Thomas&Betts Thomson Thomson Thorlabs, Inc. Tianbo Tianli Tianma Times Microwave Tinghua (MLCC) Titan TME TMW(Tajimi) Tohtsu Co-Axial Relays TOKIN TOKO TOLO Machinery Equipmnet Co., Ltd TOMIC TOMY Tools for Talents Toppower Topxin Torex Semiconductor Ltd Toshiba Toyo LED Electronics Limited Toyoda Toyotomi Toyotomi TQSOLUTION Traco Power Trans Dimension Transcend TransChip Transcom Transradio Transwitch TranSystem Transystem INC. Traxsys TRI Innovation Tri-Star Triad Magnetics Trident Trim-Pot Trimble Trinamic Microchips Gmbh TRINAMIC Motion Control GmbH Tripath Triquint/Qorvo Triscend Trompeter-Cinch Connectivity Solutions TRP Connector B.V. TRU True Power Technology TRULY Trxcom Technology Inc. TS TST TT Electronics TTI Tundra Semiconductor Corp Tusonix/CTS TWINS Twintex TXC TYCO (Interconnect) Tyco Electronic Modules Tyco Electronics Tyco Electronics Meggitt Tyco Electronics/Corcom Tyco Electronics/MACOM Tyco Power Tyco Schrack Tyco/Axicom U-blox Ubilogix UF capacitors UIY Technology Co. Ltd. UMC Uni-Ohm UNI-T Unicorn Unigen Unilux Unique Broadband Systems Ltd. UNISONIC Technologies Co United Chemi-Con(UCC) United Monolithic Semiconductors (UMS) United Monolitic Semi Unitrode UPEC Electronics UPEK URT US Sensor Ushio UTC V.Torch VAC Vanson Vantis Variscite Varitek IC Market Varitronix Varitronix Display Varta Vatronics Technologies LTD VCC Vcom Veco Vector VectraWave Vectron VEGA-tronik Vegatronik Vermon Vero Technologies VersaLogic Corporation VFR VIA Technologies Vibration Research Vicor Viking VINCENC VINCOTECH Visaton Vishay (passive) Vishay BC Components Vishay Beyschlag Vishay Dale Vishay Draloric Vishay Electro-Films Vishay General Semiconductor Vishay Huntington Electric Vishay Intertechnology Vishay Semiconductor Vishay Sfernice Vishay Siliconix Vishay Spectrol Vishay Sprague Vishay Vitramon Vishay/IR Visual Communications Company - VCC VITEC Power Vitesse Vitrohm Vitzro Cell VLSI Solution Vogel Vogt Volgen America Voltronics VPOWERWINS W&P Products W+P Products W.L. Gore WAGO WAH WANG HOLDING Wakefield Walsin Wamtechnik WanTcom Wateron Watts MTR GmbH Wavecom Wavefront Semi Wavefront Semiconductor Way On Hi-Tech Wayon WDT ToolTech Weald Electronics WECO Weco Wee Chin Electric Machinery WeEn Semiconductor WEI-YA Weidmuller Weinschel Weinschel Associates Weipu Weirdy Weisser WEKANG CO., LTD Weller WELLS-CTI Wellshow Welwyn Wengao Wenrun Wenzhou Nicead Wenzhou QingPu Wera Werlatone, Inc. Westcode/IXYS Wever Communication White Electronic Design White Electronics Design Wi2Wi Corp Wickmann Wiedenbach Wieland Wiha WIMA Winbond Winchen Winchester Electronics Winchester/Kings WinMate Winsen-sensor Winstar Wintek WiseChip WISTRON WisyCom WIZnet WIZnet WJ Communications Wolfson Microelectronics Wolfspeed Woodhead WorldSemi WPI Interconnect Products Wuhan Forte Battery Wujang Wurth Electronics Inc Wurth Electronics Inc. Wurth Elektronik WUSTLICH Wyless Xelic Xiamen Xiamen Flying Silicone Rubber Co.,Ltd Xian Far East Xicon Xicor Xilinx Xinlong Semiconductor XINXIAN RIFUSEN XINXIANG RIFUSEN Xinya XMORE XMOS XP Power XSENS Yageo Yamaichi Electronics Yamato Yamazaki YAN CHUEN Co Ltd. Yangjie Technology YANGTIAN GAS YE EUN TECH CO., LTD YEEBO Yellow Stone Yeonhab YET YIC Yitran YLE relays Yoke Yokogawa Yoku Energy Yongfeng Crimping Yuasa Yueqing Daier Electron Co., Ltd Yueqing Zosvg Electronic Co, Ltd Yueqing Zosvg Electronic Co, Ltd. Yuhuan Solar Energy Source Z-Communications Inc. Zalman Zarlink Semiconductor ZeitControl Zemic Zetex Semiconductors Zettler ZF Electronics Zhejiang Junquan Automation Cp., Ltd Zhejiang KAIVEN Magnet Co.,Ltd Zhiwei Robotics Corp. Zibro Zilog Zlaczki ZMD ZOGLAB Zowie ZTS Maszczyk _Ampenol Industrial _Amphenol Connex _Amphenol Nexus _Amphenol PCD _Amphenol PCD _Amphenol Sine Systems _Amphenol Socapex _C&K _Connfly Electronic Co Ltd. _Hwasung _Microchip Expoler _Raychem/TE Connectivity _Rayex Electronics Co., Ltd. _Suntan_ _Toshiba America Electronic Components, Inc. _Toshiba TFT Displays _Toyo LED Electronics Limited Аверон Віаком Дискові системи Кабельний завод Квазар Квазар ИС ЛМВ-33 Навиа Национальная радиокомпания Украины Пульсар РКС ТзОВ "Віаком" Тортранс Україна Харьковский завод "Коннектор" | 2019-04-21T22:47:24Z | http://biakom.com/ger/providers/ |
30:15 Does consuming fat in the morning get in the way of intermittent fasting?
51:17 Does hypothyroidism cause dry eyes?
Steve Wright: Hey everyone, and welcome to another episode of the Revolution Health Radio Show. I’m Steve Wright from SCDLifestyle.com and with me is Chris Kresser, health detective and creator of ChrisKresser.com. How are you doing, Chris?
Steve Wright: I’m doing well, I’m doing well. You’ve been off for a little while, and we’re back on the show, so how have you been?
Chris Kresser: I’ve been well. It was nice to have some time off, you know, just to rest and be out in the sun for a little while, we had some really nice weather here, and catch up on a few projects I’ve been wanting to work on but haven’t had the chance to, and spend lots and lots of time with my family, so it was a great break.
Steve Wright: Awesome. Well, before we get started, I want to let you know that this radio show is brought to you by ChrisKresser.com and if you’re new to the paleo diet or you’re just interested in optimizing your health, check out Beyond Paleo. It’s a free 13-part email series on burning fat, boosting energy, and preventing and reversing disease without drugs. To sign up, just go over to ChrisKresser.com and look for the big red box.
All right, Chris, well, today we’re gonna do a mixed bag of things, so you want to kick it off?
Chris Kresser: Sure. Yeah, we’re gonna answer some questions again today, but I wanted to begin by talking a little bit about the article on raw milk safety that I wrote earlier this week and just some of the discussion that’s happened around it, because I think it’s an interesting topic both specifically in terms of raw milk safety itself and also generally in terms of risk/benefit analysis for any health-related activity or choice that we might make, and just how we go about making those choices, because I get a lot questions through my blog and from my patients and just in general about, you know, do you recommend raw milk? Or do you recommend eating eat seafood and raw oysters? Or do you recommend vaccination? Or do you recommend home birth versus hospital birth? And these are all questions that are on a lot of people’s minds, and they’re important questions, and I think it’s helpful to talk a little bit about how to answer those questions, because I never will respond just by saying: Yes, I recommend this, or yes, I recommend that, because it’s not that simple. There are a lot of factors that go into a decision like that, and some of them are data-driven. You know, we can look at the scientific literature, and we can determine from that what the relative risks and benefits are for a particular choice. And then some of them are values-driven, and in all of the cases that I mentioned, they’re both. You know, so values might include our particular worldview, what’s important to us, other non-measurable factors like, for example, in the case of home birth, there are a number of considerations like skin-to-skin contact with the baby after the baby is born, the type of environment a woman might want to give birth in, like in her home, in a place that she feels comfortable versus in a hospital, the type of people that she might like to have around her during the birth. These are things that won’t be covered in scientific studies, and yet they’re very important factors that go into how that decision is made.
So, I wrote an article this week, as I’m sure many of you are aware by now, about raw milk safety, and my purpose in writing that article wasn’t to make a “recommendation” for whether someone should drink raw milk or not, because I think that’s a choice that everybody needs to make on their own, based on their evaluation of the data, the risk, the possible benefits, and their own value system. But my purpose in writing that article, though, was to clarify what the data actually says about the risk of drinking raw milk, because that is fairly objective. There are data available, and we can interpret those data, and then we can decide what to do about that data. In other words, we can make a choice weighing the potential benefits versus the potential risks. Now that’s something that I don’t think we can argue about. If somebody evaluates the data and then determines that they don’t want to drink raw milk even if the risk is relatively low, then I’m not gonna argue with that. You know, that’s someone’s personal choice, but what I do take issue with is the distortion of the data or exaggeration of the risk of drinking raw milk, which is what I see all the time in the mainstream media. And it’s unfortunate that this issue has become so highly politicized, and it’s really become a lightning-rod or hot-button issue, and when that happens, the victims are people like you and me who just want to know what the facts are so that we can make our own informed decision, but those facts are being obscured by a tremendous amount of hype and propaganda, and in an issue like this, it tends to happen on both sides. So you get really entrenched viewpoints, and then it just, in my experience on issues like this, it just becomes kind of an “I’m right, you’re wrong” type of argument, and it’s not very productive, and the facts and the data are what get obscured, and it becomes more of just a battle of will or belief system.
So, the CDC and the FDA — I’m not going to go into all of the details because those are available in this article, and there’s a lot of data there for people who want that, but the summary is that the CDC and the FDA have been making a lot of noise about dangerous raw milk is, and it’s true that there is a risk with raw milk, and it’s true that there’s about a nine times greater risk of becoming ill from drinking raw milk than pasteurized milk, but what’s also true is that the absolute risk of becoming ill from either raw or pasteurized milk is incredibly low. In the case of raw milk, it’s about 1 in 94,000, and in the case of pasteurized milk, it’s about 1 in 880,000. So, this is a good time to talk about the difference between relative and absolute risk, which is really important to understand. We’ve talked about this before in the context of evaluating other scientific studies. If you talk about a nine times greater risk of something, it sounds really significant and scary, and that’s true if you’re talking about the risk going from 5% to 45%. That’s a gigantic leap, and it would have huge implications in terms of safety, but if you’re talking about the risk going from, you know, one ten-thousandth of a percent to one one-thousandth of a percent, then that’s a much less significant jump, and the absolute risk, even though it’s nine times greater in that example, is still very minute. So, this is an important thing to understand in this whole decision on raw milk, and you see these headlines, you know, “Raw Milk Much More Dangerous Than Pasteurized Milk,” and for someone who doesn’t look any deeper, that might be enough to turn them off to it, but it’s really important to understand that the absolute risk of getting sick from drinking raw milk is really low, and the absolute risk of getting sick to the point where you would need hospitalization is even lower. In the period that I looked at from 2000 to 2007, the absolute risk was about 1 in 6 million, and I used some comparisons in the article to just give people a kind of rough idea of how that risk compares to other risks that people take on a regular basis, and it’s not an exact comparison, of course, because they’re just generalizations. They don’t take into account the frequency with which people engage in these activities, but according to the US Department of Transportation, the risk of dying on a plane crash is about 1 in 2 million, you know, for the person who flies an average amount. So, the risk of dying in a plane crash is greater than the risk of becoming hospitalized from drinking raw milk during the period of 2000 to 2007.
So, really it’s a small risk, but it really boils down to risk tolerance. So if somebody reads the article that I wrote and they understand what the facts actually say, and they still decide after reading that: Hey, you know what? I understand that the risk is small, and I just don’t want to take that risk. I don’t want to take it myself or I don’t want to take it for my children. That’s fine. I completely respect that. But it’s just important to me that the facts are clear, and that was my purpose in writing that article. And, in fact, that’s my purpose when I wrote about home birth. I wanted to set the record straight on what the relative risks were for home birth versus hospital birth, because that’s something that there’s also a lot of hysteria and misinformation around that issue. And when we talked about vaccinations, my point was not that there’s no risk in not vaccinating. I think that’s untrue, there is a risk, but there’s also a risk in vaccinating. So these are all decisions that really can’t be made just based on the data alone, and you have to consider your values and your priorities and your world view and what you’re comfortable with, and that’s why I think that the “debate” will never end with these types of issues, because a lot of the factors are subjective. And as long as we’re thinking and unique individual human beings, there are going to be these differences.
Steve Wright: Well, I appreciate you writing that article because I, for one, was getting mixed up between the two sides of propaganda. There are just so many YouTube videos one side and so many articles on the other that it’s very helpful to see that in this light, so I appreciate it.
Chris Kresser: Yeah, sure. And there are a couple more articles coming in the series. The next one we’re gonna talk about what the potential advantages of unpasteurized milk are versus pasteurized milk, and again, there are some things that are more clear than others there. There’s some epidemiological research that suggests that raw milk might help prevent allergic diseases and asthma and other immune-mediated conditions, but as we know, epidemiological data don’t prove causation, so we can’t know for certain that raw milk is the deciding factor in those studies. And then there are other claims that are made about the nutritional differences, some of which are more easily substantiated than others, but the truth is there’s just not a lot of high quality research on the differences between raw and pasteurized milk. So, for the people who say that hasn’t been proven, yes, that’s true, but lack of proof is not proof against. And for a lot of people, just experientially or the experiential difference, you know, they drink pasteurized milk, they notice how they feel, and then they drink unpasteurized milk, and they notice the difference in how they feel, frankly that’s gonna be enough for a lot of people. And for most people who are drinking raw milk now, that is enough because the average person doesn’t dig into the scientific literature and read every study there is on the differences, and they don’t wait for scientists to do that kind of research before making up their mind. Again, there are a lot of things to consider, but I think the main point I want to get across here is that a lot of the decisions that we make about health and wellness are not just driven by data alone. They’re driven by our value system and our priorities and our world view, and that’s perfectly valid, and they’re important criteria in the decisions that we make.
Steve Wright: Well, I’m looking forward to the rest of the series, and I hope that you also do a piece on homogenization because I’m interested in that.
Chris Kresser: Yeah, we’ll talk a little bit about that, I think. It’s hard to keep these articles short enough so that people will actually read them! The first article was almost 3000 words, and I felt like it could have been a lot longer than that. So, we’ll be as thorough as we can without being overwhelming.
Chris Kresser: So, we can move on to the questions now. That’s all I have to say about that.
Chris Kresser: Not for the average person. So, we have mechanisms where the cells in the stomach can sense how much iron we have in our body stores, and when the body stores are low those cells will absorb more iron from our gut, and when our body stores are sufficient they won’t absorb as much iron. They won’t absorb any iron, and we’ll just excrete it. That’s the way normal iron metabolism works. But some people have mutations in the genes that code for some of these proteins, and then that whole system gets messed up. For example, in hereditary hemochromatosis, which is one of the most common genetic mutations in people of European descent, which causes pretty aggressive iron overload, that regulatory mechanism is broken, so the body can’t communicate how much iron that it actually has, and so the cells in the gut just keep absorbing more and more iron inappropriately, and more iron gets stored up in the body. So, for someone with a genetic mechanism like that, like a genetic mutation like that, it’s possible that cast iron might have an effect, especially if the pan is old and hasn’t been well seasoned over time to protect it. Eating liver regularly definitely would be a risk factor for people who have an iron storage mutation like that. It’s not for people who don’t, because as I said, in normal physiology you just excrete any additional iron that you take in, but as I said, it’s one of the most common mutations in people of European descent. In fact, about 1 in 200 to 1 in 300 people in the US have hemochromatosis, so it’s actually not that rare, and that’s one of the reasons that I always run iron panels on my patients, particularly men, because it’s a pretty common thing, and it’s often not diagnosed. Almost every patient that I’ve diagnosed with iron overload, it was the first news they had ever heard of it. It’s something that just seems to fall through the cracks a lot. So in summary, if you don’t have one of these mutations, you don’t generally have to worry about how much iron you’re eating in food or cooking in cast iron, but if you do have one of these mutations or you’ve tested high in iron previously, than it’s something you probably should pay attention to.
Steve Wright: Great. So do you use cast iron, or do you recommend it?
Chris Kresser: Yeah, I use cast iron, but we mostly use ceramic cookware, like the Le Creuset. We use some stainless steel for applications when we just want to heat something up quickly, you know, boil some water or whatever, and then we have one cast iron skillet that we use. So it’s kind of a combination of things.
Steve Wright: Gotcha. OK. Great, well, let’s roll on to the next question. This one’s from Josh, and he’s wondering what you thought the best science to major in before he goes to naturopathic school would be.
Chris Kresser: Yeah, that’s a good question. I get that one a lot. I think it really depends on your interests. There are a number of potentially good choices. Like, biochemistry would be one. Physiology would be another one. And I don’t think it matters all that much. What I do think matters is that you’re interested in the subject matter and you’re engaged in it, and that’s probably the most important factor of all, because as you progress through your medical education, whatever route that you choose to do, if it’s naturopathy or medical school or something else, you’re gonna be exposed to all of the other disciplines and everything from anatomy to physiology to pharmacology to biochemistry. You’re gonna cover it all, so I think early on it’s just important to do something that interests you and that you can get excited about and you feel engaged by. I don’t think it matters too much within those basic sciences what you do.
Steve Wright: Is there anything that you should be doing on the side while you’re going to school, because I know school can be demanding, but a lot of times there’s some free time?
Chris Kresser: Yeah. Well, when I was in graduate school, I did a lot on the side. I did a lot of continuing education programs. I did some mentorships with other practitioners and teachers, and I did have some spare time, and I was at a point in my life because I went back to school fairly late in my life, I was very focused on my career and getting the ball rolling, so I actually started my blog, which was formerly The Healthy Skeptic, while I was still in school, and that was primarily a way for me to just keep track of my own research. I don’t know if I’ve told this story before, but when I started my blog, I had absolutely no idea that anybody else would ever read it. It was just that that format seemed to be the easiest way for me to kind of keep a record of what I was interested in and the kind of research that I was doing, and I’m the sort of person that learns well by doing. You know, I’m a kinesthetic learner, so if I read something and then I take notes on it and then I write something about it, then it’s imprinted in my brain in a way that it never gets imprinted if I just listen or read. So, I started The Healthy Skeptic, and then I was surprised to find out that people were actually reading it and leaving comments, and one thing led to another. So, that can be really useful. If you’re in grad school or even as an undergrad, just start writing because it’s a really good way to test your knowledge of the material. When you read something and then you write, you’re taking it through your own filters, and if you’re able to write about it in your own language, you’re gonna be much more likely to retain that information and be able to talk about it with other people. So, I think that’s something you can get started with right away, and then looking around and seeing what’s available in terms of…I think this person is interested in functional medicine even though he is going to study naturopathy, so you can look around for some functional medicine courses that might be available. Usually they have student rates. I mean, I really took advantage of that when I was a student. Many of the companies that teach these seminars, and some of them are nutritional supplement companies or some of them are lab testing companies, like Metametrix does some seminars. Almost all of the lab testing companies have seminars where they talk about their lab tests but also just functional medicine topics in general, and some of them have just amazing student discounts. One company, Apex Energetics, I did some seminars with Datis Kharrazian and some other people. You know, their normal weekend seminar rate was something like $450 or $500. I could be misquoting that, but something like that, and for students it was $50. So, I mean, I just took every single course that they offered while I was a student so I could take advantage of that discount. Those are all good options, and then of course, make sure you save some time and have fun and manage your stress because graduate school and even undergrad when you’re doing pre-med type of stuff can be, like you said, Steve, really stressful, and I see a lot of people graduate from school being totally burnt out and wrecked, so it’s a good idea to protect your health and make sure to take care of yourself while you’re doing all of this stuff.
Steve Wright: Yeah, that’s all good. I’m glad you shared that story, and I think there have been a lot of masters that have said you don’t necessarily truly learn something until you teach someone else.
Chris Kresser: That’s right. There’s an old Daoist saying: True knowledge is action.
Steve Wright: Yeah, and that’s a great point. You know, I hate to hear about people who have the best of intentions when they go into undergrad for pre-med and then end up burning out before they ever finish, so have a lot of fun, people!
Chris Kresser: Yeah, and you know, along those lines, I know I already said this, but you have to find a way to make it interesting for yourself, and that’s the biggest piece of advice that I have to anyone who is pursuing that kind of path. I got really interested in cholesterol and heart disease and that whole myth and debunking that, and that’s how I started writing my blog, and I just kind of went from one topic to the next like that while I was in school, and that kind of became primary while I was in school. Like, the research I was doing outside of school and the writing for my blog was my main fascination, and then school was a way of sort of fueling that and helping to learn about research methodology and some of the other things. Like, when I was in school, a lot of the people that I was studying with, like in my research methodology class, just hated it. They were bored out of their minds, and I think part of it’s because a lot of people who go to study acupuncture they don’t really care about that. They’re more interested in Chinese medicine, not Western medicine, but for me that was such an amazing resource. The guy who taught it was a researcher at Stanford at the Cancer Center at Stanford, a really knowledgeable guy, and it was just so cool to be able to learn about that, learn how to evaluate studies, and I had a context, you know, a reason to learn it because I was reading all of these studies and it was on a topic that I was passionate about. So, yeah, finding a way to make it really interesting is important. I think that’s what makes a difference between people who burn out and either don’t make it through or just are miserable the whole time and people that end up really enjoying it and getting a lot out of it.
Steve Wright: Do you have anything to say to the people out there who are in any of these disciplines and they think along the paleo, evolutionary health perspective, but they’re stuck with professors in classes that are of the previous paradigm?
Chris Kresser: Yeah, I guess that’s a similar evaluation that we were talking about before. I mean, it’s a question of how you want to spend your energy. I mean, in some cases I think making a lot of noise about it is equivalent to beating your head up against a brick wall. You know, you just kinda have to look at the situation and evaluate how much energy you want to spend trying to change other people’s minds in that situation, how likely you think it is that that will even happen, you know, how open are they to hearing the information that you have to share. So for me, it varied from situation to situation. Like, I was already doing presentations and talks when I was a student in graduate school at the school, so when I was working on my heart disease and cholesterol research, I started giving presentations, and that was a good way for me to kinda get this information out there without spending all of my time being that guy in class who was always, like, contradicting everything that the professor says. And a lot of times it was hard because I’d have to sit there and listen to stuff that I knew was not true and not accurate, but in the end, in some cases I would raise my hand and say: Well, what about this? Or have you heard about that? But in a lot of cases during that time I would just be sitting there thinking about my other research or taking notes on something else, so I think that’s kind of a personal decision and it depends a lot on someone’s personality and how much energy they have for that kind of stuff and choosing your battles. Like, I choose to spend the vast majority of my energy helping people that really want my help. That’s just me. There are some people whose vision is to get out there and change everybody and change everybody’s mind, and I think that’s great, and ultimately, of course, I’d like everybody to know the facts about all of these things that we talk about and to follow a lifestyle and a diet that makes them healthy and feel good, but I’m not generally the kind of person that will…I choose my battles. Let’s put it that way, and you know, there’s a limited amount of time in the day. There’s a limited number of days in the week. You know, I don’t have unlimited energy, so I choose to spend that writing my blog and doing this radio show and making this information available to people who want to come find it. I’m not the guy who will go to a vegan blog and leave a bunch of comments that are trying to convince them that eating a paleo diet is the best choice. That just doesn’t make any sense to me. To me, that’s a complete waste of energy and time. But to each his own.
Steve Wright: Yeah, I think that’s really wise, and I’m glad you covered it, and I think the sum there is if you’re really angry and you pick and choose your battles, write your words on a blog somewhere, and we’ll probably all be reading it someday.
Does consuming fat in the morning get in the way of intermittent fasting?
Steve Wright: All right. Well, let’s move on to the next question. This one comes from Yoshi, and it’s about Dave Asprey and his blog, The Bulletproof Executive, and his question is: Dave recommends bulletproof coffee in the morning with your first meal. And he wants to know if you’re having fat in your coffee, which bulletproof coffee is grass-fed butter, MCT oil, and coffee, I believe. So, if you’re doing that in the morning, are you actually intermittent fasting?
Chris Kresser: Yes. I mean, probably opinions will differ on this, but the idea behind intermittent fasting or one of the main things is to promote autophagy, which is the cellular garbage recycling process basically, and fat will not get in the way of that. Eating protein or carbohydrates will. So, if you are intermittent fasting and you have some coconut oil or, in this case, coffee, which has no carbohydrate or protein, and you add some fat to it, that doesn’t technically, in my opinion, get in the way of the potential benefits of intermittent fasting. If you’re doing intermittent fasting for weight loss, depending on what your beliefs are about weight loss, that may or may not interfere. If you’re just doing a very low carb, intermittent fasting type of approach, then eating fat wouldn’t interfere. If you’re doing a caloric-restricted kind of program, then adding a whole bunch of fat to your coffee, you’d have to obviously consider that in your overall calorie intake. But if it’s more of a question of health and autophagy, then it’s not gonna interfere.
Steve Wright: OK. Well, that’s good to know because I know some of the more popular intermittent fasting routines such as Martin Berkhan’s at Leangains.com and Brad Pilon’s Eat Stop Eat, those are more around losing weight, not necessarily lifelong health.
Steve Wright: And I have been trying the Bulletproof Exec coffee, and it’s very delicious.
Chris Kresser: Yeah? You like the MCT oil in it?
Steve Wright: I do! The only thing that I don’t like about it is it’s almost like a latte, and I like my coffee black.
Steve Wright: So, you actually throw the MCT oil in there and some grass-fed butter and you spin it up in a blender like he recommends, it really turns all frothy.
Chris Kresser: Yeah, I tried that, and I mean, nutritionally I think it’s great, but coffee and cream, to me, is the best combination ever. Especially raw cream that I get from our local farmer here. It’s like heavenly.
Steve Wright: Do you blend it?
Chris Kresser: I don’t blend it. No.
Chris Kresser: Just adding cream. And the ratio for me is like one-third cream, two-thirds coffee, so it’s very, very creamy.
Steve Wright: Do you do a couple cups of that?
Chris Kresser: No, and I don’t do it every day, because I don’t do that well with a lot of caffeine. I’m one of those really caffeine-sensitive people.
Chris Kresser: Just maybe three to four mornings a week, and even then, it’s probably weaker than some coffee aficionados would like.
Steve Wright: Yeah, the one thing I did notice just switching to Dave’s brand, believe it or not, I’ve been trying a lot of different organic brands, and the phlegm that I was getting some mornings from various coffees, I kinda actually ended up tracking it down to the coffee. You know, I’m not sure how much science there is to the mycotoxins and what he does over there, but I’ll tell you, when I switched to that coffee, the problems that I was having with your high-end, big-box coffee store stopped.
Chris Kresser: Right. Yeah, I think when it’s roasted is really important, and there aren’t that many places that you can buy coffee that are really, really fresh roasted.
Steve Wright: Great. Well, I’m gonna have to get my hands on some raw cream because I don’t have any sources for that over here.
Chris Kresser: Well, I mean, even pasteurized cream can be pretty good, but the raw cream here that we can get is even thicker than the cream that you can typically buy in stores. It’s la crème de la crème. Yeah, very, very good.
Steve Wright: All right, well, we’re all coming over to your house for coffee next week.
Chris Kresser: Yeah. It’s actually making me want some coffee right now. Hang on a sec.
Steve Wright: Pause for the cause!
Chris Kresser: I’m just kidding.
Steve Wright: And we’re back!
Chris Kresser: Now I’m bouncing off the walls. Let’s go! Let’s go!
Steve Wright: Ha, ha. OK, well, the next question, after our coffee break here, is from Ryan. And this one’s a bit of a long one, but we’ll get it all in because it’s important. So, Ryan says: “First, I just want to say thanks for all the great information you provide. I really appreciate it, and I know a lot of others listeners do too. I have been attempting to lower my fasting blood glucose for the past year or so. It had been steadily rising over the past year and a half, so it was routinely now around 110 when I was first waking up. My total cholesterol has been rising at the same time to where at last check it was around 300 (HDL was 80, and triglycerides were 80). So, first I tried supplementing with magnesium citrate and had no effect. I just recently heard on your podcast about glycinate and malate forms, which are better,” or he heard that they were better. “Next I tried increasing my overall carbohydrate intake, which hasn’t helped. Then I came across a post on your site from 2010 describing the negative effect that intermittent fasting can have in certain cases. I had been doing intermittent fasting daily 16 to 20 hours” total, I’m guessing there, “along with heavy weight training in the fasted state four times a week for about a year, so your post hit home with me. For the past week and a half, I’ve been eating throughout the day, but so far my morning glucose is still around 110. I have not been eating breakfast right after waking and usually two to three hours later,” so it sounds like he’s eating breakfast two to three hours after he wakes up, and then after that he tries to eat a meal every three hours or so. It’s been two weeks now on this new eating schedule, and he was hoping to see some improvement, but nothing’s happened. He wants to know how long patients who switch from intermittent fasting to regular meals have taken to see improvement.
Chris Kresser: It can take a couple of weeks usually, but there may be something else going on here. One thing to consider is latent adult autoimmune diabetes. Most people probably know there are two main types of diabetes. There’s type 1 diabetes, which is usually an early onset during childhood, autoimmune diabetes, and then there’s type 2 diabetes, which usually comes on later in life and has certainly a genetic predisposition but is also triggered by a lot of environmental factors. Recent research suggests that the lines between those two might not be as clear as we previously thought and that there’s another type of diabetes. Sometimes it’s called type 1.5, or sometimes it’s called LADA, latent adult autoimmune diabetes, and it’s kind of a combination. It has an autoimmune component, but it manifests more like type 2 diabetes than it does like type 1. And I’ve forgotten the exact numbers, but I think one estimate that I saw suggested that as many as 15% of people who are incorrectly diagnosed with type 2 diabetes actually have type 1.5. So, it’s possible something like that might be happening, and in that case, diet would certainly be important, but you’d also have to take steps to address the immune dysregulation to make some progress with it. Another thing to consider is iron overload, which we were just talking about earlier in the show. Iron overload can damage the beta cells of the pancreas and cause insulin deficiency and insulin resistance, and there’s a type of hemochromatosis that is earlier onset called juvenile hemochromatosis. It’s fairly rare. I wouldn’t guess that’s what’s happening, but the main form of hemochromatosis can start to come on in the late 20s and early 30s. That’s a possibility. You know, I originally was thinking that a very low carb diet can cause this dawn effect where you can have high fasting blood sugar and then your blood sugar will come down to normal levels after you eat a meal.
I think that the next step here would be, if you haven’t already done this, to measure your post-meal blood sugars. So you get a glucometer, and I have some posts on my blog that describe how to do this. We can put it in the show notes. And you measure your blood sugar in the morning. I assume he already has one if he’s taking his blood sugar all the time, but you measure just before lunch, then you eat lunch, and then you measure at one hour, two hours, and three hours after. The targets that you want to be under are 140 at one hour and 120 at two hours, and if you’re under those targets and well under those targets but your fasting blood sugar is still high in the morning, that indicates a few different possibilities. Number one, fasting blood sugar is more of an indicator of liver insulin sensitivity, and post-meal blood sugars are more of an indicator of muscle and fat cell insulin sensitivity. So, it’s possible in that situation that there’s a liver insulin resistance issue, and again, that could be mediated by iron, that could be an autoimmune mechanism, or possibly a genetic mechanism because there’s a really strong family history there that he mentioned. If the post-meal blood sugars are elevated, you know, above 140 at one hour or above 120 at two hours, and the fasting blood sugar is elevated, then I would pretty strongly suspect some kind of autoimmune mechanism at that point in light of how much exercising and, you know, it sounds like the diet is pretty clean, so in that circumstance I think getting some help from someone who can help figure it out would be a good idea.
Steve Wright: OK, well, hopefully that helps him out. OK, the next question is from Anonymous or we lost his name, so sorry. “Chris, could you address strategies for controlling sympathetic nervous response when facing a pressure-filled situation like an interview, presentation, or audition? My wife is an actress and is looking for ways to go into auditions more relaxed. At times, her sympathetic nervous system gets going too fast, and she shakes and gets dry throat. On the other hand, the times when she feels at ease and relaxes, she knocks auditions out of the park. She would like to be able to control her nerves consistently.” And he wants to mention one strategy that has seemed to help is taking magnesium glycinate and calcium AEP before the audition. Also simply doing more auditions helps. What else could it be?
Chris Kresser: Yeah, so there are a number of ways to approach this, of course. One is nutritionally, which he discussed. The way that I would tend to think about this, though, is more from a behavioral perspective, and there are a number of things that can be done to help manage stress and dampen the sympathetic nervous system response before an audition or a speech, public talk, anything like that. One of those is mindfulness practice, and we’ve talked a lot about this on the show and on the blog. Just bringing your awareness into the present moment can be really, really helpful in reducing that stress response, and that can be done in a variety of ways. The simplest way of doing it is just bringing your attention to your breath, and importantly because I think a lot of people when they talk about this, they talk about doing deep breathing. That can be helpful, for sure, but I’m not a big fan of that technique because that involves manipulating your breath, and for some people, trying to control their breathing, which is really one of the most natural processes there is, can actually add stress and can be stressful in its own right. So, when I say bring your attention to your breathing, what I mean is just that. Just be aware of how your breathing is without trying to intervene and control it or make it deeper or shallower or anything else, just bringing your attention to your breath, watching what it’s doing kind of just like you’d watch clouds moving through the sky. That’s one way. Another way is what’s called a body scan or a progressive relaxation exercise or a body sweep, and this where, for example, if you’re sitting in a chair outside the audition room waiting or in your car when you’re waiting, you just sweep your attention through your body. You start maybe with the toes on your left foot, and you gradually sweep your attention from the toes of your left foot into the ball of your foot and the top of your left foot, then to your heel, and you just move through the body that way, all the while just letting your breathing be easy, and any time your mind wanders, which it almost certainly will, just bring your attention right back to where it was before. There’s no need to start over. There’s no need to beat yourself up for your mind wandering. Just bring your attention right back to where it is, and just doing that, getting all the way through the body, by the end of that, I can almost guarantee you you’ll be significantly more relaxed. There are some MP3s that are available for free online that guide you through these body scans and similar techniques, and we’ll put a link in the show notes. So, doing that can be really helpful, and I really recommend that because it’s something that you can teach yourself to do, and it’s something that will always be available to you. It doesn’t involve taking any supplements or making any changes as far as that goes. And there’s nothing wrong with taking supplements, but I always believe that less is more, so if you can accomplish something without adding something new just by working with your own awareness, then that’s probably a better choice.
Another thing along those same lines that can be really effective in reducing stress and optimizing performance is visualization. There is a lot of research behind the positive effects of visualization on all kinds of performance-based activity from athletics to public speaking. I’m not sure if there are any studies on acting specifically, but I’m sure that whatever the studies are for public speaking would apply there. So, getting a good book on visualization or some tapes on visualization techniques would be another good choice. And something that I used to use before a big exam like the state board examinations or a final exam or something like that is tai chi and qigong, which is something that I learned years and years ago in college and then have studied pretty consistently on and off for about 20 years with various teachers. You could think of them both as moving meditations, and qigong, in particular, focuses on the breath and various breathing techniques coordinated with movement, and tai chi also does, although to a lesser degree. But for some people who have trouble just doing seated meditation techniques or visualization or mindfulness because their mind is so busy or if they’re so triggered, like they’re really nervous about an audition, doing some kind of moving meditation like tai chi or qigong might be even more beneficial because when you’re waiting for an audition, some of that nervousness is probably…it’s just energy. I mean, we can label it as fear or nervousness, but it’s energy, and a lot of the best performers find a way to channel that energy into the performance. The idea isn’t to get rid of that energy because that’s what’s gonna fuel the performance. The idea is to learn to work with it and channel it in positive ways. So, I think doing a moving type of meditation might be even more helpful in that regard, and just recognizing that some amount of nervousness is probably a sign that you’re in the right place. You know, it’s still an activity that’s really alive for you. There’s a quote from Sammy Davis, Jr., that I’ve always really liked, where he said: The day I stop getting nervous before I perform will be the day that I stop performing. And I think that just kinda gets at the juice there was for him in performing. So, all of those are good options, and I think they can probably be helpful.
Steve Wright: Yeah, I guarantee that it can be, and speaking from someone who is more of the…I get real amped up, a couple things that I’ve done in the past was actually, like, if you get really worked up and you’re not about to do a physical performance-based thing is just to drop down and just do push-ups until you’re exhausted. That’s one to way to get out of your head and kinda get into your body.
Chris Kresser: That’s right, that’s right. Get a heavy bag!
Steve Wright: Yeah! Basically just figure out a way to dissipate some of the energy so you can calm things down a little bit.
Chris Kresser: Yeah. Another thing, and this is maybe not so much for an audition, although I think it would apply there too, but for tests it’s a really bad idea to be studying right before a test. From a neurological standpoint and how memory works, the best way to do it is to get all the studying done the day before, and on the day of the test to wake up, do some exercise, do some mindfulness practice or meditation, something relaxing, you know, something to actually take your mind off of the test, and just make sure you’re really prepared the day before. And I’ve seen some interesting research that people who do that tend to be perform a lot better than people who are, like, standing outside, reading all their notes just before they go in the test or, in this case, studying the lines.
Steve Wright: Yeah, and I’m sure sleep has a big to-do there as well.
Chris Kresser: Yeah, absolutely. OK, so I think we have time for one more short one. How about the dry eyes question?
Does hypothyroidism cause dry eyes?
Steve Wright: OK. All right, here we go. This comes from Grace, and she says: “Hi, Chris. Recently I went to a new optometrist, and on my new patient forms I indicated that I had hypothyroidism. I was diagnosed with hypothyroidism about five years ago, and I’ve been on various medications since. During my appointment, the optometrist explained that the reason I have dry eyes is due to my hypothyroidism. I had never heard of this before. Could you explain the mechanisms of how this works? Are there any foods or supplements you would recommend to reduce the dryness in my eyes?” And she notes that she recently started the 30-Day Paleo Challenge, and she is hoping to see some change in her symptoms. Thanks.
Chris Kresser: Yeah, well, there’s a condition called thyroid eye disease, and that is potentially what we’re talking about here, and the majority of thyroid eye disease cases are associated with hyperthyroidism more than hypothyroidism, but about 10% are associated with either euthyroid, which is normal thyroid, numbers or hypothyroidism. And in most cases, whether it is hyperthyroidism or euthyroid or hypothyroidism, it’s caused by autoimmune thyroid disease, which involves specifically a cross-reactivity against shared antigens in the thyroid and eye tissue. So, the immune system is attacking antigens in the thyroid tissue that are similar to antigens in the orbital tissue, so you get a cross-reactivity there. So, the first thing that I would do if I were her would be to get thyroid antibodies tested, thyroid peroxidase (TPO) and thyroglobulin (Tg) antibodies, to see if you have Hashimoto’s, which since you mentioned hypothyroidism, that’s much more likely than Graves’, which causes hyperthyroidism. And if you have autoimmune thyroid disease, then the key, as I have said before, is going to be addressing the immune dysregulation, so taking steps to balance and regulate the immune system. That involves optimizing vitamin D levels, optimizing glutathione status, removing food toxins from the diet, which it sounds like you’re already doing with the Paleo Challenge. Low-dose naltrexone can be really effective in stimulating T regulatory cell function. So, that would be addressing the root of the problem if it is autoimmune in origin. Fermented cod liver oil. I’ve seen some benefits and success with fermented cod liver oil / butter oil blend from Green Pasture with dry eyes and dry skin, for that matter, dry scalp. Vitamin A is really important for the eyes, and vitamin A is in the fermented cod liver oil, preformed vitamin A. And then the EPA and DHA, the omega-3 fats, can be helpful as well. So, first step, see if it’s autoimmune in origin, and if it is, address that. And in the meantime, if you’re not already doing it, try the fermented cod liver oil / butter oil blend.
Steve Wright: Is it bad in the meantime to be using any of those eye drops that remove the red and kinda lubricate things?
Chris Kresser: I don’t actually know a lot about those eye drops. It’s just not something that I’ve come across very frequently in my practice, and I don’t really know, to be honest, what the downside of those drops might be, if any.
Chris Kresser: And I don’t have any eye problems myself, so I’ve never had any reason to look into it, so I’ll have to put that on my list of topics to learn about.
Steve Wright: Yeah, I’ve had them in the past, not so much lately, but I know back pre-SCD, pre-paleo, I did have a lot of eye problems.
Chris Kresser: OK, well, that’s gonna do it for today. We’re never able to get through quite as many questions as I think we’ll be able to, but we’ve got some great questions on deck that we’ll get to soon, and keep sending us your questions. We’re gonna get to them eventually.
Steve Wright: Yep, we keep them on the list, and maybe next time if we don’t take such a long coffee break we’ll get through more questions.
Chris Kresser: If I’m not so long winded, you mean!
Steve Wright: No, that’s not what I said! All right, well, thanks everyone for listening today. Please keep sending your questions at Chriskresser.com using the podcast submission link. And if you enjoyed listening to today’s show, please head over to iTunes and leave us a review.
Hi Chris, not sure if this is the submissions link referred to by Steve, to ask questions for future show?
Re high ferritin levels and inflammation.
You say that there can also be a link between inflammation and high ferritin levels. The hormone hepcidin can prevent release of ferritin (stored iron) and so cells can be short of iron, even though have high storage levels of iron.
My question is, does the high ferritin level not pose the same risk to the body/organs that you mentioned because it is not getting to the cells or is there the same risk and so should I reduce dietry iron even though cells may be short of it?
Obviously the quest is to get inflammation down, am trying with some success but have RA but not sure what to do about iron in the meantime. I am through menopause, weigh approx 98 pounds – my natural weight presumeably as stableised following Paleo/PHDiet but ferritin levels have increased over 12months from 99 to 141, fibrinogen is also connected then, mine is worryingly in abnormal high range 5.5 and yet clotting time (APTT) is 30.8 seconds. (I had tested as take curcumin and eat a lot of ginger) and was shocked to see fibrinogen level.
So for us folks with inflammatory conditions, could you please elaborate on what we should be doing or taking note of.
Many thanks Chris, will you possibly be addressing in your book?
We know that pathogenic bacteria in the gut consume iron. I wonder if paleolithic people’s intestinal flora had more of these iron consuming bacteria, thus keeping iron levels in a safe range. Thoughts??
Just wondering if high ferritin (272) would be indicative of iron overload, even if hemoglobin is normal. And what does high ferritin have to do with insulin resistance?
Hey Chris not sure if you will get this since this podcast is a bit dated but you bring up Naturopathy school which is something Im seriously considering over the next couple months. So far I’ve only gotten my associates degree in a non science/medical field. How much schooling or college did you do for Naturopathy and before for pre med? Any colleges or resources that you could link to or help out? Im up in the northwest, a little north of Vancouver, Washington and Portland, Oregon, I know there are a few naturopathy schools up here I believe. Any help or tips on getting some good loans or grants as well since I am tight on money as it is. When I got my associates degree I got a scholarship and a loan to help pay for it.
For sympathetic nervous system response for the actress wife – nothing I found works bettervthan EFT or Energy Psychology. (her leg shakes and mouth is dry – a phobic response). Based on Chinese medicine, involves tapping on the first meridian points. (bladder, stomach, central, governing, K21, spleen, then the triple warmer point at top of hand). A 10th degree black belt in Kung fu and Qi Qong I know uses it to increase the performance of himsel and his students. My shrink friend uses it for her extreme trauma clients. I use it myself. Wish I knew these techniques when Ii was a singer with stage fright! Check out Donna Eden and her husband Dr David Fienstein. Brilliant.
To anyone who has ever suffered from panic disorder or generalized anxiety please listen to Chris’ advice here regarding mindfulness. Learning just the basic mindful breathing techniques literally changed my life three years ago. Jon Kabat-Zinn’s writings are a good place to start.
In regards to school — I want to help people in the way that you help people. Is getting a degree from something like the Acupuncture and Integrative Medicine College in Berkeley the way to do it (is that a masters?)? With maybe additional education from the Institute of Functional Medicine at some point?
I’m looking for a place to start, a way for me to stuff myself with science-based, evidence driven data that I can use to point people in the right direction. I want to help, but I feel untrained and really at a loss for ‘next steps’ when people go full-out paleo and still run into road blocks. The problem is I don’t know enough. I can read all the articles I can find and frequent websites from all of the paleo gurus I trust, but it’s too little too slow and I want to be able to make more change in people’s lives (starting with myself, friends, and family!). I’ve looked at Reed Davis’s Functional Diagnostic Nutrition, I’ve read through Robb Wolf’s Evolutionary Science/Nutrition Certification info…I’m trying to find the best source.
Any recommendations or comments you can provide?
Chris: Thank you very much for the iron overload info. Greatly appreciated.
Raw heavy cream is quite amazing. We buy from a place in PA called Miller’s Organic Farm. The cream is so thick, it is like paint.
@ Robby – Thanks man this is a whole new level to explore (insert evil laugh). Didn’t even know it was possible. Where do you source your green beans from?
As mentioned, SweetMarias.com. They are used by many. It seems daunting, but aside from the initial up front cost of around $200, is absurdly easy.
Sickness ratio of 1:94,000 for raw milk, 1:880,000 for pastuerized. Chances are you’ll get sick from raw milk long before getting sick from pastuerized. Relative or absolute, this is significant.. I’ll stick with pastuerized, thanks.
Chris, as a transitioning-to-Paleo optometrist, I can add a bit of info about the drops that “get the red out”.
Those contain vasoconstrictors, for cosmetic constriction of the dilated small arteries and veins within the conjunctiva (movable, clear covering on the white) of the eye. The drug used is usually something like the drug in nasal sprays like Afrin. In eye care, we prefer to eliminate the reason for the vasodilation rather than use vasoconstrictor drops — much like eliminating the reason for GERD rather than perpetually drugging the symptoms.
There are many non-preserved lubricating drops available OTC in drugstores, which are more highly recommended–all of them are in some way just mimicking the components of natural tears: mucus, lipid, and saline. I am in a surgical practice so we often deal with dry eye of all origins– hormonal, chemical, allergic, and often, caused by combinations of oral pharmaceuticals especially decongestant allergy meds, oral contraceptives and so on. Our standard recommendation is to add good fish oil, work to balance the diet ( it’s hard to take enough time to fully educate folks about nutrition!), avoid environmental triggers, hydrate, and use only non-preserved lubricating drops. I tell patients only to use drops that get the red out if they’re going for a job interview or having a portrait made!
The whole thyroid eye disease issue is too huge for a small comment, and I am by no means an expert in treatment of autoimmune thyroid disregulation, so I won’t address that at all.
Thanks for all the accessible, accurate, and thoughtful info you provide!
@ Nancy – Thanks! do you have a favorite brand of the natural stuff? I get the problem after flying and usually just try to use saline solution but I’m always looking to upgrade.
Steven, flying is the worst for most people! Like being in the high desert. The screw top bottles all contain a preservative like EDTA or similar, which is not only unpleasant to the bugs but also to the corneal epithelium, when used repeatedly. There used to be a great preservative free one called Lens Plus drops, in vials that were about 0.5 ml of balanced saline solution, but I’m afraid they’ve been discontinued. Otherwise,I’m pretty sure the preservative-free ones are all manufactured so none are naturally sourced, at all. Similasan http://www.similasanusa.com/ may be the only widely available one that is. They advertise that their ingredients are all natural, and they have TSA compliant bottles!
Hi Chris. I just wanted to say thanks for taking the time to address my question.
I do indeed have a glucometer and usually my post-meal glucose is below 100 an hour and two hours post-prandial. Then it seems to rise after that. Unless I really load up on the rice and other carbs, then it can be somewhat higher, but still usually below 100 (sometimes significantly so) by 2 hours. I will look into all the info you suggested and keep you posted on what I discover. Thanks so much!
Chris, your podcast is the single most brilliant public discussion of raw milk I’ve seen yet. Thank you for having the courage to address the issue. I’ve never consumed raw milk and currently consider the default “Paleo”/ancestral position to be one of skepticism and caution re: dairy products as staple foods, but the anti-raw-milk hysteria has reached ridiculous and even fascist proportions and the plus side of the issue is rarely discussed. Modern Western society has largely become obsessed with trying to avoid all “germs,” often failing to recognize that most microbiota are beneficial, and generally disregarding the evidence for the robustifying, antifragile benefits of probiotics, aka the “Old Friends.” Thank you for your efforts and keep up the good work.
While I understand there are differing opinions on the risk of raw milk, to me, its seems like an unnecessary risk. I am curious what method you used to come up with 1 in 6 million for the raw milk risk.
Based on CDC data, literature, and state and local reports, FDA compiled a list of outbreaks that occurred in the U.S. from 1987 to September 2010. During this period, there were at least 133 outbreaks due to the consumption of raw milk and raw milk products. These outbreaks caused 2,659 cases of illnesses, 269 hospitalizations, 3 deaths, 6 stillbirths and 2 miscarriages. Because not all cases of foodborne illness are recognized and reported, the actual number of illnesses associated with raw milk likely is greater.
I explained how I came up with the 1 in 6 million number. It refers to the risk of hospitalizations from raw milk illness during the period I examined, 2000 – 2007. I also addressed issues with the CDC data that make it misleading – such as combining outbreaks from homemade Queso Fresco style cheese with outbreaks from fluid raw milk.
For those of us who are having trouble finding someone who can help, can you give a sense of what, in general, the next few diagnostic steps might be? I know that these problems are complicated; I’m just wondering if you can go a few steps further than what you said here. Are you talking tests like islet and GAD antibodies?
What dosage of the fermented CLO/butter oil blend do you recommend? I’m waiting for my order of it to come in and funnily enough have dry eyes. Thanks for the podcast.
i’d like to express my appreciation for your providing the transcript for your talks! i’m one of those who would rather read than listen to information like this (i’m a visual learner)…. thanks, Chris!
Thank you Josh! That is so helpful!
Are you aware that they recalled our raw milk again! I drove out to Lunardis for my raw milk for the week and there was none. I thought it was legal in Ca. what is up with this constant harrassment?
Hi Chris, you mentioned some free online MP3s for body scans and such. Can you post the link to those? Thanks for your help!
Also can you elaborate a bit on what you mean by optimizing glutathione status? I’ve read that taking a glutathione supplement won’t help, but that using it in a transdermal form is better. I haven’t taken either, but I have a TPO of 9 IU/ml, and my Vitamin D is at 28ng/mL, even though my Vitamin D 125 is at 65pg/mL. My diet is clean and I take the FCLO/butter capsules, but I know I need to do more to balance my immune system. I also take Cytomel currently (45mcg).
Would really love a link to MP3s for minfullness meditation and body scans on the web. I would be interested in the ones that you rate as good.
http://www.buddhanet.net/audio-meditation.htm has some good free recordings.
I have just listened to the body scans and feel very relaxed.
Chris, the advice on calming anxiety in tense moments is so helpful. I recently discovered I have very low cortisol, so whenever I perceive a threat or conflict (even a co-worker having a bad day and biting my head off), I get a SERIOUS fight-or-flight response, total adrenaline rush, red face, and inability to think very clearly. My physiological response is very overwhelming, full on panic mode. I know there is likely a psychological component as well, and am worried that even as I support my adrenals my neural pathway to go to panic mode is so ingrained I won’t be able to have a more appropriate, cortisol related reaction. Even though I’m trying to practice mindfulness and breathing through my heart throughout the day, when I get into fight-or-flight mode it doesn’t occur to me. Sometimes it feels like things are happening so quickly that stopping to think about my breath doesn’t even seem possible (imagine a customer service agent being yelled at by a customer and asking for a moment to breathe…. ain’t gonna happen!). Any advice on how to deal with this more dramatic version of the topic you covered in this show? What can I do about the psychological component? Thanks Chris!!!! | 2019-04-19T04:50:23Z | https://chriskresser.com/raw-milk-safety-iron-overload-and-finding-calm-in-stressful-situations/ |
The mingw32 port is particularly interesting. Its a hosted port to Windows, and in essence uses the OS threading system to implement a minimal virtual machine, all within kernel.resource. It has a small bootloader that loads an ELF kernel, making it so that stock AROS i386 code can be used even on Windows which doesn't use ELF itself. The other thing it does is neatly split modules into host-side and AROS-side parts. The AROS parts are handled as normal modules, but in their initialisation they call into hostlib.resource (which is now contained within kernel.resource) to load and link the host-side part. These are standard shared libraries (ie DLLs) which can bring in any library dependencies they need, neatly avoiding the problem contained within the X11 and SDL drivers in that its kinda painful to find the needed libraries at runtime. This way, you just find what you need at link time.
Confirmed working with Windows XP SP2 (2010), ?
x86 32bit discussion thread here.
Experimental x86_64 bit build discussed here.
how do you build a Win7 hosted AROS (not inclined to screw up my laptop's factory installment of partitions etc. to get AROS running from SVN). Mingw32 - how to? Or if possible, VS 2010, how to?
There is a readme in arch/mingw32 directory of aros sources that might be of some help.
Got into compiling, but then came across couple other problems (a.k.a. Netpbm and such, which is required, and which in turn requires zlib, libjpeg, libpng, and something else... of which none (aside zlib) I've managed to get to compile without a ton of errors - seems Mingw's gcc 4.5.x is rather broken in a way).
You don't need to compile netpbm. MinGW really lacks it, but you can download it from another project, GNUWin32. They cooperate perfectly. I use it. Windows version of Python is also needed, get it from python.org.
And after this the thing should go! BTW Win64-hosted port should be that simple as well.
Did you use—with-kernel-tool-prefix=... for the kernel tools?
And note that—disable-crosstools will not work for Windows. You will need to let AROS build its own crosstools for now.
Open HDToolBox, press "Add" in the devices list and add hostdisk.device.
Browse the device in the same way as you browse hard drives on native AROS.
Save the mountlist. By default it has the name of physical device (e. g. DH0) and will be placed into SYS:Storage/DOSDrivers.
Execute 'Mount DH0:' in the command line.
Hanging One idea i have is some deadlock between GDI window service thread and main AROS thread, when they simultaneously hit GDI context with certain conditions. It's very hard to track down. If i add any debug output to GDI thread, the problem goes away. I tried to interrupt frozen AROS with MSVC. Seen all 3 threads waiting in a syscall. But backtrace from that point is quite not trivial task. MSVC won't understand AROS code. Can you examine global variables with debugger after freeze? If so instead of debug output you could have some variables which you set in various places to values which later allow you to identify the place the threads were last executing before freeze.
If a freeze happens somewhere inside this code, my_debug_var gives hint where it happened.
Thought about writing some special extension module which creates one more window with separate service thread and dumps some things there, with possibility to run SAD in that thread. So i would be able to enter SAD after AROS is frozen and examine task scheduler state. This could shed some light on the phenomena.
One thing - deadlock doesn't happen for window service thread. It works fine. It started locking up only after i added confirmation of keyboard events reception, so that keypresses aren't lost or duplicated. When service thread posts a keypress to main AROS thread it waits back for a signal (event in Windows terms). AROS is expected to trigger this event when it picks up a keypress in an interrupt. Since AROS doesn't respond to interrupts, it never posts back this event. So, likely some flaw in interrupts, causing "All tasks waiting" state with disabled interrupts. The described module is needed to verify this hypothesis.
Windows-hosted and native use the same NewStackSwap(), written in asm. Linux (except ARM) uses generic implementation in C, utilizing swapcontext(). On ARM this function is not implemented in libc, so all ARM ports use the same NewStackSwap() written in asm. StackSwap() is always the same. It's written in asm for every CPU. BTW, in fact, Linux-hosted port can use asm implementation. Just it doesn't for historical reasons.
AFAIK you can theoretically even get rid of lock/unlock of inputbuffer, with some atomic instruction tricks.
See arch/all-mingw32/host_scheduler.c, task exception handling. I have to pass argument to exception handler via register because i can't modify stack inside Windows exception since Windows exception handler is running on the same stack as main code. Also note that i moved some code back to exec.library/Switch() and exec.library/Dispatch(). Now kernel.resource does not have to #include exec's private stuff (etask.h).
It spreads the scheduler among several modules. Part of scheduling is done by kernel.resoruce, part by exec.library. The only win is getting rid of etask.h include.
But it's not scheduling itself, It's some internal exec state maintenance, which is always the same. This idea came to be after examining UNIX-hosted code. I know it is old, but it uses Dispatch() for state change, and i liked the idea. I am working on fully functional kernel.resource for UNIX. I believe this follows AmigaOS philosophy to have these entry points patchable in order to be able to install some kind of CPU usage monitor. Switch() is called when some task loses CPU and Dispatch() is called when another task gets CPU. The moved code is always the same, it resets exec state. It's up to kernel.resource when to call them (and it's a matter of task scheduling).
Currently we support only RR scheduler. What, if we will need to add some more? Having Switch() and Dispatch() back in exec means, we need to implement different schedulers in exec, too.
you do in that case? Doesn't different schedulers mean only core_Schedule() replacement? It can also be moved to exec. This will automatically make it working on all architectures. Of course if we provide some kind of access to CPU time. BTW, may be it can be based on timer.device's EClock? kernel.resource then will just call Switch() and Dispatch() in order to notify exec about task switching (note that kernel.resource still does the actual switching itself, so there is no arch-specific code in exec). Exec would do status update and accounting then.
If this file is mingw32 specific I think the path should be aros/mingw32/irq.h (or aros/windows/irq.h). This will allow to still cross-compile from anywhere and have in the end one SDK for all CPUs and archs.
Well, i can do it. But here is my last argument for this location... In fact the location is $prefix/i386-mingw32/include/aros/irq.h. If you are working on AROS and you are installing a mingw cross-compiler, the crosscompiler's default paths will also end up in $prefix/i386-mingw32/include and $prefix/i386-mingw32/lib. This way the file appears right where it is expected to be.
And yes, there is libaroskernel.a which goes to i386-mingw32/lib, but it needs mingw32 compiler to be build, so it is built only during windows-hosted build. It just can't be built when doing e.g. Linux-hosted build.
Previously we always had a serial port. Currently we don't. And this is a pain. Theoretically we could substitute it with some other device (Ethernet, USB, etc.). These things are much more complex and require drivers to function. I leave out necessary protocols since with for example Ethernet we could use some simple raw protocol, just to be able to read messages.
So comes the first idea: we should have something that can be called "debug channels". Every debug channel can be identified for example by name, supplied by the device driver.
This device driver needs: 1. Early initialization (while booting up the system) 2. Some way to supply its output channel to the system.
Where name is channel name and function is callback function like MyCallback(char c).
a) Driver should install a reset callback where it should reset the card back into text mode.
b) Driver could have some another callback which would return VESA-alike description of current state, so that existing display can be picked up during reboot.
By the way, the same thing would let us to display friendly guru screens instead of simple rebooting. Just this routine in the display driver should be crash-proof (it may not rely on interrupts, other libraries, etc., even on exec itself). And again we need some way to register this routine.
a) Display drivers can be unloaded in some situations.
b) There can be several displays, how to select the correct one (some displays may be not physically connected, for example unused connector on dual-headed card).
Now let's remember about KrnMayGetChar(). Currently AROS features built-in SAD debugger. I picked it up from i386-native version and adapted a little bit to the new environment. Now it perfectly runs on Windows-hosted, i can run it using C:Debug command. In fact on other ports you also may run it, you'll see a prompt in debug output but won't be able to talk to it - KrnMayGetChar() is implemented only in Windows version.
The current SAD doesn't do much, but it just needs some attention from developers. It can become a useful tool. Especially if we invent some way to run it when guru happens (like it was on classic Amiga(tm)).
So, back to the topic. First, not all devices can be bidirectional. Second, why not for example use own machine's keyboard? The driver then needs the following functions: InitCallback, InputCallback, ReleaseCallback. Release function could be called when for example you leave the SAD, to give the device back to normal OS usage.
So far, we already have five functions (assuming that debug output is never released). If it somehow is, then we have six functions. May be we should not have two registration functions, and have just one, taglist-based?
How to pair input and output channels? Assuming that devices are not bidirectional? Or may be we should not pair them at all, just allowing the user to specify the second argument, like "debuginput=ps2kbd"?
Then, you can use ./configure to set up your cross complication environment.
1) Modify bin/darwin-x86_64/AROS/S/Startup-Sequence to run 'NewCLI' instead of 'WANDERER:WANDERER' - that will at least get you a full-screen text console.
| Your X Server seems to have backing store disabled!
You can safely ignore this warning. Been running in this mode for the last 2 years. Confirmed it works with x86 10.5.8 Leopard 10.6.2 and 10.6.4 Snow Leopard. Don't forget to install x11 XQuartz), it's on the installation dvd. There should be an X11.app in /Applications/Utilities. If not, there's your problem.
When the bounty was created the mac was still PPC only, from recent svn logs it looks like it should also run hosted on Darwin PPC.
You don't need SDL, but you do need a X-Server for graphics. Newer versions of OSX usually have one installed already. Dunno if SDL would also be possible, on iOS it won't. Cocoa SDL needs special preparations in program's main() to work.
Please check arch/all-darwin/README.txt for build instructions. Don't try to build contrib, some packages will fail, SDL_mixer and gmake IRC. Perhaps you forgot to add—target=darwin-i386 to configure? But, really strange, it doesn't need it on my machine.
Yep, the darwin 32 bit set. I had to move the binaries by hand into the path with names like i386-aros-gcc to make configure happy.
Isn't /usr/local/bin in your path already? The toolchain was built with—prefix=/usr/local. It should work fine if you extract these two archives into your /usr/local.
There has been no time to complete GPT partition table handling (it's currently read-only, you can install AROS on a GPT partition but you have to use 3rd party tools to partition the drive). Writing GPT is currently enabled, but DO NOT TRY THIS. It WILL destroy your partition table!!! CRC and backup table are not updated!!!
1. If you get hangups, perhaps AROS crashes behind the scenes. If you use VESA mode, you can see the debug log if you add 'vesahack' to the command line. This will set up split-screen mode. In the upper half you'll see AROS screen, in the bottom - debug log.
2. If you get crashes at early boot, try adding 'NOACPI' to the command line. ACPI stuff is very poorly tested because discovery fails on Mac (different ROM).
If it succeeds... then any build errors 'make -s' generates.
If *that* succeeds... then any fatal errors 'cd bin/darwin-ppc/AROS; boot/AROSBootstrap' generates.
If *that* succeeds... it works!
If 'gcc -v' and 'make -v' work, you are 90% of the way there.
If you get a build error for missing libpng and netpnm, you can resolve that with Fink. Even better, go with Homebrew, there's a PPC fork which works fine on my old PowerBook :).
Building darwin hosted port try to follow the guide in arch/all-darwin/README.txt. There's no need to build cross-tools with—enable-crosstools switch (which may not work at all), because you should install Sonics prebuilt cross compilers.
Build binutils, they don't have any prerequisites.
Build collect-aros. Its env.h.cross file contains instructions how.
Unpack gcc, configure it and execute 'make all-gcc' and 'make target-libgcc'. This will produce barebone C compiler.
Using this compiler, build AROS linklibs.
After this complete building gcc using 'make'. It will build also g++ with its libraries.
Of course AROS includes should be made too before building gcc, but gcc itself isn't needed for this.
The same with Windows. I guess similar issue affects Android (there it uses Android crosscompiler as $KERNEL_CC and wrapper as $TARGET_CC. It's impossible to compile Android binaries using Linux gcc, their ABIs are a bit different!
specify—with-kernel-toolchain-prefix=i386-aros- make query still prints /usr/bin/gcc for the kernel cc.
If you're compiling for darwin-hosted on darwin, you *don't* use—with-kernel-toolchain-prefix at all.
Remember that 'kernel' is used to compile the darwin side of the AROS Bootstrap.
And everything that has compiler=kernel specified in the build macros like arch/all-unix/kernel.
Host-side DLLs (intensively used in Windows-hosted).
AROS modules directly interfacing with host OS now use another trick. It's still $TARGET_CC, but with -nostdinc -isystem $GENINGDIR. This allows to produce AROS ELF objects which still adhere to correct host-side ABIs. If we want to know what will be our underlying host, we explicitly add -DAROS_HOST_$(AROS_HOST_OS) flags. This is because there's no __linux__ (__darwin__, __win32, whatever) in AROS code, it's always __AROS__.
This can't be elf-wrapper for hosted. In order to build something that runs under an OS, you need an SDK for that OS. In fact elf-wrapper is the same aros-gcc, but produces statically linked (ET_EXEC) binaries. This is suitable only for building native bootstraps (which are running on naked hardware and self-contained).
Building Darwin-hosted under Darwin? configure's bug. Actually these architectures are Darwin, Windows and Android. Their KERNEL_CC can't be used for building AROS code even with wrapper. So these three arches must enforce AROS crosstools, either built or preinstalled.
How to substitute rmb with keyboard on laptop? CTRL doesn't do the trick. Go to System Preferences -> Trackpad. Check the "Secondary Click" box and select "Bottom right corner" from the drop down. Then you can press in the bottom right corner of track pad for right click.
For hosted systems we have driver that wraps AHI to the open sound system, see arch/all-unix/libs/oss. Probably it is possible to write a similar thing for darwin hosted.
In order to resolve the async I/O issue wonder why AROS can't handle this by means of AROS internal threading. This is exactly how asyncio.library does it as well. Threading could be inside 68k AROS or outside, i.e. Linux host threads.
From host's point of view AROS is just one thread. So if some of AROS processes calls blocking I/O, it blocks the whole AROS. No task switching will be done since no signals will be delivered. So this is related. AROS would have to be sub-threaded, with those threads being mapped to native threads (this is by the way something that is sometimes done in JVMs, also under Linux).
As to host threads, there's another large problem. Tried this with Android-hosted port and it failed. When SIGARLM arrives, you can't tell which thread is interrupted. This completely screws up AROS' task switcher. Maybe it's worth checking how this is solved in common JVM implementations.
There is already a solution in the form of unixio.hidd. However it operates only on file descriptor. AFAIK eSounD provides only library-based API with blocking functions. There's no some form of a UNIX socket/pipe/whatever. You might want to try eSound: There's one problem with esound. It lacks asynchronous I/O capabilities, providing only blocking calls. You can not use blocking I/O from within AROS. This will cause blocking of the whole AROS, including interrupts, and will provide very negative user experience.
Of course it's possible to implement oss.library which would work on top Core Audio. But i think it would be much cleaner solution to write self-contained AHI driver without any extra API wrappers. It would better use CoreAudio possibilities and would not be restricted only to what oss.library has. Not saying that oss.library is a quickly hacked crappy thing.
to favour PortAudio over eSound - I don't know if the mentioned I/O issues reflect on that one as well or not. In general however direct OSS access does not seem to be the best solution, as eSound - and probably also PortAudio - as additional abstraction layer does ensure that in turn AROS is not blocking the host audio but proper mixing is done. In order to resolve the async I/O issue wonder why AROS can't handle this by means of AROS internal threading. This is exactly how asyncio.library does it as well. Threading could be inside 68k AROS or outside, i.e. Linux host threads.
Of course it gets more complex if you want it connection based, with more reliability and upfront negotiation of audio settings - possibly could be done using TCP instead, with an appropriate header.
Several days before i ran it on Linux PPC (where i wrote initial version of emul_dir.c), worked fine too. Is it a new build? It was a complete rebuild. The problem only happened with—enable-debug because the ASSERT_VALID_PTR was called during AllocateExt which was called during PrepareExecBase.
PrepareExecBase() is really tricky. If you want to debug it, you can temporarily add statically linked calls to KrnBug() (copy the stub from kernel_debug.h and use it). Exec debugging is really not up there yet. However this routine should be simple enough to not require any debug.
Reverted this and now link against libgcc.a. The problem with the missing symbol did not happen on Rosetta but was able to test it works now on a 10.3 G4 ppc ibook.
Now some debug output from Rosetta with my latest commits, without them you'll get only garbage. As you can see the value of klo is trashed after HostLib_Open. Trashing may differ depending on were you place debug output.
All hosted ports. On non-Linux OSes it's impossible to acquire address 4 at all. After hitting problem with entry point introduced a new macro, AROS_ENTRY, to mitigate this.
Don't know if GNU binutils support i386-darwin target for cross compiling and how difficult it is to set it up. When compiling Mac OS X hosted AROS, I had to make the following patch, otherwise the compiler couldn't find some includes (e.g. sys/_types). Is this a problem with my build environment or something more general? Have you installed my crosstoolchain from aros-archives, or you use some hacks, or—with-crosstools? I did install your cross-tool-chain, and followed your build instructions, but I also have generic i386 cross-compilers from MacPorts (used for building native).
BTW, should it not be possible to use—with-crosstools? (And isn't that the default for most other archs now?). AFAIK—with-crosstools works incorrectly. Most archs currently use wrapper script around host's gcc. Crosstools are built only for MESA and only g++ is used then. Yes, it's really incorrect.
In fact thinking about changing this. I think that real crosscompiler should be enforced on a host basis, not on a target basis. I. e. if we compile on non-ELF host (for example on Windows or Darwin), $cpu-aros-gcc is used. Otherwise wrapper script it used. This will make cross-compiling any port on any build machine quite an easy task.
1. Stackswap tests crashes in NewStackSwap(), the reason is under investigation. However executables are ran flawlessly. I suggest the problem happens because of swapcontext() nesting.
2. X11 driver has somewhat bad performance. Also there are some small problems with it. I suggest they happen because of missing backingstore. It's possible to enable it, but it's somewhat tricky.
In fact X11 driver needs to be seriously rewritten, so that it will support screen composition and will work without backingstore. Also there are several obvious coding faults in it. Unfortunately i don't know X11 programming well, so i won't take this task for now.
ppc-Darwin build (with someone's help to test).
During testing of parts of Darwin-hosted build i came up to this again. Currently we have AROS.boot file where we put name of architecture. Is it really needed to have the full name there?
This actually prevents to have one boot disk for different machines using the same CPU. For example ppc-chrp-efika partition will not boot on ppc-sam440, despite they are the same! Personally i hit this issue when i build aros-base and aros-strap kernel modules on Darwin and then tried to boot them up on my existing Windows-hosted installation (since there's no aros-bsp-darwin yet).
2. Check only CPU with this file (e.g. 'i386' or 'x86-64'). This way we solve both problems. Additionally in future we can be able to add more data to this file (like boot priority). This is the reason why we should keep the file.
A possibility to run AROS hosted on x86-64 MacOS. There's a problem.
Current AROS executables use small code model, so they need to be loaded into lower 2GB on address space. This is no problem on native AROS and on Linux we can use MAP_32BIT flag. However there's no such flag in BSD, and, consequently, on Darwin. Additionally Darwin reserves the whole low address space for own needs. Userspace begins at 0x1000000000. This means there's no way to get into lower 2 GB. The problem can be solved only by changing code model. This is so for the small code model for x86_64 right? Does there also exists a 'big' code model ? I also would like to get an idea of the implications on code size, stack usage, speed etc. of the different code models. Yes, of course. It imposes no limitations, but has negative impact on the binary size (all references are 64-bit). Small code model uses special form of CPU instructions where all references are still 32-bit. Reference for models.
Darwin itself uses small PIC model for its executables (-fpic option is forced to always on). This allows to override this problem there. I can suggest to use the same on 64-bit AROS. However this means that -fpic option needs to become working on AROS in general. In order to do this, we need to change linking process a bit. Instead of -r, -q needs to be supplied to ld. This will instruct it to link a final executable (ET_EXEC) file, but keep relocs in it. Linking final executable involves additional magic like creating global offset table. I think it does not hurt to support different code models in the executables. And I also think that the default one to use for code should be able to run on all ports of AROS. I also think the default code model could be different on different CPUs, e.g. absolute on m68k, i386, PPC; relative in x86_64, PPC64, etc. Of course. On i386 the default is small, it still has some differences, i don't know which ones. I suggest to make small PIC a default code model on x86-64 AROS. However, for this, PIC should be made working in general. Currently it doesn't (try to compile hello world with -fpic and see what happens).
I think we should look at how many people have a current x86_64 installation they want to run newer programs. Also how involved would it be to upgrade an existing installation. It's not a real problem as the first set of changes is fully backwards compatible. AROS will still load existing executables. I even can add one #ifdef to collect-aros and the change will affect only 64-bit AROS. 32-bit executables will still have old format. Just i don't like code pollution with #ifdef's, and additionally if i implement the change for all CPUs, all of them will get working -fpic option. This will not change default code model for anything other than x86-64. Just ELFs will become real executables (it's quite simple to modify our InternalLoadSeg() to support them. I thought we had broken x86_64 binary compatibility several times in the past without a second thought (e.g. changing ULONGs to IPTRs in system structures). IMO it doesn't matter if we do the same with this change.
Anyway I am now quite advanced in the implementation of the split of clib the split is fully done and contrib-gnu compiles and runs mostly. BTW, are you aware of the fact that current arosc.library stores its thread-local data in private field of exec's ETask structure? I hope you changed this to something that uses only public API (like using AVL trees to associate thread data with process)? I just have a bug left in setenv/getenv and then mostly. So I don't think the waiting for ABI_V1 implementation to start this work would delay it for several months. We also need to align with the m68k people. This was one of the big things I have done in the ABI_V1 branch. The data is stored in an AVL tree. Is this soft of "handled in shared module per caller task storage". If so, could you point me to the codes in SVN?
It can be implemented right now. There will be only one problem: new executables will not run on older AROS. Old executables will still run on new AROS, i'll take care about it. Implementing this will allow to move further and implement special support for -fPIC which would enable nice things like moving global variables into library base. Is it okay to go for this change? This implementation should not be the final implementation but keep the possibility to adapt the code model for AROS during the ABI_V1 implementation phase. Code model can be specified using -mcmodel gcc switch. Without any changes we can use all code models in non-PIC mode. My change's goal is to make it possible to build PIC binaries. PIC changes x86-64 small model in such a way that it will work with any address range, limiting only size but not position of the code.
Work on x86-64-Darwin hosted AROS continues. It already boots up into Wanderer, but lots of components crash. This happens because there are still many places where pointers are truncated by conversion to ULONG. On Linux-x86-64 you won't notice this because AROS memory is allocated in low region (below 2GB limit).
On Darwin (like any other BSD) you don't have such a possibility. Darwin reserves the whole low memory for OS use, and application's memory starts from 0x001000000000. This puts some restrictions on what you can do in AROS. For example AROS can't load bitmap fonts and diskfont.library crashes. This happens because diskfont.library hits wrong addresses when it tries to process AmigaDOS hunk file loaded a high addresses. In order to prevent loading these files at high addresses i introduced MEMF_31BIT flag. This flag is set for memory regions whose end address is not larger than 0x7FFFFFFF. This flag is effective only on 64-bit machines. On 32-bit architectures exec.library ignores it, so there's no need to set it there. If someone is working on x86-64-pc port (Alain ?), he should take this into account. Memory initialization routine should make use of this flag and mark the approproate region with it. On x86-64-Linux hosted port this flag is set, so this port can load AmigaDOS hunk files (and use bitmap fonts). This is because bootstrap supplies MAP_32BIT flag to mmap() calls. Currently only InternalLoadSeg_AOS() routine supplies this flag to AllocMem(). However i would say that there are more places where it should be used (for example, drivers for devices with 32-bit PCI DMA). I have problems with implementing PIC support, so currently i use large code model to compile Darwin-hosted AROS. I will implement PIC later, this ends up in implementing own BFD backend in binutils. I don't know yet what code model should be used by default for gcc, but it's definitely not small one. ELFs with small model create problem, because code model is not recorded anywhere in ELF, and i don't know yet if it's possible to use some heuristics to guess it (for example detect specific relocation types). Currently program using small code model will simply crash on Darwin-hosted AROS. Programs compiled with large code model (and PIC in future) will run on any x86-64 port. Even if i succeed in auto detection, this will not make small code magically run on all ports. Attempting to load it will end up in "File is not executable", nothing more.
An additional feature I would like is that you could decide which variables would go in libbase and which would be global to all libbases; implemented maybe with some AROS_xxx() macro around the variable definition.
Additionally i can make use of ELFOSABI_AROS definition (ELF ABI number reserved for AROS). However this will impose a requirement to use AROS version of binutils for linking, Linux ld will not do any more. I always would have liked to make AROS programs real ELF programs (with relocation info still present though) but I also think this should be something for ABI V1. Ok, i go for #ifdef in collect-aros then.
Currently AROS build system does not support having different .conf files for different arch/cpu. If this is implemented, this is possible. Anyway binary compatibility with PPC is a proposal for future. Perhaps it will even be a separate AROS version. This is open to the discussion. Some of our leaders dislike MorphOS ABI and would not like to make it a default ABI for PPC AROS.
Anyway i think that LVOs should be as similar as possible. In fact this place should be the only place where LVO swapping takes place. There seem to be no other conflicting extensions between AmigaOS3.9 and MorphOS.
Will the ABI V1 C library allow to malloc memory in one task and free it in another? Not at the moment; I did not reimplement this feature yet as I did not find any code that seemed to use it. This is required at least by MPlayer - I had to add an ugly sharecontextwithchild function to current arosc.library to have this behaviour. So if I would be able to get the source code I can think of the best way to implement it. It does seem to be thread related.
If you talk about PIC and GOT, will this also mean we can have shared objects? We may be able to, but please please don't. Don't copy bad design decisions from OS4. OS4 programs using shared objects have the same startup slowness as on other OSes (Linux, Windows, ...). In fact we can have them right now. Shared objects in AROS does not have to be PIC because every binary is relocatable by definition. However, yes, i agree that load-time linking is not good.
Find PPC Darwin ABI documentation, and compare with Linux ABI. If you carefully check the layout of stack frames you'll notice the differences and what causes the trashing. On ppc darwin called functions are allowed to write into a parameter area of the callers stack frame. I think this can be worked around by some C or Asm stubs around each host os call.
So i should be in search of graphic drivers and sound and keyboard etc.Am i right to assume that i should search them in the linux version of ps3 ports? There is another problem,linux used to have the otheros option,and now that is no longer present in the PlayStation 3 firmwares upper than 3.21.So i can't use a custom otheros.bld file to do the boot.
Remember the first one is GPL and even Sony copyrighted, do not copy and paste code from there. I seem to remember that even the last one did use GPL code for display at some point. Not sure if drivers of the projects I've linked might be of help, some of them maybe.
I am not certain how this could be done on the present firmwares.Although we have the advantage of running homebrew code on the gameos. So i guess i need a pkg application file to act as a boot loader for aros.Maybe i should try to find out more about petitboot ?that was a boot loader for ps3 try to make a pkg file out of it? I know that linux boot loaders on ps3 needed the other os function,but since this is for jailbroken machines that have the lv2 peek hack of geohot we have access to anypart of the memory region of ps3 so in theory the lack of otheros option would not prohibit the execution of other os (asbestos comes to mind).
I am trying to see what is needed to port aros to ps3 gameos.What would i need?I know of the ppc linux port,i am trying to make a new configure file to use.
As far as I understand the sdk uses cross compilers so it might be possible to add sections to configure similar to those of the MacOS X hosted ported which also uses prebuilt tool chains or check other native port which are usually cross compiled like sam440 or ppc-efika port.
I would suppose the sdk should provide a lot of the things needed, maybe not yet but over time. To sum it up.We need a boot application that initializes gfx,sound,usb,keyboard,blue ray and opens screen?Is that how aros works on linux?
Not exactly, a hosted port like on linux starts as a normal host program (arch/all-hosted/main.c) which acts as the boot loader then it jumps to the starting address (arch/all-unix/kernel/kernel_startup.c). A native port is similar, but it has to do a lot more work to take control over the whole machine. One part of this are device drivers but there is more. For example the sam440 port has to init some registers, the interrupt controller and mmu very early in startup. You can learn about all this by studying AROS source, after all device drivers have to be done the AROS way, the sdk examples and other gameos hackers code and maybe it's also a good idea to search for some Cell chip documentations at places in the net.
Then you need to set up things in the arch directory so it contains the parts specific to the ps3. Then make the sdk produce a binary that is loaded and started on the ps3. This usually is the boot loader that loads all the needed modules from boot media and then jumps into a starting address of one of those. Probably the boot loader will already have to set up some of the hardware so it can do its job, the rest can be done at a later stage. Additionally, you will need hardware drivers for the display, usb at least for keybord and mouse, harddisk and blue ray drive.
It is possible? What problems will present? I think it is possible, but it's not an easy task, the biggest problem might be not to give up at some point.
Btw. AROS does not need SDL, but we have an SDL display driver for hosted ports.
So i should be in search of graphic drivers and sound and keyboard etc.Am i right to assume that i should search them in the linux version of ps3 ports?
There is another problem,linux used to have the otheros option,and now that is no longer present in the PlayStation 3 firmwares upper than 3.21.So i can't use a custom otheros.bld file to do the boot.
I am not certain how this could be done on the present firmwares.Although we have the advantage of running homebrew code on the gameos.So i guess i need a pkg application file to act as a boot loader for aros.Maybe i should try to find out more about petitboot ?that was a boot loader for ps3 try to make a pkg file out of it?
I know that linux boot loaders on ps3 needed the otheros function,but since this is for jailbroken machines that have the lv2 peek hack of geohot we have access to anypart of the memory region of ps3 so in theory the lack of otheros option would not prohibit the execution of other os (asbestos comes to mind).
To sum it up.We need a boot application that initializes gfx,sound,usb,keyboard,blue ray and opens screen?Is that how aros works on linux?
This page was last edited on 18 August 2017, at 02:43. | 2019-04-26T15:38:07Z | https://en.wikibooks.org/wiki/Aros/Platforms/Support_for_*nix |
Upon the death of Edward VI in 1553, Mary Tudor brought back the Roman religion to England; and a number of influential Protestants found it expedient to flee the realm. Two hundred of those exiles took refuge in the German city of Frankfort-on-the-Main in June of 1554. They were a divided company. Some were “prayer book men” or “Anglicans”, who, while thoroughly evangelical in their sympathies, were deeply attached to the English Prayer Book of 1552. If a further revision of worship had to be made, they wanted it to be along Anglican lines, and no mere translation of Calvin.
At first the Frankfort congregation used an “interim” service which was Calvinistic. Soon the proposal was made that William Huycke’s English translation of Calvin’s Genevan liturgy should be introduced for permanent use, since it was “moste godly and fardeste off from superstition.” When that suggestion did not meet with swift approval, still another was proposed: that both the English Prayer Book and the Genevan order should be set aside, and an entirely new liturgy devised.
Thus, in January of 1555, Knox and four associates—all of whom were of the “Calvinist” persuasion—commenced to work, using Huycke’s translation and, we may be sure, the sober Genevan edition of Calvin’s own liturgy. Out of the labors of these men came the first version of the service being used in this celebration. But inasmuch as it savored of Geneva and therefore displeased the “Anglicans”, the manuscript was not well received; indeed it was left quite unused. The troubles at Frankfort grew daily more vexing.
Finally, Knox and Whittingham (“Calvinists”) and Parry and Lever (“Anglicans”) succeeded in bringing out a “Liturgy of Compromise” which was modeled after the English Prayer Book and accepted by the whole congregation in February of 1555. Peace endured for a short season. But in March a fresh contingent of Anglicans arrived from England; and in no time they accomplished the downfall of John Knox.
Knox repaired to Geneva. In October, he was joined there by certain of his collaborators from Frankfort. That little group, augmented by some twenty of their countrymen already in the city, proceeded to organize an English congregation at the Church of Marie la Nove. They drew their liturgy almost entirely from the unused manuscript which the committee of “Calvinists” had prepared at Frankfort, adding a collection of fifty metrical psalms and a translation of Calvin’s catechism. On February 10, 1556, The Forme of Prayers appeared from John Crespin’s press.
The English congregation at Geneva, which was the inspiration of the Scottish reform after 1560, existed four years, enrolled 180 souls, and provided Knox the happiest days of his ministry. But Mary Tudor succumbed, and as early as 1559 the exiles at Geneva began to return to Elizabethan England; they carried along their liturgy which was soon taken up by Englishmen of “puritan” leanings. Knox alone was unwelcome there, on account of his ill-timed tract, First Blast of the Trumpet against the Monstrous Regiment of Women, which was aimed, of course, against Catholic Mary, but landed instead upon Elizabeth.
So he returned to Scotland, full of zeal to reform the Kirk according to the measure of Geneva, which he pronounced “the maist perfyt schoole of Chryst that ever was in the erth since the dayis of the Apostillis.” Among his first accomplishments was the introduction of Genevan worship in place of the English Prayer Book, which the Protestants of Scotland had been accustomed to use. Thus, The Forme of Prayers (or The Book of Common Order, as it came to be called) was required for the administration of the sacraments in 1562, and for all other liturgical purposes in 1564. It served the Scottish Kirk for some eighty years, till the appearance of the Westminster Directory in 1645.
The spirit of the liturgy was wholly Reformed. The Scottish minister enjoyed a large measure of freedom, that “as Gods holy spirite moveth his harte,” he might now and then frame his own prayers. Nevertheless he was expected to honor the liturgy, which belonged, after all, to the whole people and was specifically called the “common order”. Schools were founded for literacy, that the Bible might be opened to everyman and the liturgy enjoyed by all. Moreover, every means was taken to make worship itself a corporate action. The vernacular was used and loudly spoken, so that everyone could participate by the direct medium of speech. And inasmuch as the people were no longer dependent upon the ceremonial to follow the service, only the simplest and most useful forms were retained. Even those symbols which had been hallowed by time and usage were cast out of the churches if they were apt to mislead the people. It was wrong to preach one thing and symbolize another; it was right to say plainly what one meant.
The ministers diminished the distinction between clergy and laity by discarding the priestly vestments and wearing none but the preaching habit. The Scriptures were also translated; and every church was admonished to “have a Bibill in Inglische,” which was expounded daily in the large towns, that even those who did not read could benefit. Psalms were cast into metrical forms and set to common tunes in order to give the people themselves a voice in worship. A complete Scottish Psalter appeared in The Book of Common Order of 1564.
Calvin conducted the Sunday service from the Communion table, entering the pulpit only to preach the sermon. He followed that procedure because of his staunch belief that the proclamation of God’s Word ought normally to be followed by the administration of the Lord’s Supper. In Scotland, however, the Sunday service seems to have been read from the pulpit, perhaps for acoustical reasons. Nevertheless, the pulpit and “the holy table”—together—were the most prominent furnishings in the Scottish churches. What did they mean? They were the instruments of the gracious heavenly Father who speaks and gives to His people, and invites them, before all else, to hear His Word of judgment and reconciliation, and to receive His gifts of forgiveness and sonship. In that, chiefly, lies the meaning of worship according to the Reformed tradition.
That principle also governed the manner in which the minister used the Scriptures in preaching. Knox doubted that anything was less appropriate of a Christian minister than he presume to control God’s way among men by parceling out the Scriptures in bits and snatches, or by preaching a sermon in which God’s own Word was buried beneath a heap of human commentary. He insisted therefore that, in preaching, the Scriptures should be expounded book by book, chapter by chapter, in a continuous and orderly fashion. And all of this, in turn, rested finally upon Knox’s conception of preaching, which was rather unlike the one to which we have become accustomed.
The sermon was not the preacher’s prerogative, to be used by him alone for winning souls or for promoting right-living through the oncoming week. It was most of all the Word of God, made real, alive and effective in the hearts of men through the presence and action of the Holy Spirit. It is this Word which awakens our faith. And when we give expression to our faith, true worship occurs.
When we hear the message of God’s judgment and mercy, we are convicted on our sins and desire to make confession of the same. When, through the same Word, the forgiveness of God becomes real to us, we cannot but express our praise and thanks. And when the Word draws us into relationship with all sorts and conditions of men, we are bound to make prayers for our brethren in need. It is this continuous relationship between hearing and response which gives the Reformed liturgy its basic character.
A rubric (direction) in Knox’s Genevan liturgy called for a monthly celebration of the Holy Communion. Although that rubric remained unchanged in the Scottish editions of the liturgy, it was soon overcome by the first Book of Discipline (1560) which declared that “four tymes in the year” was “sufficient” for the Lord’s Supper. And since care was to be taken to avoid “the superstition of tymes” (that is, the church year), the first Sundays in March, June, September and December were arbitrarily appointed.
The first part of the Communion Exhortation was not taken from Calvin, but from Thomas Cranmer, Archbishop of Canterbury, who prepared it for the English Prayer Book. Nevertheless, the distinctive features of Calvin’s practice prevailed even in this section of The Forme of Prayers. According to the warning of St. Paul, all who worshiped were exhorted to examine themselves before they presumed to approach the Lord’s table, and the unworthy were told to refrain entirely. The liturgy was built upon the promise that a true Christian congregation would be a disciplined congregation which lived in obedience to the will of God.
Accordingly, the Holy Communion was reserved for those who were distinguished by sincerity of faith and holiness of life. The unfaithful, who were strangers to Christ, and the callous sinners, whose conduct made it plain that they did not belong to Him either, had no place at His Communion; they were to be excommunicated, “fenced from the table,” lest the sacrament be soiled and they be guilty of the Lord’s body and blood. The critical issue of the Christian life was precisely one’s fitness to receive the sacrament.
Knox administered the Communion after a fashion which he deemed to be consonant with the New Testament. The table was never prepared before worship, apart from the Word, which (as Calvin said) “ought to resound in our ears as soon as the elements meet our eyes.” Therefore the bread and wine were not brought to the table until the sermon had been preached and it came time for the Words of Institution to be read; for by these means the commands and promises, which our Lord made concerning His Supper, could be added to the elements, giving them, their proper meaning and their reality.
It was the practice in some parts of Scotland to lock the church doors after the sermon, so that none might receive the sacrament apart from the Word. That custom underscores the point that we the people, rather than the elements, are thereby “consecrated”. The Word is not addressed to the bread and wine, as if to change them; it is addressed to us, that (as Knox put it) “Christe might witnes unto owr faithe … with His owne mowthe,” promising us the Communion of His body and blood.
The communicants came forward and sat down around the table, which was ample in size and usually arranged in a U or T shape in the chancel or on the floor of the nave. First the minister broke the bread—a symbolic action, called the Fraction, which the Scots deemed to be a quite distinct feature of the Lord’s Supper. Then he passed the bread and wine to the communicants on either side of him, and they in turn “divided” the elements among themselves.
Thus, the holy table was appointed for the whole family of God. By sitting down together and by serving the elements to one another, the people were able to realize their fellowship and mutual priesthood in the Body of Christ. Pew Communion was the way of the English Nonconformists; and the Scots did not hesitate to brand it a “mangling of the sacrament”—until, alas, a Glasgow divine introduced it to the Scottish Kirk in the first quarter of the nineteenth century.
Editor: This short treatise on the liturgy of John Knox was published at the fourth centenary of the Church of Scotland celebrated at Trinity Presbyterian Church in Nashville, Tennessee on October 27, 1960. For a detailed treatment of Knox’s liturgy, see Bard Thompson, Liturgies of the Western Church (Philadelphia, PA: Fortress Press, 1980), pp. 285–307.
Editor: Bard Thompson received his Ph.D. in church history from Columbia University in 1953 and was ordained as a minister in the Evangelical Reformed Church, which later merged with the Congregational Christian Churches forming the United Church of Christ. At the time this article was written, Thompson was Professor of Church History at Vanderbilt University. He was also preparing a book on Reformed worship, which he published under the title Liturgies of the Western Church (1961). In 1965, he joined Drew University as professor of church history and served as dean of the graduate school from 1969–1986. Bard Thompson passed away in 1987 at 62 years of age.
For the source of this quote, see The Works of John Knox, 41.
See The Works of John Knox, 20.
See See British Reformers: Writings of John Knox, 454.
See British Reformers: Writings of John Knox, 454.
Editor: As far as I know, Calvin never states that this is the reason he led the service from the communion table.
Editor: Since the Scottish Presbyterians practiced table communion—in which the members of the church actually sat at a table to receive the elements—they did not ordinary have communion tables set up in the worship assembly except for those Sundays when they were observing communion.
Editor: I have not been able to find the source of this quote. Thompson also cites it here and in Liturgies of the Western Church (p. 192), but he does not provide the source.
Editor: Thompson is referring to Thomas Chalmers. On the history of table communion versus pew communion, see Benjamin Breckinridge Warfield’s article “The Posture of the Recipients at the Lord’s Supper: A Footnote to the History of Reformed Usages” in Journal of the Presbyterian Historical Society (1901–1930) Vol. 11, No. 6 (June, 1922), pp. 217–34.
The first Reformer to arrive on the Genevan scene was the fiery Frenchman, William Farel, a fearless campaigner for the Word of God. As soon as he had gotten the Reformation underway (c. 1534), Farel replaced the Roman Mass by a liturgy, called La Maniere et fasson, which he had written some years before.3 His simple, wordy, but ardent services constituted the first evangelical book of worship in the French language. It was Farel who persuaded the retiring young Calvin to quit the scholar’s cell and get his hands into the difficult business of transforming Geneva into an evangelical community. Working side by side, they used the plain services of La Maniere when they conducted worship.
In April of 1538, the two ministers were expelled from Geneva, having exceeded the patience of the magistrates by their program for a disciplined community. Calvin spent his exile in Strassburg, where he enjoyed the Christian wisdom of Martin Bucer, the Reformer of that city, whose influence upon the Reformed churches has never been fully appreciated. While he lived among the Germans of Strassburg, Calvin was pastor of a congregation of French refugees. For their sake, he appropriated Bucer’s German liturgy; and when he had gotten it cast into French, he revised it measurably and used it to lead his people in worship. That was the original edition of The Form of Prayers. We ought not say, as many scholars do, that it was a mere copy of the German rite of Strassburg. Actually, Calvin kept the best of Farel’s primitive liturgy and contributed much of his own spirit as he refashioned the words of Bucer.
Calvin was recalled to Geneva in 1541. In place of Farel’s liturgy, he introduced The Form of Prayers, which he had brought along from Strassburg. Though the magistrates were glad enough to have him back, they could not accept some of the liturgical ideas which were written deeply into that liturgy. Chief of these was Calvin’s lifelong insistence upon having the Lord’s Supper every Sunday: “It was not instituted by Jesus for making a commemoration two or three times a year … Christians should use it as often as they are assembled.” The magistrates feared of such an innovation; they would not even entertain Calvin’s concession of having the Supper once a month, but insisted upon the schedule of quarterly Communion which had been proposed by Zwingli, the Reformer of Zurich. Even by the end of the sixteenth century, the Zwinglian method prevailed over a large segment of Protestantism and brought about the flattening-out of Reformed worship, which came more and more to be dominated by the sermon. The Genevan liturgy stood opposed to that drift. Despite the scruples of the magistrates, it remained a unified service of Word and Sacrament; on those days when the Lord’s Supper was not celebrated, the portions of the liturgy pertaining to the Supper were simply omitted. But Communion Sunday or not, the whole service was conducted from the Lord’s Table, except when the Minister mounted the pulpit to proclaim the Word of God. The two great symbols of Reformed worship—pulpit and Table—were thereby drawn together in common expression of the God who speaks and gives to His people. The essential response of those who worshiped was to bear and receive His gracious gifts.
The Form of Prayers was the most authentic expression of the way of worship among the early Calvinists. Indeed, it was the inspiration for all the great Reformed liturgies of the Reformation age. Therefore it drew together in a fellowship of worship the Huguenots of France, the Presbyterians of Scotland, the Dutch Reformed congregations, and the German Reformed people (whose modern American representative is the United Church of Christ, through the Evangelical and Reformed branch). We should not assume, however, that all of these services were exactly alike. The Calvinists placed no particular premium upon a similarity of forms. What they really held in common was a body of ideas about the meaning of Christian worship.
What were some of those ideas? First, the Calvinists agreed with Luther that a true Reformation could never be brought about by sheer human power, least of all by sudden and drastic changes in the life of the churches. It could only be accomplished by the proclamation of God’s Word among men. Luther, in fact, was very reluctant to impose a program of radical reforms upon the people, lest they become confused and bitter. He preferred to purify and reinterpret many of the old practices which Christians had been accustomed to see, hear and do in church. At just that point, the Reformed theologians tended to exceed Luther’s prudence. They argued that if the Gospel were to be given a really clear and authentic expression in worship, then it would be necessary to abandon the Mass, without attempting to fix it up, and to find new forms which would express the Gospel with the utmost simplicity, precision and power. Therefore, the Reformed liturgies had something of a radical character. They were meant to be profoundly simple. They did a lot of teaching, explaining and exhorting in an effort to edify and be precise. They rejected all things which were deemed unscriptural, ambiguous, or sentimental. They permitted no bric-a-brac to confuse the Gospel or complicate the essential need of the worshiper to meet God in His Word. Theological integrity was their hall mark. Calvin believed that his liturgy conformed “to the custom of the ancient church,” not to the custom of the Medieval church.
The second idea has been alluded to several times. Our spiritual forebears went to church not to rush into words or to give God gifts, but to hear the Good News of forgiveness and sonship, and to receive that great gift with thanksgiving and joy. They conceived it to be God who spoke in worship, provided His Holy Spirit was in the midst of the congregation, making His Word real, alive and effective in the hearts of men. Therefore, in essence, a Reformed liturgy was the fervent prayer of the people to hear the Word of God and to participate in the Communion of His Son, and a heartfelt response of praise and supplication by those who had heard and received, whose faith became articulate so that they could not contain the joy and wonder of it all.
Now, by modern practice, some things may seem strange about Calvin’s liturgy. What, for instance, is the meaning of that grisly list of sinners (on p. 7) who are told to stay away from the Lord’s Table? Calvin’s whole liturgy rested on the assumption that a true Christian community would be a disciplined community. And that idea, in turn, arose from his conviction that the Christian life was one of profound obedience to the will of God. Therefore, the Lord’s Supper was reserved for those “people who are distinguished by sincerity of faith and holiness of life.” Our Lord did not intend to give the benefits of His Table to any except His disciples, to any “except they belong to His household of faith.” The unfaithful, who were strangers to Christ, and the sinners, whose conduct made it plain that they did not belong to Him either, had no place at the fellowship meal; they must be excommunicated, excluded from the communion, fenced from the Table, lest the holy sacrament of our union with Christ and with one another become soiled and meaningless. Thus, the critical issue of the Christian life was precisely one’s fitness to go to the Lord’s Table.
Calvin also handled the elements of bread and wine differently. He much preferred the use of common household bread, because it was more primitive and less likely to foster superstition. Grape juice, had it been invented, would scarcely have been the vogue in Geneva. Never was it the custom in the Reformed churches to prepare the Communion Table before worship or apart from the Word which “ought to resound in our ears as soon as the elements meet our eyes.” Fearful of idolatry, Calvin did not have the bread and wine brought to the Table until it was time for the Words of Institution and the Communion Exhortation, through which the very commands and promises of Christ could be added to the elements, giving them their true meaning. That, said Calvin, is the “Word which seasons the elements” and makes the sacrament valid. But we ought not suppose that the elements are thereby changed. We, the people, are the ones who are consecrated by this “lively preaching of the promises of Christ.” He does not address the bread, commanding it to become His body; He speaks to us, calling upon our faith and promising us the communion of His body and blood.
Neither did Calvin believe that the ministers should be the last to receive the elements, as a gracious host would do at his own banquet. Christ Himself is both, the Host and the Food of this spiritual feast; and the ministers, who are leaders of Christians, should be the first to partake of it.
This short treatise on the Genevan Liturgy was published at the celebration of the four-hundredth anniversary of the Presbyterian Church held on November 18, 1959 at Trinity Presbyterian Church in Nashville, Tennessee.
Bard Thompson received his Ph.D. in church history from Columbia University in 1953 and was ordained as a minister in the Evangelical Reformed Church, which later merged with the Congregational Christian Churches forming the United Church of Christ. At the time this article was written, Thompson was Professor of Church History at Vanderbilt University. He was also preparing a book on Reformed worship, which he published under the title Liturgies of the Western Church (1961). In 1965, he joined Drew University as professor of church history and served as dean of the graduate school from 1969–1986. Bard Thompson passed away in 1987 at 62 years of age.
For a detailed history of the Genevan liturgies, see Thompson, Liturgies of the Western Church, pp. 183–224.
In 1 Corinthians 15, Paul compares and contrasts Adam and Christ. “In Adam all die … in Christ all will be made alive” (v. 22). Paul also refers to Christ as “the second man” and “the last Adam” (vv. 45, 47). The first Adam is the first man of God’s first creation. The last Adam is the beginning of God’s new creation. The first man was “of the earth, a man of dust”; the second man is “of heaven” (v. 47).
To the first Adam, God gave a special day, the Sabbath day (Gen. 2:2–3). To the last Adam, God gave a special day, the Lord’s Day (Rev. 1:10). The relationship between the Sabbath and the Lord’s Day is like the relationship between Adam and Christ. The relationship between them is one of shadow and reality or type and fulfillment. As Adam is a type of Christ, so too, the Sabbath is a type that points forward to and is fulfilled in the Lord’s Day. But the Lord’s Day is only a partial fulfillment of the Sabbath; its ultimate fulfillment is the consummate Sabbath of the eschaton.
When God created Adam, he gave him the Sabbath day to remind him of his identity and of his destination. As the image of God, he imitated God by working six days and resting on the seventh. Thus, the Sabbath day reminded him of his identity. It also reminded him of where he was going. It pointed forward to his destination: the eternal Sabbath; that is, the heavenly, unceasing rest in the age to come.
The weekly day of rest was the earthly counterpart or type of the heavenly rest that Adam would have entered had he been obedient to God. The earthly Sabbath was a temporary ordinance that would end at the consummation, when the shadow would give way to the reality. The weekly Sabbath would give way to the ultimate Sabbath. It would end because the reality of what it represented would be possessed.
When Christ, the new Adam, rose from the dead, he entered into that eternal, heavenly rest. By his personal, exact, and entire obedience, he attained what the first Adam would have attained had he been obedient. Christ, in his resurrection from the dead, received eternal life and glorification, which the first Adam never had. He entered a state of glory, the same state that we will enter when Christ returns.
However, believers are already “a new creation” because we have been united to the risen Christ, the beginning of God’s new creation. “The old [what we were in Adam] has passed away; behold the new [what we are in Christ] has come” (2 Cor. 5:17). We are no longer dead in our sins; we have been made alive together with Christ (Eph. 2:1–10). Hence, we no longer live according to the old, sinful nature, but according to the resurrection life of the new nature.
And that’s why the Lord’s Day is so significant for the Christian. It’s the day of resurrection; it’s the day of new creation. The saints in the Old Testament worshiped on Saturday because the new creation had not dawned. They worshiped on the Sabbath of the first creation, the Sabbath of the first Adam. We, however, worship on the first day of the week because it’s the day of the new creation, which emerged with the resurrection of Christ, the last Adam.
The Lord’s Day reminds us of our new identity in Christ, and worshiping on the Lord’s Day reorders our life in light of our new identity. It also points us forward to what we will become when Christ returns and gathers us to himself. When we gather for worship on the Lord’s Day, we experience a foretaste of what’s going to happen at the end of the world. Thus, the Lord’s Day orients our life toward the world to come. It teaches us to live as strangers and aliens on earth, to live as pilgrims seeking a better country, a heavenly one. It teaches us not to set our hopes on attaining paradise on earth but to fix our eyes on the risen and ascended Christ (cf. Col. 3:1–4).
Thus, worship on the Lord’s Day is absolutely essential to the spiritual health and well-being of the church and of every believer. It reorders our life in light of your union to Christ. It reorients our life away from earthly and temporary things toward the heavenly and eternal. And it redirects our steps away from the old order and toward the new order, the age of Christ and the Holy Spirit by whom and in whom we live.
On the night before his crucifixion, Jesus shared a meal with his disciples. Since this was the last in a series of meals he shared with them during his ministry, it’s known as the last supper. The disciples were discouraged when Christ said he would not eat with them again until the kingdom comes (Luke 22:18). The thought of their intimate fellowship with him coming to an abrupt end filled them with sadness.
At the time, they failed to realize that even though Christ was about to depart from this world and return to his Father, they were not going to be completely cut off from fellowship with him. To the contrary, it was better for them that Christ should depart because, after his departure, he would send the Holy Spirit to abide with them forever (John 16:7).
Christ assured them that through the Holy Spirit, they would continue to enjoy the most intimate kind of fellowship with him. In the person of the Spirit, Christ himself would come to them and commune with them. That’s why, before he ascended into heaven, he said to them, “Behold, I am with you always, to the end of the age” (Matt. 28:20).
Christ not only promised to give the disciples the Holy Spirit, he also instituted a sacred meal through which they could continue to enjoy table fellowship with him, even after his departure. This meal, which is known as the Lord’s Supper (1 Cor. 11:20), was given to the church as a perpetual, sacred ordinance of public worship. Christ commanded his church to “do this”; that is, “eat this bread and drink the cup” as a regular part of public worship “until he returns” (1 Cor. 11:24–26).
Hence, on the night in which he was betrayed, Jesus not only shared a meal with his disciples (the last supper), he instituted a meal (the Lord’s Supper) as a sacrament through which he would continue to have table fellowship and communion with the saints by his Spirit.
In the Gospels, Jesus is frequently criticized by his enemies for eating with sinners. For example, Luke tells us that when “tax collectors and sinners” were drawing near to hear Jesus, “the Pharisees and the scribes grumbled, saying, ‘This man receives sinners and eats with them’” (Luke 15:1–2). By making this statement, they were attempting to prove that Jesus was not a prophet.
The theological significance of Jesus eating with sinners, however, was far more profound than they realized. Jesus was not merely a prophet but was and is, in fact, the eternal Son of God. Sinners were having fellowship in the form of a meal with the one in whom the whole fullness of deity dwelt bodily (Col. 2:9). They were eating and drinking with God himself.
The simple fact that Jesus shared a meal with those who, because of sin, had been cut off from fellowship with God signified that salvation had come to sinners. When Adam and Eve sinned, they were driven out of the Garden of Eden away from the presence of the LORD. They were cut off from the intimate communion with God, which they had once enjoyed.
But the Lord Jesus Christ, the new Adam, came to restore and perfect the fellowship with God that was lost in the fall. Christ came to end the hostility between God and man and to reconcile them in a covenant bond of communion and fellowship. By eating with sinners, Christ heralded the good news that in him, “God was reconciling the world to himself, not counting their trespasses against them” (2 Cor. 5:19). His table fellowship with sinners was a visible gospel. It visibly proclaimed the good news of salvation for the lost.
In Luke 15, when Jesus was criticized for eating with sinners (vv. 1–2), he told three parables in response to the criticism: the parables of the lost sheep (vv. 3–7), the lost coin (vv. 8–10), and the prodigal son (vv. 11–32). These parables explain the significance of Jesus receiving sinners and eating with them. Eating with sinners was a sign that the lost sheep had been found, the lost coin had been recovered, and the prodigal son had returned to his father’s house and was feasting at his table. Thus, by eating with sinners, Christ visibly proclaimed the good news of salvation to the lost; his actions symbolized and confirmed the message he preached.
This is why Jesus characterized evangelism as an invitation to attend a feast in the Father’s house. In the parable of the great banquet, for example, the master of the feast orders his servants, “Go out quickly to the streets and lanes of the city, and bring in the poor and crippled and blind and lame” that they may partake of the feast (Luke 14:21). When the master discovers that there is still room, he sends his servants out again saying, “Go out to the highways and hedges and compel people to come in, that my house may be filled” (v. 23). Thus, evangelism may be characterized as an invitation to all people without exception to come to the Father’s house and sit as welcome guests at his table and enjoy loving fellowship and communion with him by his Spirit through the merit and mediation of Jesus Christ.
By the simple act of eating with sinners, our Lord Jesus Christ was visibly proclaiming the good news of salvation for the lost.
Paul’s aim in 1 Cor. 11:17–34 is to correct an error in the church at Corinth. In vv. 17–22, he states the error, and in vv. 23–34, he provides the solution. To rightly interpret the verses that state Paul’s solution to the error, one needs to know exactly what the error is that he’s addressing.
Paul describes the error as eating and drinking the Lord’s Supper in “an unworthy manner” (v. 27). So the error had to do with their manner of observing the Lord’s Supper. The solution to this error is briefly stated in v. 28, “Let a person examine himself, then, and so eat of the bread and drink of the cup.” To understand what Paul means by self-examination, one needs to interpret this statement in light of the error in the church that Paul is seeking to correct.
How exactly were the Corinthians eating and drinking the Lord’s Supper in “an unworthy manner”? They were observing the Lord’s Supper in a way that created divisions or factions among them (v. 18). As a result, the church was divided into two groups: one group which had plenty of food to eat and drink (the haves), and the other group which had nothing to eat and drink (the have nots). The haves were selfishly feeding themselves until they were completely full, while the have nots were left with empty stomachs. “One goes hungry, another gets drunk” (v. 21).
The haves were sinning against the church. They were treating their brothers and sisters in the Lord with contempt. So Paul sternly rebukes them, “Do you despise the church of God and humiliate those who have nothing? What shall I say to you? Shall I commend you in this? No, I will not” (v. 22).
By their selfish behavior, the haves were depriving their brothers and sisters not only of ordinary food that would nourish their bodies (note: the Lord’s Supper was an actual meal at that time) but of the sacred food that would nourish their souls. By selfishly feeding themselves and leaving nothing of this sacred meal for others, they were cutting them off from the blessed communion in the body and blood of Christ that they would have received by participating in the meal (10:16).
Their division of the church into factions and deprival of one group of saints of these spiritual benefits was an outrageous sin against the church, against the sacrament, and against Jesus Christ himself, who died for all the saints and who gives his body and blood through the bread and wine of the Lord’s Supper as spiritual nourishment for the soul of every believer. Thus, the haves were sinning against the spiritual realities signified by the bread and wine, namely, the body and blood of Christ. By eating the bread and drinking the cup of the Lord in an unworthy manner, they were “guilty concerning the body and blood of the Lord” (11:27).
Consequently, they were being disciplined by God with infirmities, illnesses and even death (v. 30). It is important to note that those who were punished by God in this way were genuine believers. Their punishment was not eternal condemnation. To the contrary, they were being disciplined by their heavenly Father, so that they would not be condemned along with the world. The divine punishments that they incurred were temporal judgments not eternal (v. 32).
If the error at Corinth was that they were observing the Lord’s Supper in a manner that created divisions among the church, and the solution to that error was self-examination, then what exactly does self-examination mean?
If the problem that Paul is correcting is division, then the solution to the problem is don’t create these divisions when you eat the Lord’s Supper. Instead of feeding yourself to satisfaction and leaving nothing left for your brothers and sisters, wait for them and make sure they also have food to eat. That’s essentially what Paul says in v. 33, “So then, my brothers, when you come together to eat, wait for one another.” But what if someone is starving and he can’t wait for the other Christians to arrive? Well, he should eat something at home before coming to church. “If anyone is hungry, let him eat at home—so that when you come together, it will not be for judgment” (v. 34).
In context, therefore, self-examination means to examine your conduct with respect to the unity of the church and with respect to the other members of the body of Christ. If your conduct is such that you have eaten more than enough to satisfy your hunger and have left others with nothing to eat or drink, then you have partaken in an unworthy manner.
Reformed theologians have regularly underscored the relationship between Word and sacraments.
The sacraments are appended to the Word for the purpose of confirming or sealing it.
The sacraments do not exist independently of the Word. It’s the Word that throws life into the sacraments.
Moreover, there is no grace that is unique to the sacraments. The same grace that is received through the Word is also received through the sacraments.
So Word and sacraments belong together as “two sides of the same divinely instituted instrumentality,” as Geerhardus Vos put it.
Even though Vos did not produce a lengthy treatise on the sacraments, he occasionally addressed the subject in his writings.
In a sermon entitled “The Gracious Provision,” Vos has the following to say about the relationship between Word and sacrament.
The word and the sacrament as means of grace belong together: they are two sides of the same divinely instituted instrumentality. While addressing themselves to different organs of perception, they are intended to bear the identical message of the grace of God—to interpret and mutually enforce one another….
Let us therefore be careful to key our preaching to such a note that when we stand as ministrants behind the table of our Lord to distribute the bread of life, our congregation shall feel that what we are doing then is only the sum and culmination of what we have been doing every Sabbath from the pulpit.
If you’ve ever studied the letters of Paul, you know how difficult they are to understand. Christians in the New Testament era and apparently even the apostle Peter found Paul’s letters “hard to understand” (2 Pet. 3:16).
Perhaps, the most difficult letter of Paul is 1 Corinthians. I’ve been preaching through the letter for several months, and nearly every text is a challenge.
Lately, I’ve spent a lot of time studying what Paul says about the Lord’s Supper in 1 Cor. 10 and 11.
The cup of blessing that we bless, is it not a participation in the blood of Christ? The bread that we break, is it not a participation in the body of Christ? Because there is one bread, we who are many are one body, for we all partake of the one bread. — 1 Cor. 10:16–17.
For I received from the Lord what I also delivered to you, that the Lord Jesus on the night when he was betrayed took bread, and when he had given thanks, he broke it, and said, “This is my body which is for you. Do this in remembrance of me.” In the same way also he took the cup, after supper, saying, “This cup is the new covenant in my blood. Do this, as often as you drink it, in remembrance of me.” For as often as you eat this bread and drink the cup, you proclaim the Lord’s death until he comes. Whoever, therefore, eats the bread or drinks the cup of the Lord in an unworthy manner will be guilty concerning the body and blood of the Lord. Let a person examine himself, then, and so eat of the bread and drink of the cup. For anyone who eats and drinks without discerning the body eats and drinks judgment on himself. — 1 Cor. 11:23–29.
These passages are rather difficult to interpret, partly because Paul’s use of the word “body” is ambiguous. He uses the word to refer to (1) the historical body of Christ that was sacrificed for our sins, (2) the sacramental sign of that body in the eucharistic bread, and (3) the ecclesiological body of Christ, namely, the church.
There seems to be a deliberate play on words when Paul abruptly shifts from using “body” in one sense to using it in another sense. For example, in 1 Cor. 10:16, “body” refers to the historical body of Jesus; in 10:17, it refers to the church. And the link between these two uses of the word “body” is the eucharistic bread (i.e. the sacramental body).
This play on words continues in 1 Cor. 11, and it creates some uncertainty (apparently by design) with regard to the meaning of the word “body.” Before eating the eucharistic bread, we must discern the “body,” says Paul, but what is the referent of the word “body” here? Is it the historical body of Christ given in the sacramental sign or is it his ecclesiological body, the church?
The context of the passage suggests that Paul has both ideas in view. One Reformed scholar has offered the following helpful summary of Paul’s use of the word “body” in 1 Cor. 10 and 11.
Dealing with the problem of food sacrificed to idols, Paul compares the idol feasts and the Lord’s Supper. If idols were real, eating sacrifices offered to an idol would result in κοινωνία [communion or participation] with these idols (10:19–20). Similarly, eating the bread and drinking the cup at the Lord’s Table is (somehow) a participation with Christ; more specifically, it is a κοινωνία [participation] in the blood and the body of Christ (10:16). In addition Paul relates the one bread with the ecclesiological community as one body (10:17).
Some exegetes have suggested an identification of the sacramental body of Christ and the ecclesiological body of Christ, implying that the church is literally the body of the resurrected Christ. I see no reasons to do so. The bread as κοινωνία τοῦ σώματος τοῦ Χριστοῦ [participation in the body of Christ] is primarily combined with the cup of thanksgiving as κοινωνία τοῦ αἵματος τοῦ Χριστοῦ [participation in the blood of Christ]. Consequently, Paul refers in 10:16 to the body as the historical body of Christ, given in the death for us. However, in 10:17 ‘body’ denotes the communion of the church. Note that Paul does not say that the church is the body of Christ, he only emphasizes their unity as ἓν σῶμα [one body].
Nevertheless, it is still remarkable that Paul, playing around with words, uses both the sacramental and the communal concept of body. At least he suggests a relationship between communion with Christ and his (historical) body and the communion of the church as one body. The corporate communion of the believers, participating in Christ, is connected with a moment of (Eucharistic) union with Christ. This suggests the importance of a concept of union to refer to this moment. The ecclesiological use of the body-metaphor however says more about the corporate nature of the church than about union with Christ, although this corporate nature results from union with Christ.
In 1 Corinthians 11 Paul returns to the theme of the Lord’s Supper. It is used in an unworthy manner: some remain hungry while others get drunk. The Corinthians did not eat together and despised the church of God. The problem is clear: a malfunctioning community. Within this context referring to the Lord’s Supper, Paul emphasizes that we should διακρίνων τὸ σῶμα [discern the body] (11:29). In 11:23–28, Paul refers to eating the bread and drinking the cup. As a consequence, it is reasonable that διακρίνων τὸ σῶμα [discerning the body] refers to the bread in the preceding verses as sacramental body of Christ.
However, the logic of the entire passage 11:17–34 necessitates that διακρίνων τὸ σῶμα [discerning the body] refers also to the ecclesiological body. It is undeniable here that Paul again plays with words and uses διακρίνων τὸ σῶμα [discerning the body] deliberately in an ambiguous way, hence relating the historical or sacramental body of Christ with the ecclesiological body. He sticks these two concepts of the body of Christ together on purpose. Laying this semantic relation by deliberate wordplay, he makes clear that those having communion with Christ by eating his body form together at the same time the body of Christ. Again we find a moment of union with Christ. Now the corporate union of the church and the union with Christ are related more explicitly.
In 1975, Hughes Oliphant Old published his dissertation entitled The Patristic Roots of Reformed Worship. Old persuasively argues that we have every reason to take Calvin and his colleagues seriously when they claim patristic support for their liturgical ideas.
The Reformers deliberately developed their approach to worship by returning, first and foremost, to the scriptures but also to the fathers of the church, whom they regarded as fallible, though generally reliable, interpreters of the bible.
Unfortunately, the Reformers did not have at their disposal one of the earliest Christian documents that describes various liturgical customs in the ancient church, namely, the Didache.
With the fortuitous rediscovery of the Didache at the end of the 19th century, we have access to a critical resource for doing precisely what the Reformers aspired to do, namely, to reform the church’s worship in light of holy scripture and the customs of the ancient church.
My dissertation entitled The Eucharist in the Didache, which you can read here, is a modest attempt at continuing the important work of reforming the church’s worship in light of patristic customs.
Oscar Cullmann wrote several treatises on the subject of Christian worship. His treatise entitled Baptism in the New Testament was originally published in 1950 and was intended as a rebuttal of Karl Barth’s infamous rejection of infant baptism (see Barth and McMaken).
Cullmann treats the subject under the following four heads: The Foundation of Baptism in the Death and Resurrection of Christ; Baptism as Acceptance into the Body of Christ; Baptism and Faith; Baptism and Circumcision. | 2019-04-25T16:30:50Z | https://reformedforum.org/worship/ |
Objectivity, Subjectivity. Fear and a New Year.
Most of the time, I try to live as objectively as possible. Of course, actual objectivity is impossible, but I generally try. I want to be fair to others, and most of all I want to invite the Spirit, which testifies of truth.
But this isn't a post about what is objectively true, it's a post about feelings. Pure, unadulterated, vulnerable subjectivity. Sharing what I subjectively experience makes it very easy for me to be attacked, but I'm tired of holding myself back so that I won't be vulnerable.
When I was no more than seven, I remember gently removing the shed skin of cicadas from the slat-wood fence in my parents' backyard. We would gather roly poly bugs and watch them curl and uncurl. One of my greatest ambitions was to find a queen fire ant, so I could have my own colony. I kept a careful eye on the date tree in our front yard, finding out that coconut trees and date trees were very different things.
I asked millions of questions, and stored the answers in the back of my mind. I climbed olive trees and dreamt of dinosaurs flying overhead. I read every book I could get my hands on, immersing myself in the stars, in the layers of the earth, in learning about peach trees and honey bees.
When we visited my grandparents, I followed one around and fed his calves and goats. The other taught me about herbs and roses. I learned that spiders love grape arbors, and that dog food doesn't taste good.
Later, I looked into the maw of a dormant volcano, smelled the sulfur pits, watched humpbacks dive on the horizon. I gathered and preserved sea urchin, learned about man o' war jellyfish, and how to pick blackberries with minimal scratches. Everywhere I lived, there were new explorations and always, always more to learn. What I could not learn by experience, I learned from books. Sometimes, I feel as though I have lived dozens of lives in my short years here.
This is not my typical feel-good, soft post. I'm going to say something very harsh here. I am truly sorry to further wound those who are already in pain. But I have been wrapped up in a cycle of pain regarding the Church myself, and from that position I feel that I need to speak up, say what I need to say, even if I'm not loved for it.
You're looking for justification for women not having the priesthood. You think that, if the Church doesn't ordain women, there has to be a reason, even if that reason is just because God says so. You are frustrated and upset because you haven't gotten a "clear answer" that satisfied you. You don't feel valuable in the Church because you're not getting the answer you want.
And that is why you are missing the entire point. Because you assume that the prophets and/or God have to answer to you, give you what you want how you want it, you are causing yourself nearly unbearable pain. The justification, the only answer that you're going to get is that the leadership hasn't implemented it. Full stop.
The reason you don't understand the prophets' actions, or the stance of those who follow them is because your underlying assumptions have already taken you to a mode of thinking that is incapable of comprehending them. Take a step back from your assumptions for a moment—I know it is very, very painful and difficult, but try.
How does it fit into an LDS view of eternal marriage?
What recourse does a Mormon woman (or man) have in an abusive marriage?
What can we do to change our understanding of marriage?
I'll post my thoughts in the future, but first I want to hear what you think. Email me if your comments are too personal to post publicly. I promise I won't reproduce or quote them without your permission.
Everyone is mourning the loss of Robin Williams. Through his gift of acting, he has inspired, blessed, and cheered us. In Dead Poet's Society he taught us to be more than what we are. In Mrs. Doubtfire and Hook, he taught us to love our families. His smile is iconic. His soft voice makes us feel love.
And yet, he was bipolar. His family life was chaotic, and he may have finally committed suicide.
We all love Robin Williams for what he gave us, but there was a cost. His life was turbulent, his internal emotions intense and swinging. I relate to that somewhat. Though I'm not bipolar, I am very passionate. But it is from that very place of pain that genius is born.
I think, when we tell people they can "choose to be happy" or "positive outcomes only," we invalidate their pain. We medicate sorrow as if it's a disease, and we tell ourselves to avoid people in pain as if it is communicable. We are increasingly unable to deal with sorrow, to mourn with others who mourn and to comfort them. We are unable to reach out to make the very connections that make our burdens light.
I am in the awkward position of not knowing my position. Increasingly, I find myself disagreeing with almost all the ideology of both the liberal and conservative bloggers' side, and ideology of the mainstream members. It leaves me with the very real possibility that I am the one going wrong.
Increasingly, the things said over the pulpit do not resonate with me. But neither do any of the things from other perspectives. Maybe I'm just overstressed and finding myself incontrovertibly rooted in the right-now, physical world. Maybe having lived in survival mode, in fear for so long makes me utterly unlike the rest of the world, without the capacity to gnaw over the past, politics or religion. But maybe my constant tension means I'm losing touch with the Spirit.
I find myself hungry for doctrines that resonate with me, thirsty for the Waters of Life. And, as in prophecy, I do not know where to find them. My prayers consist mostly of "I don't know what to ask for, but please help." My list of Things I Need to Repent From grows longer daily, and I still haven't the least clue how to change any of them. Repentance is easier when you know what you are doing wrong, or know how to change it when you do.
It breaks my heart to see so many people struggling in the wake of excommunication. It is like a sea of disquiet. I know I can help one soul at a time, but right now the pain is overwashing anything I could do, so I'm mostly just listening.
There is so much discourse about women's terrible temple experiences, how the endowment ceremony hurts them, how it keeps them unable to understand their place and who they are as women. Right now all the stories seem to be about how unequal and terrible it is. But I believe in the power of stories. Parts of my story can only be shared one-on-one, in person, when moved by the Spirit. But right now I feel constrained to share something publicly. Maybe seeing how I process my temple experience can help someone else who is trying to understand.
"...Ye must repent, and be baptized in my name, and become as a little child, or ye can in nowise inherit the kingdom of God."
I think Satan rejoices just as much over smug self-satisfaction as he does about those who error in doctrine. Contention is not just about asking questions, it's also about condemning those with different paradigms than ours. Not all who subscribe to OW are in open rebellion, and I think those of us who don't believe in liberal principles or female ordination need to guard our borders against pride just as much.
It is so easy for us to look at those who perceive the world differently and think we are somehow better and more righteous. But I think that when we become comfortable in our service to God to the point that we believe we are right and others have nothing to teach us, we run the real risk of pride.
Pride is not only the enemy of humility, it is the opposite of charity. Charity is more important even than faith, for faith fails. If we are earnest disciples to Christ, we will inevitably reach some moment in our lives when our faith is not enough to pull us through. But when those times come, we can cleave to the Savior by emulating His charity. Charity is more important than knowledge. Though we are to gain as much knowledge as we can in this life, we will not likely gain it all. There will come a time when our own understanding and knowledge will fail us. But we can fill the gaps of our understanding with a love for God and His children.
No one is entirely lost, no one is entirely saved. None of us are safe, even if we accomplish our Church service, support our leaders with silence and compliance, and do all that we are asked in this volunteer church. We can still fall prey to pride, to vain ambition, to the idols of the world. The Church of Christ is not made up only of members, nor is it only those who have been baptized. The Church is all those who repent: those who repent of misunderstanding doctrine, and those who repent of a lack of charity and compassion. Both errors I see just as much in "faithful members" of the Church as in those who are considered less faithful.
"Satan doth stir up the hearts of the people to contention concerning the points of my doctrine; and in these things they do err, for they do wrest the scriptures and do not understand them.
"Therefore, I will unfold unto them this great mystery; For, behold, I will gather them as a hen gathereth her chickens under her wings, if they will not harden their hearts; Yea, if they will come, they may, and partake of the waters of life freely. Behold, this is my doctrine—whosoever repenteth and cometh unto me, the same is my church. Whosoever declareth more or less than this, the same is not of me, but is against me; therefore he is not of my church."
All the repentant will have a chance to be baptized. All will be able to make those covenants. But not all who are baptized are repentant. I challenge any of you who disagree with people like the OW movement to humble yourself in prayer and pray for that charity which is the end of all pride, all fear, and all death. That charity is the most powerful gift God can bestow.
Like everyone, I just heard of Kate Kelly's excommunication. I expected to feel somber at the news. I didn't expect the tears.
I do not agree with Sister Kelly's actions in any way. Yet, I had still hoped there would be a way for her to repent before excommunication happened. I imagine to myself what it would feel like to be cut off from the Church. That it would be devastating is without doubt. I imagine her family, her children, her husband and herself. This has to be a sobering experience.
While I would probably have chosen no differently, had I had to make that terrible decision, still it cuts me. I may not entirely understand it, but I mourn. I mourn any time I hear of someone leaving the Church for any reason. I wish that she had not felt that she had to give up her covenants in order to "be authentic."
I hope and pray that she finds a place in her heart to make those covenants again.
I have never been called before a disciplinary council. But on my mission, I experienced something similar. Near the end of my mission, my mission president was released and a new one was called. My first mission president had incredible perception by the Spirit. He allowed me to be the kind of missionary I was drawn to be, even though it caused considerable upheaval and confusion among the ranks of the elders called to lead me in my work.
I remember going to interviews with him, which happened once every six weeks, nervous that I was going to be called on the carpet for the disagreements about how to conduct missionary work I had been having with my leaders. Every new set of leaders in every place I was moved (and it was frequent, at the beginning of my mission) was a new battle. They were called to report numbers of baptisms and lessons taught. I was inclined more to concentrating on the people I came in contact with, feeling strongly that counting numbers was not going to be effective in the area I served.
Like everyone who wants to do better, be better, I sometimes struggle with my relationship with divinity. I have been amply blessed in a myriad little ways. Nothing major, until recently, but repeated small nudges to say something or check on something that ended up saving me just enough to keep me sane. Some days, it has felt like I'm barely holding on with torn and bloody fingernails, but have been touched with just enough extra energy to keep holding on. It is like I'm part of a vast chorus where, hoarse and broken, my voice does far more to create dissonance than beauty.
Recently, the hand of the Lord has been much more obvious. For the last month or so, I have been attending a ward temporarily while I am in transition from one house to another. This ward has several women who are going through divorce. As I've learned of them, and heard some of them speak, I felt prompted to bear my testimony in Fast and Testimony meeting.
This was a difficult proposition because my testimony, as I have said before, is not smooth and pretty, cut to show light and sparkle. It is cracked, crazed, with deep inclusions. It's a bit off-color. The deliverance I've prayed for over the last several years has been slow in coming. Most days are beautiful, but I still sometimes crack under certain types of pressure which I feel ought to be long gone. I'm still triggered, sometimes, over silly things.
I've been in a liminal state for some time, but it is a liminal state where I feel unseen things are happening, that I am being pruned and developed for some specific purpose. I am changing in ways I can't quite see, let alone quantify. I have started several drafts for blog posts but never finished them. I find myself with few comments to make on others' posts. Whatever changes I'm going through don't fit labels easily. I am becoming, but I'm not becoming anything.
Last Sunday, for the first time in several months, I had to get up and leave Relief Society. It wasn't because I was upset, it was because I was angry. The well-meaning woman in the front of the room, addressing the concept of woman's ordination, chose to mock the entire idea. Met with laughter from other sisters in the room, she declared, "Who wants the priesthood? I have enough to do!" She went on to suggest that the OW movement was stupid, faithless, and foolish. I finally left when she started listing all the "access" that single women have to the priesthood.
It would probably take some who only know me online by surprise that it bothered me as much as it did. Others are probably convinced I'm a sympathizer and agree with Ordain Women, though previous posts of mine should make it clear that I'm not. But while I am no sympathizer to the Ordain Women movement, I am an empathizer. Many of the same things that have led these women to "supplication" at the doors of the Tabernacle are things that I have felt.
As a single woman, I've experienced cradling a sick child in the middle of the night with no one to ask to give her a blessing. As a married woman, I experienced asking someone to offer a blessing only to be refused. I've been summarily overridden, my perspective and revelation in my stewardship discounted because I was not one of the ultimate decision makers. As a sister missionary, I've been subjected to ever-increasingly creative verses of "Sisters are Stupid," a song set to the tune of "I Often Go Walking" because the prevailing opinion was that sisters shouldn't bother themselves with priesthood duties such as sharing the Gospel. I've been judged and rejected for not being enough of an appendage. While none of these things SHOULD have happened under a priesthood organized as it is, they all did at least partly BECAUSE of how it is organized, giving those so inclined to interpret women as less-than.
I know the sting of possessing no organized authority in the Church of my Savior.
Recently, I listened to Kate Kelly's podcast where people were invited to "ask her anything." Listening to it, I changed some of my opinions about Kate Kelly and the movement, and others were confirmed. I may have nothing more to add to the discussion that has been going on around her and the Ordain Women movement. But I have felt the Spirit prompting me to write. Even as I type these words, I'm not sure what exactly I'm going to say.
I am one who has struggled mightily with female roles in the Church and in eternity, yet I have a VERY hard time being sympathetic to Ordain Women as a movement. Most individuals who have aligned themselves with that group, I sympathize and even empathize with. I have gone to the mattresses on many of those same issues many times. I am not known for my reticence in speaking up.
There is nothing new about Ordain Women. They have organized together in direct, open, and unapologetic opposition to the Church. I'm not going to pick apart their claims to faithfulness and belief in priesthood authority while publicly opposing that authority. There is really no need, it's obvious enough. I also have no doubt that there are well-meaning people caught up in the smoke and mirrors. But I personally don't have a very long rope when it comes to that brand of deception, conscious or not. I'm all too well acquainted with it.
Public demonstrations and forceful activism are exactly contrary to the principles upon which the priesthood is built. How can they ever expect to wield the power of God when they so clearly don't understand even the most basic aspect of it?
My daughter is preparing for baptism. One of the things I encouraged her to do was to go up in front of the ward and bear testimony. She is seven years old, and very concerned about what other people think of her. Though she used to bear testimony regularly as a small child, she hasn't for some time after developing excruciating shyness in front of an audience.
I told her that bearing her testimony in Church on Fast Sunday might be a good thing to do before making the covenant to stand as God's witness. She agreed to do it, but her fears soon overtook her.
"But I don't know what to say," she said.
"You say what you believe in. What the gospel of Jesus Christ means to you."
"I'm going to be nervous."
"Most people are nervous, sweetheart. If you want me to, I'll go up with you."
She nodded, but still looked doubtful. "That would be good, mommy."
"I will stand up with you and hold your hand, if you like."
"Will you whisper what to say?"
Sometimes it is worthwhile to call out bullies, even relatively harmless internet bullies. So, since this particular bully finds himself unable to allow the entirety of this exchange to post on By Common Consent, I post it here, if for no other reason than to show that he doesn't intimidate me. In fact, I find the whole thing pretty funny.
My comment was made on a thread unfavorably comparing Mormon service to Pentecostal service. Normally, I skim over those kinds of posts but don't bother commenting because they are all too common and all too typical. But this one had a really good message, I thought, behind the dig at the Mormons and how we aren't good enough. It was contrasting service as a duty and ministry, which I feel is a powerful and poignant lesson. Unfortunately, because of the way it was framed, it almost immediately devolved to the plebeian and predictable critique of Mormons and how we're not charitable enough. Because of the good message, I thought I might say as much and counteract the trend by mentioning that Utah is known for generosity.
And yet, despite my disappointment in the outcome, there are a few places that the glorious potential of the storyline peeks out, just to show us what we're missing. I don't want to harp on the disappointing parts, I want to explore that great part, and maybe contradict some of the concerns.
This is my daughter's newest favorite song. It has long been one of mine as well. I think it has one of the tenderest aspects of doctrine in the Gospel. This year, that same daughter is making the decision to be baptized. It is something filled with mixed emotions for me, most of which I don't want to get into. But on this day, when we celebrate love, I want to celebrate both loves which changed my life: the love of God and the love of my children.
I am far from perfect, especially right now. It has seemed, especially lately, that the church is leaving me behind. I don't feel a part of it. I don't feel a part of the Lord's Kingdom. And that hurts. If I could put my finger on one thing I want more than anything else, it is to feel like I belong, like I'm part of accomplishing something good. And I don't.
But as I wrote some time ago, I feel as if the Lord wants me here. Nearly four years later, I still don't know why. Not much has changed. I have a burning testimony that the Gospel is true, I just don't know how I fit into it. And I'm watching my precious child, with many of the same self-critical personality traits that I have, prepare to make this huge covenant. I'm proud of her, and terrified for her.
When reading others' discussions on gospel topics, especially those that people struggle with, I find it fascinating to see just how much our internal biases affect how we can listen to the Spirit. Most of those common issues are not problems for me. I've prayed about it and received answers that satisfy me, ways of looking at mortality, the Church, and God's dealings with His people which give me patience and a bit of a sense of humor about the whole thing. But many people struggle perennially.
While those aren't problems, I've been struggling in the same way with personal answers. It's as if I feel that an answer is out there, I'm just incapable of hearing it, no matter how I wrack my mind and heart. As a silly example, it is as if I hate breakfast cereal and am praying over breakfast to know what is healthier to eat, a doughnut or Cheerios. The whole time, the Spirit is trying to tell me to eat oatmeal, but I just don't have a paradigm for it.
Watching others makes me wonder how often I do this, and how to get around it.
For what sorts of problems are you waiting for an "oatmeal answer"?
Imagine you are swimming in a deep and turbulent ocean. Nearby is a good-sized boat, and on the boat are people cheering you on. It will be over soon, they cry. The shore is only a few hundred feet away! This is such a rough sea, the captain of the boat hollers. Aren't we glad we're in this together? You'll get there, I know you will!
Meanwhile, your arms are somewhere past exhaustion. Your mind is shutting down, and all you can think is to keep moving. You've lost all sense of trying to move somewhere, all you know is you need to keep paddling your arms and legs because the alternative is stopping. And while part of you thinks stopping sounds pretty restful, and maybe not that bad, you know in your deepest heart that stopping is giving up. You're not going to give up.
The people on the boat are rocked with the same waves that are swamping you. They are nice people. They are cheering you still, telling you what a great swimmer you are, how they don't think they could swim as well as you are. Every once in awhile, one will express the wish that they were able to throw you a lifesaver. Unfortunately, they are struggling to hold on to the railings so they won't be washed overboard. You get it, you're not upset by it. But you still kind of wish they'd stop cheering you on and let you concentrate.
"Lo, these many years do I serve thee, neither transgressed I at any time thy commandment: and yet thou never gavest me a kid, that I might make merry with my friends: but as soon as this thy son was come, which hath devoured thy living with harlots, thou hast killed for him the fatted calf."
This parable of the prodigal son has long troubled me. Partly for the same reasons it troubled the elder son. The younger was lazy, wasteful. He didn't care about his father's example, teachings, or entreaties. While the older son labored diligently to honor his father, it was the younger son who received honor simply for coming home.
With the recently released study topic on race and the priesthood in the LDS Church, there is predictably a flurry of praise for the Church's efforts and criticism that it wasn't enough. And, naturally, questions are being raised about the significance of the Church disavowing past explanations for the Priesthood ban and discussion of the racism that caused it, and what that means for following current leaders now. The racial ban could not have been any part of God's will, an argument often runs, because God would never cause so many people so much pain. Therefore, policies which currently cause pain cannot be of God's will, either, so there is no obligation to follow the prophets in matters which cause people pain.
While I am not black, I have been a victim of others' bad choices before. I know what it is to feel pain from the perspective and opinions of Church leadership, as well. It is from that experience and the things I have learned about the nature of God that I now address some of my feelings on this topic. It isn't meant to tell other people how to think or feel, but only to share my personal reaction to fallacy in my priesthood leaders which affects me. I, obviously, have no right to demand the Church leaders repent on the issue of blacks and the priesthood. I am not the injured party. But what I can do is liken the situation to myself, and what I have experienced, so that I can learn from it. With that in mind, although blacks and the priesthood is a parallel, it is not the whole point.
I hadn't thought about it for years...decades, even. I was pondering something completely unrelated, and this image flashed before my eyes of an old, wrinkled Portuguese man sitting in front of a basket of wicker reeds smiling at me. I know who he was. He was the man my mother purchased wicker from. This was back in the mid-eighties and we were living on a tiny island called Terceira in the Açores, Portugal.
I was only a child, somewhere between eight and ten. My memories are not crystal clear, and of course I'm interpreting them now through an adult lens. I don't even know how accurate my memories are. But I remember his brown, wrinkled skin contorted into a smile. I remember his hands, callused from hours of working the tough reeds, softened by hours of soaking in water. All you had to do was take a picture of something made from wicker, give him dimensions, and he would make it for you. He was smiling because I had tried to speak to him in Portuguese, a language of which I remember practically nothing, now.
There is a point at which argument is futile. When two sides of a disagreement are so firmly rooted in their own perceptions, and those perceptions are coming from intrinsically different structures, there is not enough common ground for discussion.
This is, perhaps, why I haven’t really addressed the gay marriage battles going on in the United States of America since they started. I have listened to both sides, found fault and good with both, and made my conclusions. And most of the time, when I try to share why I believe the way I do, I only invite attack.
I do wish to state, perhaps for my own benefit alone, that I do not support gay marriage. I used to, before I started blogging. Getting involved in blogs certainly catalyzed some of my change of mind. I’m sure there are many out there who discount my opinions because they assume they are solely religiously based, or because they come from a place of ignorance and fear. I can protest as much as I like, but I’m not likely to change the minds of people so unapologetically closed-minded. I’m not even going to bother.
There is much I could say about gaining respect for differing moral stances. The arguments for gay marriage are generally based on the moral structure of secularism, the arguments against gay marriage are generally based on a moral structure espoused by many religions of the world. I believe that “separation of Church and State” in our country was never meant to restrict moral opinions from the public sphere. In fact, I believe that creating a space where individuals can act according to their morality in a public sphere without fear of losing employment, housing, physical safety, the ability to reasonably conduct business according to their conscience, and relative peace in their private lives was a core point of our government.
And, like it or not, the bulk of efforts to remove that freedom from fear is coming from those who think secularly. Many believe that individuals should have no right to exercise religiously-based morality in a public sphere, but ought to be forced to behave according to secular morality.
I would fight—have fought—equally hard to defend a gay person’s right to behave according to their beliefs in a public sphere as I now defend my own. I would shop at a store owned by a gay person. I'm as likely to design a gay friend's wedding invitations as those for a straight friend, were one to ask me. But I believe that the right to behave a certain way is not the same as a right to be publicly supported for it.
Determination of the lines of law—deciding what the public should pay for, support, and condone by law—should only be legally determined by a slow and cautious approach to lawmaking, including ALL the branches of government. Rushing headlong, deliberately bypassing checks and balances in the legal system, will inevitably reap consequences in unexpected directions.
I am afraid, watching the way law is happening now. And even if you support gay marriage, you should be afraid, too. The rate at which individual freedom to act according to personal moral conscience is being denied is frightening. When legal paths have been opened, they are very difficult to close. Almost overnight, changes are being made that alter the way people are allowed to live their lives. Though that may work in your favor today, there are no guarantees for tomorrow.
I do not know if my feelings on gay marriage will soon rob me of my ability to act according to my conscience in my employment. My line of work makes me one of those who could easily be forced to participate in things I find reprehensible. I wish, even if gay marriage wins wholesale, that those of religious moral conscience will be able to win a space for themselves. Not only to protect religious institutions, but to protect religious people.
Make no mistake. This war is not just about gay marriage. It is much more fundamental than that. It is a war between religion and secularism, a clash of whether or not people will be allowed to act according to a religious source of morality. Whether or not their votes will be taken away. Whether or not they can choose to conduct their business as they believe they should. Whether or not they are allowed to raise their children in the faith they hold dear. Whether or not they are allowed to speak their hearts, or must remain silent for fear of dire consequence.
There are many voices of empty reassurance, claiming that such things could never happen. But they are already happening. People claimed that welfare for single moms wouldn't result in more single moms, that loosening divorce laws wouldn't result in more divorces. They are blind to the lessons of history, and ignorant to human nature.
Some rights cannot be granted without robbing the rights of another. You can't give the right to drink and drive without potentially robbing a drunk driver's victim of the right to life. You can't give gay people the right to demand the services they want from whom they want them without robbing the service provider of the right to sell their services to whomever they wish to sell them. There is always a price. Some ideals cannot be legislated without sacrificing other ideals.
I mourn for our country. Not because gay marriage is becoming legal, but because of the way that victory is being won and the intentions in the hearts of those who are winning it. Such desire to silence opposition exists everywhere, male and female, gay and straight, religious and secular, but when it is popular and celebrated—when it is in power—there is no one who will escape the price.
Yet, despite my sorrow for the sins of this world, I know in whom I trust. The Book of Mormon is now more than ever before an obvious warning to the righteous, a chance to prepare. We may be called to lay down our lives as so many before us have. But if we keep the love of God in our hearts even as the mobs mock and ridicule, we will have a rock of faith through the trials to come.
“O, ye nations of the earth, how often would I have gathered you together as a hen gathereth her chickens under her wings, but ye would not!
Though it feels rather uncomfortable and egotistical, I've created a Facebook Page for myself. There, I will post thoughts that don't make it into a post, links, and comments I make in other blogs. Hopefully, it will be used wisely.
This post on pain and choosing happiness is beautiful. Choosing to be happy rather than bitter often takes work. But it's worth it.
"A certain man went down from Jerusalem to Jericho, and fell among thieves, which stripped him of his raiment, and wounded him, and departed, leaving him half dead."
Have you ever noticed that not many of Jesus' parables have an ending? We don't know what ultimately happened to the good Samaritan. Was he rewarded for his deed? Did the wounded man heal? What about the five virgins who were turned away? And the man with the one talent? Did he learn from his mistake?
Contrasted with the stories we tend to tell each other today, where sacrifice is rewarded and sorrow is always temporary, we are left wanting to know what's next. There is some primal part of us, deep in our psyches, that yearns to know that the good guys "lived happily ever after." Walt Disney built an empire on it.
My life isn't an "okay in the end" kind of life right now. I'm being held in a liminal state, where I know where I want to be, I think I know where God wants me to be, but I have no idea how to get there. It is sheer agony for someone who has always worked for a goal, tried to become something.
That happy ending seems impossible from this end of the very long, dark tunnel. So I've been digging deeply into my heart, learning to let go of tomorrow's ending so that I can dive into today's opportunities to minister. I'm not very good at it yet, but the seeds of true charity are starting to sprout.
This year, I also created one made from the titles of the posts I did not publish. Not all of them were fully written, but it does give a glimpse into things that were on my mind, but didn't make it to a full post.
May this year be one of growth and joy, just as last year was. | 2019-04-19T07:15:43Z | http://rainscamedown.blogspot.com/2014/ |
To use any domestic remedy, specific knowledge and skills are required. Simple logic dictates that the use of wild plants in the context of limited interaction with nature requires prior identification, while in the case of non-plant remedies and cultivated plants this step can be omitted. This paper aims to document the current and past uses of non-plant remedies and cultivated plants in the study region for human/animal medication; to analyze the human medicinal and veterinary use areas in the context of the remedy groups; to qualitatively compare the results with relevant historical publications; and to compare the intensity and purpose of use between the remedy groups.
During field studies 134 semi-structured interviews were conducted with locals from 11 villages in the Liubań district of Belarus. Currently used home-remedies as well as those used in the past were documented by employing the folk history method. The subject was approached through health-related uses, not by way of remedies. Interview records were digitalized and structured in Detailed Use Records in order to ascertain local perceptions. An Informant Consensus Factor (FIC) was calculated for remedy groups as well as for different use categories.
In the human medication area the use of nearby remedies was neither very diverse nor numerous: 266 DUR for 45 taxa belonging to 27 families were recorded for cultivated plants along with 188 DUR for 58 different non-plant remedies. The FIC values for both remedy groups were lower than for wild plants. In the ethnoveterinary medicine use area there were 48 DUR referring to the use of 14 cultivated plant taxa from 12 families and 72 DUR referring to the use of 31 non-plant remedies. The FIC value for the whole veterinary use area of cultivated plants was relatively low, yet similar to the FIC of wild plants.
Differences between remedy groups were pronounced, indicating that in domestic human medicine cultivated plants and non-plant remedies are either remarkably less important than wild ones or not considered worth talking about. In ethnoveterinary medicine non-plant remedies are almost equally important as wild plants, while cultivated plants are the least used. People in study area seem to still more often rely on, or are more willing to talk to strangers about, wild plants, as promoted by both official medicine and popular literature.
Academic human and veterinary medicine has advanced rapidly during the last few centuries. Educated help has become very effective, widespread, and rather affordable (or even free) in most European countries, making academic medicine the first and often only choice for the majority of Europeans. Yet, complementary and alternative medicine remains popular and is used for treating specific alignments . Herbal medicines are often highlighted as the most popular among different treatments (for example ).
Quite logically, most researched remedies in the enthobotanical literature appear to be plants, leaving aside other possible means used for healing in the home setting. Research on the traditional or local medicinal (and very rarely veterinary) use of plants is quite often paired with the documentation of the food-use of (wild) plants [3, 4], while non-plant remedies are rarely documented, and if they are they concentrate on only a single remedy (such as ). Yet, recent ethnobotanical research has shown that in Eastern Europe a wide variety of non-plant remedies are still used for healing different human and (more rarely) animal health conditions .
In order to use any domestic remedy, specific knowledge and skills regarding what remedy to use to treat a specific disease and how to make it, as well as how to apply or preserve it, are required. For wild plants that grow outside of direct reach, an additional set of specific knowledge is needed, including where they can be found and how to recognize or differentiate them from similar taxa. Hence, the use of non-plant remedies requires a less detailed knowledge set compared to the one needed for the use of plants.
Cultivated plants fall somewhere in between wild plants and non-plant remedies in terms of availablity at home: they grow in close proximity to people, and hence are more or less at hand, yet one has to possess specific knowledge regarding their cultivation. Moreover, through cultivation the taxa are well known, and as a result the identificaton step needed for wild taxa can be omitted. A study examining changes in medicinal plant use in Estonia over the course of a century suggested that the use of plants tended by humans has increased over time as people have fewer encounters with nature and they feel more confident using plants they know for certain . This suggests that the use of cultivated plants could also now be preferred or at least as popular as the use of wild ones, as the historical legacy is quite similar to that in Estonia. Yet, in Belarus, no specific studies of medicinal plants cultivated in home gardens have been conducted. However, some additional data apart from a list of the most common cultivated plants can be found in the ethnographic literature. For example, the most diverse collection of archival data from the Polish-Lithuanian-Belarusian borderland was collected in the 1930s by a Polish ethnographer from Lviv, Adam Fischer. These data were originally gathered for publication in the first part of the Lexicon of Slavic beliefs and customs, dedicated to plant uses in traditional Slavonic culture, but this objective has not yet been realized. Modern Polish researchers have analyzed and published some archival data . In Fischer’s archival data home garden plants are represented by 18, mainly ornamental, species: peony (Peonia sp.), marigold (Calendula officinalis), Tagetes spp., mallow (Malva sp.), garden nasturtium (Tropaeolum majus), perennial phlox (Phlox paniculata), panicled aster (Symphyotrichum lanceolatum) and sneezewort (Achillea ptarmica). Two species were mentioned as potted plants, namely agave (Agave sp.) and surprisingly dwarf everlast (Helichrysum arenarium). Gourd (Lagenaria siceraria) was planted for its fruits, which then were used indoors – mounted on wardrobes and tile stoves for ornamental purposes. This group comprises valuable and useful plants which could simultaneously be treated as ornamental and medicinal: mint (Mentha spp.), rue (Ruta graveolens), poppy (Papaver sp.), elecampane (Inula helenium) and southernwood (Artemisia abrotanum) .
In the post-war period since the 1960s the use of cultivated medicinal plants has become the subject of study in pharmacology as well as agricultural and veterinary sciences, for example ([9, 10], etc). In the 1990s and 2000s, brochures and encyclopedias on the use of cultivated plants from home gardens for medicinal purposes gained in popularity, for instance ([11, 12], etc).
During ethnobotanical and ethnomedicinal fieldwork conducted in the Liubań (Любань) district of Belarus we documented, along with the use of wild plants (outlined in ), the use of all non-plant remedies pertaining to humans and animals as well as the medicinal and veterinary use of cultivated plants. Initial analysis of the results revealed that the uses of both remedy groups are quite limited, in both nomenclature and diversity of use, compared to wild food plants. However, the number of interviewees and depth of the interviews allow for deeper insight. Moreover, as the historical literature on Belarus covers non-plant remedies to a greater extent than the use of medicinal plants, it is a good opportunity to determine if recorded historical uses of non-plant remedies are still practiced or at least remembered.
As similar studies rarely assess the use of non-plant remedies, we decided to examine the subject and compare the intensity and diversity of use of different kinds of remedy groups – in this case non-plant remedies as well as cultivated and wild plants (the last group was covered in ) – to establish if there are any differences in use-patterns within or between the groups. With this information we aim to establish if virtual proximity to the domestic arena and diverse practical availability influence the importance of a remedy in domestic human and veterinary medicine.
The specific aims of this study are: 1) to document the current and past uses of non-plant remedies and cultivated plants in the Liubań district of Belarus for human/animal medication; 2) to analyze the human medicinal and veterinary use areas in the context of non-plant remedies and cultivated plants; 3) to qualitatively compare the results with relevant historical publications regarding non-plant remedies and cultivated plants in Belarus; and 4) to compare the intensity and purpose of use between three remedy groups: non-plant, cultivated plants and wild plants.
Cultivated plants: this encompassed all plants that were intentionally cultivated in order to be eaten (at least some part of them), even if they run wild (like many Lamiaceae species) or are native and grow wild, but are, for medicinal reasons, collected mainly from cultivated specimens (like two Ribes species). This group also included self-planted tobaco (Nicotiana spp.), bedding plants (like Paeonia spp.), potted plants (like Pelargonium spp. or Callisia fragrans), and plants obtained from outside the household (store-bought) and clearly of foreign origin (Piper nigrum, Camellia sinensis). The main criteria for identifying plant as “cultivated” was that it was either grown by the person themself or obtained in a “ready to use form” so that no special identification was needed.
Non-plant remedies: this comprised those parts of plants not permitting or not requiring, from the interviewee’s perspective, identification of the taxon (like chaff); products made from plants (such as bread, bread mold, vodka, food oil of any origin, etc.) given that the specific species used for their preparation are not mentioned by the interviewee; all animal parts (fat, meat) and products (milk, honey); as well as all other medicaments not purchased from a pharmacy for medicinal purposes nor prescribed by a doctor.
Belarus is located between Lithuania, Latvia, Russia, Ukraine and Poland, in Central and Eastern Europe. It covers a territory of 207.6 thousand sq. km. The climate is moderately continental, transitional between maritime and continental, as it is positioned in the temperate latitudes of the western part of the East European Plain . The Chernobyl disaster, which happened 30 years ago, affected Belarus more than any other country, causing high radioactivity and extensive relocation of people.
Temporal changes in home-gardening in Belarus.
Until the eighteenth century the main vegetable crops grown in the Belarusian lands were onions, cucumbers, cabbage, beets, turnips, carrots, poppy, garlic, parsley, parsnips, and hops, among others. During the second half of the eighteenth century on manor farms people began to plant potatoes, strawberries, beans, cauliflower, swede and spinach. Gardening was poorly developed and apples, plums, gooseberries, and currants were primarily grown. In aristocratic parks and greenhouses, however, rare species of fruit trees and shrubs, such as oranges, peaches, grapes, etc. , were planted. The lack of necessary data in the sources of the eighteenth century does not allow determining the place occupied by vegetable growing and gardening in the life of Belarusian peasants .
In the nineteenth century vast acres of land were occupied by the cultivation of lentils, beans, and peas . In the Minsk region hops, mustard, coriander, melons and pumpkins, mint, radishes, onion and garlic, lettuce, parsley, poppy, asparagus and tobacco were actively planted . During this period gardens occupied a peripheral place in the economic life of the peasantry . Home-gardens were located close to the house, merging it with housekeeping, and so the garden was almost under sole control of women . The small size of the yard limited the range of cultivated crops to only the most essential ones . At the end of the nineteenth century most of the yard was occupied by hemp and barley, which, according to peasants, were more useful than vegetables . Hemp was cultivated for its fiber, seeds and oil, as well as for medical purposes. At the end of the nineteenth century the cultivation of hemp was one of the basic sources of income of peasants in the provinces of Mahileu and, in part, Minsk . Barley was cultivated as a cereal crop for food, brewing material and animal fodder .The most common cultivated plants included cabbage, cucumbers, onion and beets. Occasionally pumpkins, radishes, turnips and beans were also grown . Kidney beans were largely unknown to peasants in the nineteenth century; and mixed crops were a distinctive feature of peasant gardens . Peasant women from suburban villages grew leafy vegetables, such as lettuce, green onion, dill, sorrel, parsley, spinach, etc., which were sold in nearby towns [24, 25]. But above all, people engaged in horticulture to provide for the needs of the family . The cultivation of early vegetables in greenhouses was still not widespread in the nineteenth century . The traditional fertilizer was cattle manure .
The twentieth century brought along changes in the structure of the workforce division in villages; however, home-gardening remained one of the primary means of acquiring food for local inhabitants, and even now horticulture remains one of the most important agricultural practices in Belarus (on farms and estates of burghers, village dwellers and even summer residents).
In the researched region literally everyone in the village able to hold a spade keeps a home-garden, which is a relatively small plot close to the house. Most of the space in such gardens is covered by vegetables and fruiting trees, while flower gardens are worth mentioning only when talking about bigger villages. This is quite understandable as the choice of food available in shops is rather limited and is not oriented toward vegetables or fresh food. However, retail shops are present in larger villages and inhabitants of smaller villages are supplied by mobile shops that visit twice a week. Moreover, food is relatively expensive and collective farm workers do not earn much money. For these reasons many villagers still keep domestic animals (pigs, goats, ducks, hens, cows and horses), although admittedly their numbers have diminished during the last several years.
The portion of the data contributing to this paper was obtained during a wider ethnomedicinal field study conducted in 11 villages of the village council of Asaviec, Liubań district (Fig. 1) in May 2016 as a practical part of a development cooperation project financed by the Ministry of Foreign Affairs of Estonia. The same 134 interviews with locals (born in the villages where the interviews took place or elsewhere in the district of Lubań), as in , were selected for this analysis. About two-thirds of the interviewees were women and one-third men, which was due to the low representation of elderly men in the villages; the mean age of the interviewees was 63 years, while the oldest interviewee was 92 years old and the youngest was 27 years old. For more information on the researched area and further details of the study see .
This research documented currently used home-remedies as well as those used in the past by employing the folk history method, sensu (reconstruction of historical events through the memory of common people). The subject was approached through specific uses, not by way of remedies. The first part of the interview concerned the use of wild plants and local foods, and this may have introduced little bias as some people paid more attention to wild plants. Yet, in the second part of the interview the domestic sphere of healing was approached through specific illnesses, emphasizing that researchers were interested in all possible means used for healing. In the semistructured format, interviewees were asked to recall what remedies were used to treat most common disease categories using layperson terminology, such as respiratory and cold-related diseases (cold, sore throat, rhinitis, earache, etc.), neurological diseases (headache, nervousness, etc.), cardiovascular ailments (heart problems, blood pressure, etc.) gastrointestinal complaints (stomach ache, diarrhea), musculoskeletal disorders (foot ache, rheumatic diseases, etc.), dermatological conditions (wounds, burns, cuts, skin diseases, etc.), ophthalmological issues (improving vision, eye diseases), oral and dental care (aching tooth, mouth diseases), nephrological ailments (kidney diseases), infection and uses related to other health concerns and wellbeing (prophylactics, being healthy) as well as cosmetic issues (hair and skin care, disinfection, good scent, etc.). After the interviewee responded, a control question was asked, namely if he or she could recall any other specific diseases and their treatment. The veterinary question was addressed more broadly (when animals get ill or how to keep them healthy). Interviewees were allowed to elaborate on the subject as long as they stayed within the health-remedy framework. The interviewees were asked to state when they have used the named remedies and if they have used them personally.
Interviews were voice-recorded upon permission of the interviewee; field notes were also taken and in the majority of cases names recorded, according to the rules prescribed by the local institution. The purpose of the study was explained to each person and prior informed consent was obtained from all interviewees. The Code of Ethics of the International Society of Ethnobiology was followed. All interviews were then transcribed and anonymized before further analysis. The original voice-recorded interviews as well as their transcripts are stored at the The Center for Belarusian Culture, Language and Literature Research within the Archives of The Institute of Art, Ethnography and Folklore, named after K. Krapiva (AIAEF 23–16-2). Anonymized copies of interview transcripts are also stored at the Scientific Archive of the Estonian Folklore Institute (EFISA Valgevene2016) located in the Estonian Literary Museum.
General ethnobotanical practice does not recommend collecting cultivated plant vouchers, therefore all the plants were identified on the spot and only a limited number of voucher specimens were taken to ensure precise identification; in some cases, where people willingly shared their stores, dried plant samples were also archived. Collected voucher specimens were dried and identified with the help of Toomas Kukk (Curator of the Estonian University of Life Sciences herbaria); vouchers are deposited at the Estonian University of Life Sciences herbaria (TAA), assigned herbarium numbers within the range TAA0132555–0132710, and also bearing numbers LJUB001–152. Dried plant samples collected from respondents are deposited at the Scientific Archive of the Estonian Folklore Institute (EFISA Valgevene2016, bearing numbers LJUD001–085). Taxonomic identification, botanical nomenclature, and family assignments of cultivated plants followed the Flora Europaea , The Plant List database , and the Angiosperm Phylogeny Group IV .
Non-plant remedies were identified on the basis of the name used by the interviewees, which as a rule was sufficient for precise identification. Only in few cases were some additional clarification questions asked.
Anonymized records were entered into a Microsoft Excel spread sheet. As with wild plants , to follow emic categories, information was structured in Detailed Use Records (DUR adopted from ), where interviewees (i) mention a specific use (u, e.g. emic disease/illness category [cough, sore throat, heart disease, back pain, etc.], emic veterinary treatment) of a remedy or plant part (p, e.g. fruits, leaves, aerial parts, flowers, etc.) prepared in a certain way (w, e.g. topical application of the remedy, tea [plants macerated in hot water], decoction [plants boiled in water], tincture [plants or other substances macerated in alcohol – either applied or drunk], special preparation, etc.). Interviewee-defined emic categories were employed to ascertain local perceptions.
For every taxon, the number of Use Citations (UC – number of people who claimed the (specific) use of the remedy during the interview) and the number of DUR were calculated for the sum of all uses and separately for medicinal and veterinary areas. For general and emic disease/illness categories, Use Instance (UI), representing the attribution of one specific taxon to a disease category, regardless of the number of people mentioning the specific use, was calculated. Following the recommendation given in several recent publications [33, 34] and to illustrate the diversity of various uses, uses mentioned by only one person were also included.
An Informant Consensus Factor (FIC ) was calculated for both remedy groups (cultivated plants and non-plant remedies) as well as for different use categories within each of the groups.
FIC = nUC – nT / (Nuc – 1).
nT = number of taxa or species that are used for that plant use category.
FIC values range between 0 and 1, where ‘1’ indicates the highest level of informant consent.
The reliability criterion was also assessed to detect the proportion of remedies used by more than three people.
On a temporal scale all uses were divided into four blocks: 1) continuously used (reported to be used throughout life), 2) past uses (uses that were talked about in the past tense), 3) temporary uses (practiced for the limited period of time during adulthood), and 4) adulthood uses (practices that were not known to the person during childhood, but picked up at some point in adulthood and still practiced). The issue of the temporal scale bears some limitations as not all people responded to the question regarding the time in which a remedy was used in an unambiguously interpretable way (and at times the interviewers were too engrossed in the conversation to ask clarifying questions). For about one-third of the use reports, attribution to the temporal block was made on the basis of context (verb tense the person used, time period they were talking about, etc.) and, therefore, this scale reflects in part the approach of the researcher. However, as all researchers collecting data asked the same questions about the same diseases treated, even a slightly vague interpretation of the temporal scale deserves to be analyzed.
The peak of research on the ethnomedicine of Belarus occurred at the end of the nineteenth century .
In those publications special attention was paid to the causes of illnesses, their prevention, and ways of ritual treatment, but the comments were developed in accordance with the attitudes of the collectors - i.e. to show the “downtrodden” peasants or romanticize their “antiquity”. Representatives of the mythological school enthusiastically talked about the “ghosts and demons” of diseases and ways of communicating with them [18, 26, 37, 38]. By the middle of the nineteenth century, among the collectors and researchers of folk customs, there was already the idea of a separate sphere of national knowledge - “folk medicine”. Materials on folk medicine were systematically collected and discussed in publications [37–46]. Folk medicine can be understood from two different perspectives: 1) to reveal the reasons for the stability of folk techniques and 2) to enrich medical science with unknown medicines. The common tendency in evaluating traditional medicinal practices was to consider “superstitious” techniques (from the collectors’ point of view) as “age-old backwardness” and “useful” ones as “folk wisdom and experience”.
Special attention was also paid to the study of medicinal plants. At the end of nineteenth century ethnographers encouraged the creation of herbariums of local flora. For example, E. Orzeszkowa established a full herbarium of the vegetation of the Neman river region, in which the specimens were accompanied by a description of their uses in folk medicine, as well as related proverbs and beliefs . The historical sources also allow us to see a more diverse picture of the cultivated plants and non-plant remedies employed in ethnoveterinary medicine in the 19th and early 20th centuries [48–56].
The historical vicissitudes of the twentieth century and changes in the scholarly approach to ethnomedicine [57, 58] did not allow for the gathering of much comparative data from that period.
In Soviet times there were almost no folkloric or ethnographic studies on the subject of folk medicine, which seems to indicate the absence of official support for such documentation at that time. At the end of the twentieth century publicatons focused on the ethno-cultural component of folk healing and the mythology of diseases. The first volume of the “Polack Ethnographic Collection” (Issue 1, "Folk Medicine of Belarusians from Padzvinnie region") was dedicated to folk medicine. Summarizing the results of a study was the volume “Traditional medicine and ritual-magic practices” prepared by T.Valodzina from the series “Belarusian Folk Art” , which presents a chronologically blurred section of Belarusian magical healing. This volume is a complete compendium of folk medicinal ritual-magical practices, collected from a variety of printed sources and archives. A large part of the material was collected by the author during more than 100 expeditions between 1993 and 2010 to all regions of Belarus under a special program (more than 7000 folklore units were recorded).
As of today, Polish scientists have reviewed the unpublished sources of the late nineteenth century on ethnobotany, including the Belarusian lands: a questionnaire by Yu. Rostafinski (1883) and a manuscript by M. Federowski, who structured his data in accordance with the earlier questionnaire of Rostafinski .
Therefore, qualitative comparisons with the current collected data and historical records covering all of Belarus can be drawn for both human and animal medication, especially when it concerns non-plant remedies.
The results obtained for cultivated plants and remedies were compared with similar results for wild plants as in , and a few additional aspects (like the quantification of recently acquired uses) of the data regarding the use of wild food plants were further analyzed and added to the already published results. In this instance, wild plants consisted of all plants growing outside direct human cultivation, including domesticated local wild plants cultivated in home gardens, but not for food purposes (such as bedding plants and non-fruiting trees, which can also be encountered outside of human cultivation).
Interviewees used 45 cultivated plant taxa belonging to 27 families (Table 1). The most well represented families were Lamiaceae (six taxa), Rosaceae (five taxa), Poaceae (four taxa), Solanaceae and Asteraceae (three taxa each). The reliability criterion was met by 26 taxa (57%).
Two hundred twenty-six DUR of cultivated plants were recorded. The six most widely utilized taxa (and named by at least 10% of interviewees) included two Allium taxa (garlic A. sativum [26 DUR] and onion A. cepa [22 DUR]), followed by houseplant aloe Aloe spp. (24 DUR), potato Solanum tuberosum (20 DUR), aronia Aronia spp. (16 DUR), and cabbage Brassica oleracea (15 DUR).
Altogether 108 UI were detected in general disease categories. The reliability criterion (at least three users) was met by 30 general UI. This group contained 19 taxa, of which only seven were used in more than one wider disease category, including garlic Allium sativum and onion Allium cepa in four disease categories, three of which (respiratory, general health and infection) were shared, while the other two were oral and dental and dermatological, respectively. Potato Solanum tuberosum was used in three general categories (dermatological, respiratory and gastrointestinal). The remaining four taxa met the reliability criterion in two disease categories: blackcurrant Ribes nigrum and black pepper Piper nigrum (respiratory and gastrointestinal in both), aloe Aloe spp. (respiratory and dermatological) and aronia Aronia spp. (gastrointestinal and cardiovascular). Among the other twelve taxa, the most well represented included ophthalmalogical use of leaves of the tea plant Camellia sinensis, gastrointestinal use of dill Anethum graveolens and Beta vulgaris, neurological use of mint Mentha spp. and cardiovascular use of Leonurus quinquelobatus, all reported by at least five people.
Individual use of cultivated plants was not very diverse. Only one person claimed to have used one taxon, namely calendula (Calendula officinalis), to treat five different illness categories, while three more taxa (Anethum graveolens, Solanum tuberosum and Mentha spp.) were used by a single individual in three different illness categories.
The Informant Consensus Factor for the entire medicinal use area was relatively low at 0.82 (251 use citations for 45 taxa). All of the general categories in the medicinal use area had lower FIC values and only five general categories had a FIC greater than 0.6.
The disease category with the highest FIC was infection (FIC 0.79 for five taxa), which was dominated by two Allium taxa and Cucurbita pepo used to treat helminthic infection. Another small category with only three taxa used was ophthalmological (FIC = 0.77), which was dominated by Camellia sinensis (used only in this disease category to treat eye problems). The dermatological category (FIC 0.69, ten taxa) was clearly dominated by the taxon Aloe spp. (Figure 2), which was used to treat mainly wounds, but also burns, cuts and skin inflammation. Only a few other taxa in this diease category met the reliability criterion: Allium cepa (used to treat abscess, (rotten) wounds and skin diseases), Hippophae rhamnoides (oils for treating burns), and Solanum tuberosum (for treating burns and skin diseases).
Only two taxa in the cardiovascular category (FIC = 0.64, six taxa) met the reliability criterion: Aronia spp. to treat hypertension and Leonurus quinquelobatus to treat heart problems. The second most numerous in terms of represented taxa was the respiratory category (FIC = 0.63, 18 taxa), which consisted of six taxa, none of which were clearly dominate, that met the reliability criterion: Aloe spp. (eaten fresh against cold and macerated in alcohol or cooked to treat lung diseases or tuberculosis (in the past)), Solanum tuberosum (used as an inhalation against cold, cough and rhinitis), Allium sativum (eaten fresh, worn as a necklace to combat cold and cough, and applied topically to alleviate rhinitis), Allium cepa (boiled with milk or inhaled to treat cough and rhinitis), Ribes nigrum (used as a tea against cold) and Prunus cerasus (used as a tea to combat cold and sore throat).
The gastrointestinal category, while having a relatively low FIC value (0.59 for 25 taxa), contained seven taxa that met the reliability criterion: Anethum graveolens (to alleviate flatulence and stomach ache), Aronia spp. (to relieve stomach ache), Beta vulgaris (to cure constipation), Pyrus communis and Oryza sativa (to treat diarrhea), Piper nigrum (to treat diarrhea and stomach ache), Solanum tuberosum (to treat hemorrhoids). Within the other disease categories only a few individual taxa met the reliability criterion, among these: Allium sativum in the oral and dental category (to treat toothache); Mentha spp. (as a sedative and to relieve headache) and Brassica oleracea (against headache) in the neurological category; Brassica oleracea (to alleviate joint pain) in the musculoskeletal category; and Allium sativum and Ribes nigrum in the general health category.
The majority of the temporary, past and adulthood uses of cultivated plants overlap with uses that have been continuously practiced; however, some differences do exist. For example, some plants were reported to be used differently in the past than they are now, including the tea of cultivated Mentha species which in the past was drunk to treat hemorrhoids, but now is used in adulthood by many people as a sedative (also used continuously) and to treat respiratory illnesses. The use of Mentha leaves applied on wounds was also only practiced in the past. However, uses of cultivated plant taxa practiced only in the past were rather rare and included the freshly pressed oil of Cannabis sativa which was drunk to cure constipation and the tea of Nicotiana spp. which was gurgled to alleviate toothache. A few additional taxa were mentioned only when talking about uses acquired during adulthood; for example, Capsicum annuum macerated in alcohol to treat rheumatic diseases or raw jam of Chaenomeles japonica to promote wellbeing, roots of Helianthus tuberosus eaten raw to treat diabetes, and tea of the leaves of Hyssopus officinalis to combat cold and stomach problems – all of which are known from the widespread popular literature on home-medication and widely promoted in the media (for example, the most popular newspaper “Narodnyy Doktor”publishes readers’ recipes that are sent to the editorial office).
One temporary use also stood out, although the plant itself was continuously used: children were bathed in a decoction of twigs and leaves of Ribes nigrum against diathesis. The person describing the use mentioned that the wild plant (three-lobe beggarticks, Bidens tripartita L.) did not help her children, “but the leaves of blackcurrant did”.
Out of the 134 people interviewed, 73 mentioned using cultivated or store-bought plants for medication. Twenty-five people mentioned only one use, while the most knowledgeable person mentioned 16 taxa and three more individuals recalled 13 taxa. The mean number of used taxa was 3.6, which is relatively quite low, especially considering that almost all households had a vegetable garden, indicating that plants were cultivated.
While the historical data on the use of cultivated plants for healing is relatively limited, some comparisons can be drawn. For example, the use of intensely tasting plants have retained their popularity, even if the specific use indicated has changed considerably in nature: at the end of nineteenth century it was believed that onion and garlic would frighten off diseases, as well as protect children and pregnant women, and also newlyweds during their wedding [40, 43, 44, 62], whereas now only a few interviewees recalled the use of garlic (as a necklace) as a means of maintaining good health and protecting against cold, while the primary emphasis of the modern use of fresh onion and garlic is on respiratory diseases. In the nineteenth century garlic was used to relieve teething pain in infants [43, 62], while now it is used to treat toothache. The specific use of baked onions has also changed as now it is used mainly to treat dermatological problems, while according to nineteenth century sources mothers used to rub the new-born’s breast with baked onions to alleviate rhinitis .
There were 188 DUR referring to the use of 58 different remedies (Table 2). The six most popular remedies included vodka (19 DUR), pork fat and honey (both 14 DUR), salt (11 DUR), propolis (10 DUR), and goat milk (9 DUR); however, only vodka was named by more than 10% of interviewees.
salve made with root of Arctium spp.
Altogether 93 UI were recorded in general disease categories. The reliability criterion (at least three users) was met by 21 general UI. This group contained 16 different remedies, of which only five were used in two disease categories. The most popular was vodka, used in the respiratory and gastrointestinal categories, followed by goat milk in the general health and respiratory categories, propolis in the general health and respiratory categories, salt in the respiratory and nephrological and urological categories, and goose fat in the respiratory and dermatological categories. Among the remaining 11 remedies, only three were reported by at least five people: pork fat used to treat oral and dental diseases, honey in the case of respiratory diseases and oil in the gastrointestinal category.
The domestic use of non-plant remedies on the individual level was rather restricted, as only one person claimed using spirits in four different illness categories, while two more individuals used honey for treating three different ilnesses.
The informant consensus factor for the whole medicinal use area of other remedies was very low (FIC = 0.67, 175 use citations for 58 remedies). All but three general disease categories had lower FIC values.
The cardiovascular category contained only one remedy: dead honeybees (FIC = 1) (Figs. 3, 4). The oral and dental disease category had the next highest FIC value (0.85) and contained one dominant remedy (pork fat, either fresh or salted) and two less frequently used ones (topical applications of salt and vodka on an aching tooth). Another small general disease category with a FIC slightly lower than that for the whole use area (0.66) was nephrological and urological ailments, containing only two remedies (brandy drunk to treat kidney stones and salted hot water applied externally on cystitis). The respiratory disease category was the only extensive one that had a relatively high FIC value (0.68). Among a relatively wide variety of remedies (16), seven met the reliability criterion (having more than three users). Of these the most popular was honey, used mainly to treat cough but also sore throat, and vodka, which was drunk to relieve cold, cough and rhinitis, as well as applied topically to alleviate earache. Goat milk and cow milk with honey and/or soda were used mainly to relieve cough (in children), and heated salt was applied topically to treat sinusitis, sore throat, earache and cough (socks with hot salt). Also, goose fat was mixed with honey and applied or smeared on the chest to alleviate cough and rhinitis.
The gastrointestinal disease category (FIC = 0.52, 14 remedies) contained only four remedies that met the reliability criterion. The most popular of these was the use of oil to relieve constipation, vodka to treat stomach ache and diarrhea, kefir to allieviate constipation and starch to cure diarrhea. The general health category, containing seven remedies (FIC = 0.53), encompassed only two remedies that met the reliability criterion: the use of goat milk to treat allergies in children as well as to combat cancer, and propolis macerated in alcohol as a panacea. The infection disease category (FIC = 0.5, five remedies) contained only one remedy that met the reliability criterion: horse dung water used to treat helminthic infection.
Within the remaining general disease categories FIC values were very low (0–0.3), with only use in the dermatology category meeting the reliability criterion: goose fat smeared on burns and foot sores.
A few temporary uses were related to curing particular personal diseases encountered only once in life or during a specific period, such as treating sick children or having access to a remedy (like using fresh milk to treat eye inflammation while keeping a personal cow). Quite a number of recently acquired uses seem to have a traditional origin (e.g. the use of old snakeskins to treat pimples or rolling the soft part of the bread over the stomach, saying a few words and then giving the bread to dogs to alleviate fright), but they could also have been learned from books or journals promoting “traditions”, such as the myth of treating epilepsy with anthills . The popularity of honey and propolis as a medicine is now supported by popular literature (7 uses out of 10 for propolis and 7 out of 8 for honey were attributed to recent acquisition) and may also be due to the massive promotion of apicultural products as good for health [64–66]. Many past uses are spatially distributed among the most popular uses, except a few: burning dog hair to alleviate fright; sheep fat to treat cold and in a salve to alleviate joint pain; lice hidden in bread and given to eat to treat jaundice; hot milk with garlic as a bath to cure helminthic infection; rainwater for washing hair; sweat of horses or sand where chickens bathe to treat warts – all of these, however, were named by only one or two people.
Out of the 134 individuals participating in the study, 60 mentioned the use of other remedies for human medication and of these 23 mentioned only one remedy. The two most knowledgeable individuals recalled 19 and 10 DUR and 17 and 6 used remedies, respectively. The mean number of DUR was 3.3 and for remedies it was 2.7.
The historical legacy concerning non-plant remedies is much richer than that of cultivated plants which indicates that this remedy group has clearly decreased in number and also in use nomenclature. Historically, symbolic practices of the treatment of diseases were associated with the magical properties of water, fire and stones (soil), and water treatment was widespread [63, 67]. In Belarusian ethnomedicine water was considered a universal remedy in the treatment of almost all diseases, on the basis of both its basic potential to purify the body and the repetitive healing through sanctification, etc. . As common within all traditional medicines around the world, water had, in the opinion of Belarusians, specific powers to heal through bathing (flushing, pouring out). Belarusians treated with water “rosette” (acute pains in the stomach) , “evil eye” [43, 63, 68], and a variety of skin diseases [62, 63]; however, such uses could also have been influenced (or earlier local use supported) by widespread hydrotherapy ideas propagated by popular literature, for example the book on water treatment by German doctor Sebastian Kneip (1821–1897). Moreover, the addition of salt , metal products [43, 62], coins , and ash , among other things, was believed to add extra magical powers to water. The first time a child was bathed a coin was thrown into the water, which according to magical beliefs would provide health, skin purity and wealth to the child. One interviewee did recall such a treatment when asked specifically, but her reference was quite impersonal, “second hand” and therefore it is not referred to in the analyzed data, although in other regions of Belarus the use of different metals has been recorded (iron, silver , etc.).
Historically fire was an important factor in the process of the symbolic “overbaking” of a sick child in a furnace, a ritual common during the nineteenth century in Hrodna, Minsk and Vicebsk provinces [43, 45, 70]. Likewise, fumigation or smoke was used to cure a fever [39, 69]. Moreover, the historical widespread re-use of ritual objects for fumigation (for example, candles [41, 43, 62] and shells of Easter eggs ) was not mentioned by the participants in the current study.
The topical application of stones, widespread historically [45, 62, 63, 71], seems to be largely forgotten, as is the use of all naturally occuring substances apart from salt; for example, minerals (silica ), silver (coins [41, 45, 67]) and clay ([41, 45]). The only exceptions noted in this study were the recorded use of sand in which chickens bathed for treating warts, which was clearly indicated as a recalled past use, and the ingestion of clay associated with ethnoveterinary use.
Vodka, however, used historically to dilute some other substances [20, 39], has become a very popular remedy on its own and as a dissolving agent in combination with a variety of plants and, on occasion, non-plant remedies (tinctures for internal or external use).
The use of plant-based products unidentified on the species level, such as the earlier widespread use of tar , was only occasionally mentioned. Another plant-based product, bread, was historically attributed protective properties and used in the treatment of various diseases [41, 45, 63, 72]; however, this study recorded the use of bread for treatment only a few times, and in all cases it was used as a mediation substance, conveying words (mumbled on and fed to cows) or as a symbolic means of hiding healing substances (e.g. the remembered past use of hiding lice to treat jaundice). Interestingly, Vallejo and González showed that the use of bread with lice in Spain was encountered in the literature only between 1942 and 1972, although the researched literature extended from 1927 to 2012. The use of lice for the treatment of jaundice was widespread among Belarusians . One recent use (reported as practiced during adulthood, but not during childhood) was the use of bread as a medium for the transfer of fright from humans to dogs. The so-called “out-rolling” with the soft part of bread while still hot was a historically well known magical remedy among Belarusians and other Slavic peoples and used predominantly to remove “fright” from the body. The bread was rolled over the back or stomach and as a result it collected a lot of fur and hair – often used to diagnose the agent “responsible” for the disease. These “out-rolled” diseases were then carried outside human habitats (thrown into water, taken to the forest, left on crossroads) or, more often, fed to dogs. Other substances (such as ashes, wool or boiled eggs) were also sometimes used for the same purpose [74, 75].
Products of animal origin as well as their metabolic products were occasionally used or recalled as having been used in childhood; and all of these were used historically as well. The most common among these included fat [42, 43, 62], apiculture products , dairy products , and eggs [39, 41, 43, 45, 46, 62, 63, 67, 76], as well as urine and dung water of horse feces and bile [42, 43]. Yet the historical repertorie was much more diverse, containing many products not recalled during our interviews, such as horns and blood , feathers [63, 70], placenta , waste matter [43, 62, 63], wool and bones and some of the internal organs .
The list of the historically used domestic animals and birds is very long, and includes horse [63, 68], pig [45, 63], cow , chicken , goat , cat , bull , a variety of small mammals (rat , bats , hare , hedgehog ), wild birds (cuckoo ), reptiles (snake [43, 68], lizard ), amphibians (frog [42, 43, 63]), insects (bees [38, 63, 69]) and also fishes (burbot , pike [43, 77]). Although it is not always clear how exactly the animal was used in the past, the use of animals often relied on a basic principle - treating similar with similar, with the aim to “transmit” diseases to animals, both by means of direct contact as well as through charms and magical actions (fumigation of wool or feathers of an animal/bird that caused the consternation [63, 69]). Among the records of the present study, mainly practical and seemingly quite rational uses of animal (products) have continued to be used.
Among the human-originated substances, the historical data list such remedies as human placenta , hair [38, 41, 63], nails [41, 45, 63], and the urine of sick people [20, 43]. Items bearing symbolism of the underworld include, for example, objects belonging to the deceased or a cemetery [43, 45, 62], spider’s web [43, 45], moss (from the roof of the house) [43, 77] and a piece of cloth with menstrual blood . None of these were mentioned during the interviews in this study.
The recording of charms was not the purpose of the present study as healing with charms and healing with plants are usually perceived as separate categories of healing, considered independent. Yet in a few cases we encountered some elements of healing concerned with the use of charms that are related to the use of non-plant remedies, such as alleviating fright by rolling bread over the stomach. The use of plants both in magical practices and as accompainments to charms is based not only on their real biological characteristics, but also on the laws of mythological logic - the place of the plant in the traditional worldview . The use of plants in folk medicine is often based on the principle of signatura rerum, when people believe that the plant itself (by its color, shape, etc.) indicates which disease they need to treat. In magical practice in general, the correlation of the external manifestations of a disease, especially the cutaneous ones, with a particular plant is important. This is particularly evident in the example of the ritual removal of warts, for which comparably round potatoes, peas and apples were used: “People took potatoes and rubbed them on the warts. Potatoes cut in half, applied on the warts, and then pressed together and buried. As soon as the potato dries the warts should disappear” . All across the country this practice continues to use prickly, scalding or even poisonous plants as apotropes, for fumigating a patient with the magical intention of expelling the spirit of the disease. For example, children that had received a fright were fumigated with agrimony, among other things. Other features of the plant have become more relevant, such as the multiplicity of poppy and flax seeds, when sprinkled over a child afflicted by the evil eye, etc.
Treatment with words, which was embodied in the practice of medical charms, was historically considered an important way to get rid of disease along with remedies of plant, animal and mineral origin. Charms were mainly used as prophylactics and to treat children’s and women’s diseases, infectious diseases, skin diseases, neuropsychiatric conditions, dental issues and complaints related to the digestive system, head, eyes, ears, nose and throat, as well as fear, the evil eye, and health problems related to childbirth. This type of treatment was conducted by healers, although some proportion of the population had basic folk medical knowledge. The charms are accompanied by certain actions which reinforce the magical meaning of the act of treating.
Earlier folklore collectors noticed that "treatments with charms exist everywhere and belief in them was unusually high" . During fieldwork for this study many interviewees mentioned as a past phenomenon whispering old women (бабка-шаптуха, babka-šaptucha) who were consulted in the course of specific diseases (such as fright and evil eye). However, a few lay interviewees also recited some charms. One of the villages even had their own healer man, who was still practicing healing with charms. Today the practice of applying to healers is reserved for illnesses of the psycho-neurological sphere (fright, evil eye, insomnia) and certain skin diseases (for example, erysipelas).
There were 48 DUR referring to the use of 14 taxa from 12 families, of which only two families, Asteraceae and Cucurbitaceae, were represented by two taxa. The most commonly used taxa, and the only one named by 14 people, was Linum usitatissimum (18 DUR). Three additional taxa met the reliability criterion: Solanum tuberosum, Cucumis sativus and Anethum graveolens (three users and DUR for each). The diversity of uses on the individual level was very low: one person used two plants and five people used one plant for treating two different animal illnesses.
The informant consensus factor for the whole veterinary use area of cultivated plants was relatively low, yet similar to the FIC of wild plants (FIC = 0.69, 43 use citations for 14 taxa). The only individual general category with the same FIC value was the emic category rumination problems, for which six taxa were used; however, only one of them, Linum usitatissimum, met the reliability criterion (eight users). All other disease categories had low FIC values within the range of 0.2–0.56. The only two uses that met the reliability criterion within those categories consisted of Linum usitatissimum to treat diarrhea in both cows (seven users) and pigs (five users).
There were no extraordinary uses of cultivated plants that have been attributed only to past or present contexts, except for the recent adoption of the feeding seeds of Piper nigrum to chickens in order to strengthen them. The taxa Linum usitatisiiumum was temporally dynamic: two uses were claimed to have been acquired during adulthood (rumination problems and diarrhea in cows) and seven uses were attributed to the past, of which six were divided equally among diarrhea in cows, diarrhea in pigs and rumination problems in cows; however, the same uses were also continuously utililized.
Out of the 134 individuals participating in the study, 26 mentioned the use of cultivated plants for veterinary purposes. The most knowledgeable person mentioned four taxa (and six DUR), whereas 18 people mentioned only one taxon. The mean number of used cultivated taxa was 1.4 while the mean DUR for this group was 1.7.
Most popular or widespread cultivated plants noted in nineteenth century literature appear to be no longer used. Some of them (such as Nicotiana spp. which was indicated for the treatment of cow, horse and sheep diseases [48, 49, 52]; and Cannabis sativa [48–50] which was used to treat dogs, horses and sheep) have been officially banned for domesti cultivation in different periods of 20th century, whereas others (such as some cereals (Secale cereale, Hordeum vulgare, Avena sativa, Fagopyrum esculentum) used for cow, horse and pig healing) simply stopped being grown in home-gardens due to fundamental changes in the economic sphere occurring in the twentieth century. Other historically known cultivated plants include garlic which was used for the treatment of wounds (especially on the tongue of ruminants) as well as against sheep parasites (матыліцы) [48, 51, 52] and various vegetables (e.g. radish , horseradish, cabbage, carrot ) used to treat internal diseases of cows and horses. None of these was used by our interviewees.
In ethnoveterinary medicine, 72 DUR referring to the use of 31 non-plant remedies were identified. The most commonly used remedies were vodka (13 DUR) and laundry soap (eight DUR). Twenty remedies were used by one person only. Five additonal remedies met the reliability criterion: urine (five users), egg and vodka, beer, horse feces and clay (three users each). The diversity of uses was almost as low as for cultivated plants: one person used vodka for three different emic animal illnesses, while six more people used various remedies for treating two different emic animal illnesses.
The informant consensus factor for the whole veterinary use area of non-plant remedies was higher than for the human medication use area of non-plant remedies and similar to the FIC of cultivated and wild plants (FIC = 0.57, 70 use citations for 31 remedies). Only two of the individual general categories had FIC values higher than that for the whole use area.
Mastitis was the disease category with the highest FIC value (0.71); and in this category five different remedies were used, two of which, laundry soap and urine, met the reliability criterion. The category of helminthic infection had a FIC value of 0.66 and contained two remedies, of which the use of horse feces met the reliability criterion. All other disease categories had low FIC values within the range 0.18–0.5. Within these only a few uses met the reliability criterion: vodka and beer were force-fed to cows to treat rumination problems, a mixture of eggs and vodka was given to piglets to cure diarrhea and laundry soap was given to cows to alleviate constipation.
Over 40% of the DUR were described as used in the past; the majority of them were among the most widely used remedies, while some were uniquely used remedies, such as pouring salted water into the perforated side of a calf or giving soda to goats to drink to treat rumination problems, and the smearing of pigs with tar to cure red fever or scabs. Over 60% of the uses of vodka were also attributed to the past (when animals were still kept by many people). None of the uses in this remedy category were reported as recently acquired.
Out of the 134 individuals interviewed, 30 mentioned the use of non-plant remedies for veterinary purposes, and of these people 12 mentioned only one remedy. The most knowledgeable person mentioned eight remedies, and two other individuals mentioned five remedies and DUR. The mean number of non-plant remedies was 2.3 while the mean DUR of this group was 2.4.
Significant quantitative predominance of non-plant remedies over cultivated plants used for treating domestic animals seems also to be historically specific for Belarusian ethnoveterinary medicine. Some of these remedies were still in use or recalled as past uses. The universal non-plant remedies (stones [48, 52], water [48, 49, 53], fire [48, 50, 54], bread [48, 50, 52], salt [48, 50] etc.), which have already been discussed above in the context of ethnomedicine, were also widely used in veterinary medicine for both treating and preventing animal diseases (mastitis, rabies in dogs, snakebites, digestive disorders of cows and horses, cow placental retention (retentio placentae), skin diseases of cattle and horses, “the evil eye”, etc.). The most numerous and diverse group of non-plant remedies consisted of animal-based ones, such as different kinds of animals and parts of their bodies (insects [48, 49, 52, 53, 55], birds , mammals [48, 49, 52, 53], fishes [48, 52], amphibians [48, 48]] and reptiles ) or substances obtained from human and animal bodies (fat [49, 52], urine [48, 50, 52], feces [48, 49, 51, 52], placenta [49, 52]], bile [48, 49], blood [49, 52]) that were used to treat ungulates (horses, cows, sheep and pigs). Honey [48–51, 54] and the application of birch tar [48, 49, 56] played an important role in treating infectious diseases of horses, cows and pigs. Various milk products were used to treat ungulate skin diseases [49, 51], as well as urination and digestive [48, 50] problems in cattle. Eggs were considered to be a universal remedy for cow and horse diseases [49, 52].
While modern complimentary and alternative medicine has been perceived as a self-driven choice and possibility for caring for one’s self , the “remains” of traditional healing practices have a kind of ambivalent position, valued as traditional relicts, yet often perceived as something less effective, and even shameful (for example, the use of urine, and even the use of vodka). As many (especially wild) plants used in ethnomedicine belonged to the official repertoire of Soviet medicine, it seems that this group of home remedies had been silently given “use consent” in home-healing.
All human disease categories have been predominantly treated with wild plants and only two categories, namely culture bound and oral and dental, had more extensive use of non-plant remedies, although the nomenclature of the remedies for dental treatment was rather limited (Fig. 5, Table 3).
In ethnoveterinary medicine, non-plant remedies have been relatively more important than both wild and cultivated plant remedy groups. However, only one ethnoveterinary category, namely mastitis, has been treated solely with non-plant remedies, while another (rumination problems) boasts both the largest number of uses and the greatest diversity within the non-plant remedies (Table 4, Fig. 6). Cultivated plants have had modest application in ethnoveterinary medicine, slightly more prominent in the diversity of taxa used only in the category of gastrointestinal problems other than rumination.
The entire diversity in the use of both ethnomedicinal and ethnoveterinary remedies was created by only a limited number of people, providing many use records (Fig. 7). Even though there were a remarkable number of people (41) who named only wild plants used in human ethnomedicine, there were also six people who named only cultivated plants and/or non-plant remedies. The situation for ethnoveterinary medicine differs slightly as a similar proportion of individuals used only non-plant remedies (eight people), cultivated plants (seven people) or both (six people), and a relatively smaller proportion (compared to human medicine) of people (14 individuals) used only wild plants to attend animals. The occurrence of people in the sample who have used only non-plant remedies indicates that, even if asking about wild food plants first may have predisposed some respondents to concentrate on wild plants, it was not universal.
In human ethnomedicine wild plants constitute the most changeable group of remedies, with over 40% of uses adopted later in the life (Fig. 8). Other remedies contribute the highest proportion of continuous uses as well as the highest proportion of the past uses, while recently acquired uses represent the lowest proportion. Cultivated plants fall in between the other two remedy groups, contributing a very small proportion of past uses, while recent additions seem to be quite numerous, but still representing a smaller proportion than among wild plants. Among the remedy groups in the ethnoveterinary category the difference regarding the recently acquired uses is noteworthy: almost 30% of the uses of wild plants in contrast to none for non-plant remedies. The non-plant remedy group also boasts the greatest proportion (over 40%) of uses attributed to the past only. None of the uses in the ethnoeterinary use area were referred to as temporary.
Comparison of the overlap of remedies in the human medicinal and ethnoveterinary use areas shows an interesting anomaly in the non-plant remedies category. A vast majority (all but three taxa) of the wild plants and all but one cultivated plant used in ethnoveterinary medicine were also used for human medication. Among non-plant remedies the overlap is considerably less: 14 remedies out of 31 used for ethnoveterinary medicine did not have any other use in human medicine.
Therefore, non-plant remedies can be perceived as the remnants of traditional healing which is no longer evolving. As this group is not supported by official medicine, it has less new uses (acquired during adulthood) and more past uses, and the group may continue to diminish, as has already happened compared to the widespread historical use in Belarus. The more extensive use of non-plant remedies in the ethnoveterinary use area also supports this idea, as ethnoveterinary medicine in Belarus seems to be of marginal importance due to well-developed and accessible professional veterinary care and thus it is practiced by few enthusiasts only.
What supports sustainability of wild plants in human medicine and non-plant remedies in ethnoveterinary medicine?
Wild plants are more versatile because of their availability, diversity and sustainability with regard to the local climate. A significant number of uses of wild plants are associated with knowledge obtained from the media (such as Narodnaya gazeta , 7 dnej ) as well as from the older generation. For example, publications have promoted the use of twigs of trees and berry bushes for tea , berries for compresses, rinses and baths , and inflorescences for decoctions and ointments .
About 33% of the study area is covered by forests, 27.5% of which are man-made, mainly consisting of coniferous plantations. Coniferous, birch, and black-alder forests, as well as oak and fir trees can be encountered. In the mid-1920s, a large land reclamation initiative began in the territory of the district. The peak of melioration fell on 1960–1970s . In total, more than 70,000 ha of swamps were drained in the Liubań region alone. As a result of land reclamation, the area of agricultural land increased significantly (the total area of agricultural land is now 79.2 thousand hectares, of which 62.3 thousand ha are drained); however, due to a number of mistakes and miscalculations, some parts of this land began to be covered with sand dunes, on which nothing grew. Today, marshes cover 0.7% of the Liubań region .
In the territory of the Liubań district there are 3 hospitals, a polyclinic, 10 dispensaries, 14 first aid points, and 6 pharmacies. As a rule, pharmacies are located in towns. In villages, medicines can only be purchased at first aid stations . Veterinary help is provided by veterinarians who work in collective farms, as well as specialists who are retired . In spite of the well-organized professional assistance available, folk veterinary medicine, or a set of methods based on both natural science knowledge about animals and the traditional mythopoetic model of the world, continues to actively adhere to folk remedies, or the use of vegetable, animal, mineralogical, and magical medicinal products, including charms. The latter decreased, in comparison with the post-war period, by the 1980s (the time of active collection of material in the Paliessie region). This was due to urbanization and the decline of rural households as well as ideological changes in society, which brought about the decay of traditional culture. At the same time a vast store of traditional knowledge about animal treatment is preserved in the passive memory of rural residents. Also, their use may be encouraged by veterinarians, a significant portion of who are of rural origin themselves and thus they use “grandmother’s” remedies in their professional activities. Non-plant remedies may also still be important in veterinary practice due to the influence of popular literature (magazines, newspapers) and media.
Knowledge and skills from the field of folk medicine, apart from the use of plant and animal derived products, tend to be in the realm of the sacred. In regard to Soviet atheism they were painted in a negative light with the label “superstition” and pushed underground. This may also be the reason why the respondants in this study did not report them during the interviews, especially as the conversation started with plants and no leading questions were subsequently asked. Conducted interviews did not presume discussions about the healing properties of water, metal, fire or stones. The lack of comments pertaining to a number of folk magic rituals does not at all indicate their absence in the passive memory of the rural residents of the Liubań region or maybe even in their practical use; rather, it is not regarded as the type of knowledge to be willingly shared with a stranger, as is the use of plants for healing. As the use of non-plant remedies was quite recently considered superstition and the “remains of old times”, not suitable for the new social reality, it may well be that people are not willing to open up and speak freely so as not to sound unknowledgable. However, as non-plant uses are quite numerous for the ethnoveterinary use area, and some people reported only the use of non-plant remedies in either human or veterinary medicine, this assumption may not be entirely accurate.
This study examined the use of cultivated plants and non-plant remedies in human and ethnoveterinary mecidine and also tried to understand the importance of these groups of remedies compared with wild plants. While there may be a little bias in favor of wild plants due to the way information was collected (starting point of the interview was wild food plants), the differences among the three remedy groups were well pronounced, indicating that in domestic medicine cultivated plants and other means were remarkably less important than wild ones. In ethnoveterinary medicine non-plant remedies were nearly equally important as wild plants, while cultivated plants were the least utilized. However, being “at hand” does not necessarily mean being used or valued more, while remedies requiring more specific knowledge (such as wild-growing plants) are used more often and diversely. Even against the backdrop of the loss of unintentional contact with nature, people in Belarus more readily talk about using wild plants, supported by both official medicine and popular literature. While the use of non-plant remedies is somewhat promoted by popular literature, this alone does not seem to be sufficient to sustain local uses and/or open people up for sharing such uses. Therefore, even if our results indicate that proximity to the domestic arena does not influence the popularity of a remedy, we cannot say this with full certainty. Further research should develop more structured and detailed approaches and methods for evaluating the trends detected in the present study in order to better understand the mechanisms of the evolution of popular medicine.
Our special thanks go to all the study participants of the communities in the Asovets village council who generously shared their knowledge. The authors thank Margus Kiis, Lagle Aim and Laura Rachel Vesik for assistance in the field.
The field study was a part of an ethnobotany field school financed by the Ministry of Foreign Affairs of Estonia through the Developmental Cooperation Program (projects 66–2015-A and 69–2016-A). Research was supported by an Estonian Science Foundation Grant IUT22–5 and by the European Union through the European Regional Development Fund (Center of Excellence in Estonian Studies, CEES).
The voice-recorded interviews as well as their transcripts are stored at the The Center for Belarusian Culture, Language and Literature Research and are available for study by request. A structured and organized version of the data is available from the first author upon reasonable request.
RS developed the concept and drafted the manuscript. RS and RK designed the methodology and approach and also wrote the peer-reviewed project proposal that financed the field study. SV addressed organizational details during the fieldwork. All authors (except TV and AS) conducted field research. All authors (except RS, RK, MK, AS and TV) transcribed interviews and conducted initial systematization. RS and RK completed the data systematization and analyzed the data. YH, JPr, TV, IV, YK and AS contributed to the writing of the manuscript, as well as composing the historiography of the subject in Belarus and a description of the region. JPr and YH also contributed to the results section and discussion. JPa was responsible for verifying the correct phonetic spelling of local remedy names. All authors read and approved the final manuscript.
As there is no special Ethics Committee for such research in Belarus, the ethical aspects of the study were approved by the The Center for Belarusian Culture, Language and Literature Research. The research adhered to the local traditions for such research and the Code of Ethics of the International Society of Ethnobiology . Prior oral informed consent was obtained from all study participants.
International Society of Ethnobiology. International Society of Ethnobiology Code of Ethics (with 2008 additions). http://ethnobiology.net/code-of-ethics/. Accessed 23 Sept 2017.
The Plant List. Version 1. 2010. Published on the Internet; http://www.theplantlist.org/. Accessed 1 June 2017.
Stevens PF. Angiosperm Phylogeny Website. Version 14, July 2017. http://www.mobot.org/MOBOT/research/APweb/. Accessed 30 July 2017. | 2019-04-22T17:21:09Z | https://ethnobiomed.biomedcentral.com/articles/10.1186/s13002-017-0183-6 |
All perversions and misrepresentations of names fully intentional. The story will be patterned after the Star Wars stories (the property of Lucas Films, and no challenge to such rights is here intended). However, there may be many inaccuracies and incongruous comparisons. Also, the story line may be changed to help provide variety and to give the game a life of its own within the Warhammer setting.
An evil Empire of Chaos, death and corruption holds nearly unchallenged control over the entire huge world. A massive ocean, or sea, covers the entire world, dotted with thousands upon thousands of islands, of all sorts of sizes, inhabitants, and climates. Many islands are one-isle nations, while many others are grouped together to form single nation states, but over them all is the mighty iron hand of the empire.
The evil empire reigns supreme having a chokehold on the freedoms of all the island peoples and literally enslaving many of the peoples of the "lessor races". The Mighty Imperial Naval Fleet dominates the sea, preventing free trade between the isles or greatly diminishing it through high taxes. Many self-motivated sea captains have taken to the lucrative though questionable employment of smuggling goods under the Empire's very nose.
The Empire has built a very powerful super weapon, the Death Island, a floating artificial island that is supposed to be capable of destroying entire islands and even island groupings with one mighty blast of its Death Cannon. A very degrading method was used to construct the weapon: thousands of dwarfs were forcibly subjugated to slave labor!
In the midst of this chaos, malevolence, and corruption, small forces of the formerly socalled "civilized races" have banded together to form an organized Rebellion. Though their resources are limited and numbers small compared to the Empire, they have fighting spirit and very skilful warriors. Even this though seems of negligible help when faced with the controlling, overpowering Dark Side of the Force on the side of the Empire, since the Jaedai, the once powerful champions of the Light Side of the Force, have all been hunted down and executed -- with the minor exception of a handful that are presumed dead (missing in action).
The evil Emperor, Impalpable, a most powerful Lord of Chaotic Change has commissioned his apprentice and executioner, the powerful Vampire Lord Dark Invader, to take care of a matter of some importance: the Rebellion has somehow obtained the plans for the construction of Death Island. This giving the remote possibility that they may discover a means by which it might be destroyed, Lord Invader must apprehend the perpetrators and recover the plans.
And, this is where the story begins: Near the out-of-the-way desert island called Tattleton, a diplomatic vessel, the ____ (name to be created), is making its steady progress across the great ocean world toward a distant island, when the flagship of Lord Invader, the Executioner a great Island Destroyer, hoves into view, more quickly traversing the great sea and closing upon the much smaller vessel.
The Island Destroyer's mighty guns are silent as Lord Invader desires personally to board the ship and apprehend the person he believes to be smuggling the illegally-gotten Death Island plans, her name, Princess Cita from the great artistic and peace-loving Ilse of Aldranean. Therefore, the great ship grapples with the much smaller ship and begins to reel it into one of its many small ship ports, for easy boarding.
When the game begins, the Sea Elf Princess shall have a battle aboard her vessel, having Rebellion NPCs as her allies. I will let the other players command some of the rebel forces (just for fun!). Those forces will surprisingly be orcs, goblins, and dark elves, showing that in this far-flung Warhammer world races are actually working at getting along with one another. They will have to defend against Lord Invader himself and countless numbers of his Skeletroopers.
Stay tuned! Return here for updated info on the game creation process and for the four custom characters' documentation.
Of the above four characters, the Jaedai will be the most complicated.
I just added the available beginning Force Powers for the Jaedai in this edit. Also, the detailed beginning Force Power Descriptions will appear in a reply to this post.
More editing will likely occur, but this should give the reader a good idea of what this warrior will be like. Note: the Jaedai should be failry good at healing, but have little or no actual Wizard's attack spells. Even the "steal the enemies wounds to heal the good guys" types of spells will be off limits to the Jaedai.
Not yet completed, but here is alot of the basic rules. The method and tables for beginning Force Powers (spells) is yet to be created, since the entire Force Powers list is still being developed (or spell book).
This allows the Jedi to "deflect" incoming missiles (projectiles) of a physical nature on a 6+ (5+ as Knight, 4+ as Master and Lord). Deflection is his ability to anticipate projectiles before they hit (while using Power Sabre only -- works against all solid projectiles -- not effective against area effect, fire or magic). This is not to be confused with the Parry skill (which only applies to melee attacks).
If a missile is successfully deflected there is also a chance that it will turn back to strike the one that fired it. Roll 1D6 for each deflected missile, on 5+ as Padawan (4+ as Knight and Master, and 3+ as Lord), the missile is returned and inflicts the same damage upon its shooter as it would have caused on its target.
Power Sabre Style (Choose your style.): The Jaedai must choose a beginning sabre style, either Aggressive or Defensive, which will remain with him for his entire career (mostly). Before choosing, it may be good to review the available Sabre Skills for leveling up. No less than six (3 for each style) of those skills will be enhanced by one style or the other.
If he chooses the Aggressive style, the Power Sabre cause +1 damage on a successful to hit roll AND on a natural 6 to hit, the damage ignores all non-magical armour.
If he chooses the Defensive style, he has the Parry 6+ skill versus all incoming melee attacks; meaning that if a melee attack actually hits him, he rolls 1D6 and on a roll of 6 the blow is parried by his Power Sabre doing no damage (improves to 5+ as Master, and 4+ as Lord).
Force powers work exactly like the Wizard's spells as regards the use of current and stored power. The Force powers have a casting cost just like spells. Some of the Jaedai's Sabre Skills also depend upon his use of Force power (magic power). The Jaedai may NOT use any spells or Force Powers listed under Dark Side Powers, and the Saedith may NOT use any spells or Force Powers listed under Light Side Powers. The Jaedai/Saedith begins with three Force Powers (see their separate descriptions below). These are all determined according to the method outlined below.
Two notes for clarification: 1. The Jaedai will get +1 to the Power roll at BL 2, +2 at BL 3, and so on until BL 10, when he will get the current power roll +9 (This is the same way I handle the Wizard's current power each turn. Of course, a roll of 1 is always only 1 current power.) 2. The Jaedai begins with 2D6 stored power (power tokens) as opposed to the Wizard's 1D6. And, like the Wizard, he may re-roll power tokens dice one time each if he rolls a 1, keeping the second result. Yes, this is an advantage, but so much of what the Jaedai does is dependent upon the Force power available to him and he is not quite as adept as the Wizard in various applications of magic. In fact, in many cases it might take both a Jaedai and a Saedith to equal a powerful wizard in pure magical abilities (Such comments are made only with the original Wizard of Warhammer Quest in mind.).
A further difference the Jaedai has is that each time the Winds of Magic surge (a natural roll of 6 for the Power Phase), he regains one point of stored Force power (power token) up to his starting value.
Jaedai (Light Side User -- a Dark Side User, the Saedith, will be available in the final documentation, but for this game only the Jaedai is available) begins with one Light Side Healing Power, one Defense, and one Special. The Force Powers are chosen from the tables below.
Beginning Healing Power (only one): Choose whether you will start with Cure Small Wounds* or Finger of Life. No other healing powers are available until you have one of these two.
Beginning Defense Power (only one): Roll 1D6 (re-rolling a 1 if desired, but you must keep the second roll). The result is the power of the beginning defense powers you may choose from. Below is a listing of all the beginning Defense Powers. If you roll a 6, you may choose from any of the powers listed in this table (1 through 5).
Beginning Special Power: (only one) Roll 1D6 (re-rolling a 1 if desired, but you must keep the second roll, unless it is a 3, which is also re-rolled). The result is the power of the beginning Special powers you may choose from. Below is a listing of all the beginning Special Powers. If you roll a 6, you may take the May the Force Be with You power or choose from any other powers listed in this table.
Due to his innate tendency to sense the Force (magical power in WHQ) and to channel its power for his protection, the Jaedai begins with Magic Resistance 6+. This improves when he gains titles (5+ as a Knight, 4+ as Master and Lord). This natural Magic Resistance rating may only be increased by +1 per spell or item no matter what magic resistance they are supposed to give (maximum adjusted magic resistance may never be better than 3+ to successfully resist).
Never wear armour, or helms or use shields. But, a cloak or other protection is fine -- anything a wizard can use to increase his defense.
He is able to use any items that can be used by at least TWO of the following: Wizard, Elf, Barbarian. Also, he may use certain wizard-only treasures to enhance his ability to tap into and channel the life force about him. A list of prohibited items should follow soon.
The Jaedai (only and not the Saedith) receives 5 gold (or experience) for each wound healed on another.
See one of my replies to this topic for the Power Sabre Skills. They may be learned when leveling up.
These custom characters are still being created, but I will post their latest rules here. Though, I may need to add one or more replies to this topic in order to get all their rules posted.
Note: Join with Elf Ranger Knight as the Sea Elf Princess in this story may have some interesting skills and/or spells to learn along the way. The spells may come into play if she learns that she may actually have some latent Jaedai ability.
Long Knife (Str 2). Whenever the Sea Elf Princess gets a natural 6 to hit using her Long Knife she causes an additional 2 wounds (modified as usual). Yes, she may cause a death-blow with her Long Knife.
One Healing Potion: obtained from her cousins, the wood elves, while visiting an Elf Quarter. The potion heals 1D6 wounds on a single warrior.
Sea Wafers (1D3+1): very similar to elf waybread, but are not as light and, according to the wood elves, not as tasty. Each Sea Wafer restores 1 wound to the warrior that eats it. These Wafers spoil by the end of an adventure on a 1D6 roll of 1 or 2.
Bandages (1D3+1): The Sea Elf Princess has some rudimentary knowledge of first aid. When she tries to apply a bandage to a fallen comrade, her attempt succeeds on a roll of 3+ (instead of 4+ for the common warrior).
Dodge 6+ Same as the Elf's Dodge skill.
First Shot Attack (ballistic only): at the beginning of each monster event (all inclusive -- UE, regular room, or even Objective Room --, but subject to GM's judgment) whenever monsters first appear, whether they ambush or not, the Sea Elf Princess gets to shoot off one arrow at any single monster at the start of the Monster Phase, even if adjacent to her. This represents her ability to spot the enemy at a distance and to hear them approaching before others do. Thus it is assumed that she has time to get in one shot while the monsters approach (so technically, she does not really shoot at an adjacent target, she just shoots at the monster before it takes the adjacent position. This attack is also assumed to be made before the monsters decide whom they will be attacking, though the Sea Elf Princess may determine her target with the knowledge of where the monsters will be standing once they make their attacks. To clarify, this skill only works at the begininning of each new monster event AND will not be allowed if the Sea Elf Princess is currently adjacent to monsters placed in a previous monster event.
Negotiator The Sea Elf Princess is an excellent negotiator. For events that involve communication and negotiation she gets +1 to any table rolls or tests (such as Initiative test for discerning the intent or motivation of an NPC). Also, any non-monster events, hazards, and etc. that are of a detrimental nature and that involve other people may be avoided (treated as uneventful) on a 1D6 roll of 6.
The Sea Elf Princess may wear any armour available to her wood elf cousins (normal Elf). She may generally use anything that the Elf can use with the following exceptions: She cannot make potions out of healing herbs. She may buy them and have a fellow Elf (normal wood elf) process the potions for her (perhaps sharing one for payment), if one is in her party; She may buy waybread, but it costs twice as much for her as it does for the normal Elf, because the wood elves feel it an insult that the Sea Elves would produce an inferior likeness to waybread and pass it off as of equal quality.
Modified Pistol Crossbow - Stregth 3; 3 shots every other turn (takes one turn to reload); Modified Range 6 (if fired beyond range the target is at -1 to hit per square beyond). All the normal ballistic rules apply. See also Enhance Ballistics skill.
Quick Reload Modification - During any of his turns (even during reloading), while NOT adjacent to monsters and while not shooting, the Dwarf Engineer may switch his Pistol Crossbow over from normal loading rate to a quick loading rate that allows two shots per turn at strength 2. This means that he is able to reload more quickly, reloading two quarrels immediately after shooting them off, but the technique causes the shots to lose a little of their power. Switching back again has the same requirement (not shooting and not adjacent to monsters, though moving is okay, because he is an engineer).
Axe - Does normal damage of 1D6+3 (strength of dwarf). Though it is a common axe, the Dwarf Engineer may visit the Dwarf's Guild and have runes inscribed upon it.
Rope - May be used to escape a pit. May have other uses. Roll 1D6 each time a warrior's weight or similar weight tests the rope's strength. On a 1 or 2 it has broken.
Enhance Ballistics This is an ability of the Dwarf Engineer to tinker with certain ballistic weapons (pistols, muskets, and crossbows). He may be able to enhance their usefulness by experimenting with them when they first come into the party's possession (more on this in his full documentation). Starting out, he has already successfully modified his Pistol Crossbow (see above).
General Engineering The Dwarf Engineer is an engineer. Therefore, he is good at engineering things. He gets a +1 to any dice rolls involving the use of ropes, lock picks, and tools of any type. Also, (especially important in roleplay) he gets an additional +1 to any initiative tests related to engineering (such as finding secret doors or passages, or disarming a trap, picking a lock, making a rope, and etc.). See page 166 in the RolePlay Book (dwarfs tend to be good at these things already, but the Dwarf Engineer is even better). This skill is specifically helpful, should the Dwarf Engineer find himself on a Sea-going vessel that needs extra machanical care to maintain its precarious balance between superior usefulness and being adrift at sea.
I would like to join.. im just about to create a new game, so I should have warrior slots enough..
I would like to join with a Jedi..
That's one player so far.
The Power Sabre is the Jaedai's weapon of choice. If he practices as he should and depends much upon the Force, he will become much more skilled and powerful while wielding it against his foes. Every time he levels up, roll 1D6. On a 3+ roll once on the following Power Sabre Skills Table. Luck may not be used to re-roll this dice (nor for that of the table roll), but if he has found a Jaedai Mentor that is of greater experience than he is, this roll will succeed on a 2+ (only failing on a roll of 1).
Roll 2D6 on the following table if the Jaedai gains a new Power Sabre Skill. If the Jeadai is being trained by one more experienced than he, he may choose the skill roll or the one just before or the one just after on the table (but see notes on results 2 and 12). If the result is a skill he has already received, roll again until a new Power Sabre Skill is rolled. The skills which require the spending of power to use must be voluntarily activated, while those that do not require power are automatic.
2 - Cut Through Obstacle (Cost 4 power per turn attempted) He may now use his Power Sabre to cut through a wall, a floor, a door or a ceiling. It takes one whole turn, in which time he may not attack, nor use his sabre to deflect or parry. At the end of the turn, roll 1D6. On 4+ (3+ as Master and Lord) his sabre cuts an opening (a way through or out). On a roll of 1, he cannot cut through the substance, for it is too difficult. Otherwise, a failed roll does not prevent further attempts in subsequent turns. If cut through ceiling (sometimes the floor, or an outside wall, depending upon the adventure and the depth of the current dungeon) the opening may then be used to escape the dungeon.
Note: if 2 is the natural dice roll result (two 1s), then the Jaedai may not choose another Power, even if he has a more experienced mentor. He may however re-roll on this table if he already has this skill. The original result of 2 will also prevent him from choosing this time on the re-roll -- must accept the first new skill rolled.
A number of times per adventure the Jedi may now double his attacks for one turn (Knight 1 time, Master 2 times, Lord 4 times) while using his Power Sabre and expending the Force power needed to sustain the flurry of attacks.
From now on the Jaedai may attempt to parry each incoming blow on 6+ (as Knight, 5+ as Master, and 4+ as Lord).
If the Jaedai has the Defensive Sabre Style his Parry skill is better yet: 5+ as Knight, 4+ as Master, and 3+ as Lord.
He gains a +1 to his Deflection skill (now 4+ as Knight and 3+ as Master and Lord, but only while spending 1 power per turn). Additionally, he may now defend himself and another (other) warrior(s) behind him or next to him (+1 other warrior as Knight, +2 others as Master, +3 others as Lord). Note on cost: for example, it costs 3 power per turn to defend three warriors in addition to himself. This greatly improves the original Deflection skill, but NOT the Parry skill. Also, it does NOT improve the likelihood that a deflected projectile will hit the shooter.
If the Jaedai has the Defensive Power Sabre style, this improvement costs him nothing when used only for himself (still costs 1 power per turn per other warrior protected).
This one attack takes the place of all his normal attacks, a one-shot ballistic attack. He must have LOS to his target. Roll to hit using ballistic skill, damage caused is the same as a melee attack but without the Jaedai's strength added. All his Sabre damage and effects are based upon the ballistic to hit roll for this attack.
The Sabre is recovered at no power cost if the Jaedai has Force Pull. If he does not yet have that Force ability, then he must physically be in the same or an adjacent square as the last target hit in order to recover his power sabre.
At higher titles (Master up to two total targets, Lord up to three), the sabre may then be guided to hit a second and third target (all with one attack) whether or not the first target was hit or killed. However, the Jaedai must guide the thrown Sabre in a straight line, a curve, or etc. (but the trajectory must make sense). A separate ballistic to hit roll must be made for each target.
This is a special designed attack that may be done instead of a normal attack versus one opponent once per attack . If attempted, the Jaedai must state he is using this skill and whether he is targeting his opponent's non-magical weapon or armour, and then must roll to hit as normal. If he hits, roll another 1D6. On 5+ (as Knight; 4+ as Master, 3+ as Lord) the attack actually does destroy the targeted item; whether the destroy roll is successful or not, the entire attack should be figured as usual based upon the original to hit roll, then after figuring actual wounds caused (after all modifiers that are allowed) subtract only 50% of the wounds from the target. Note: even though a weapon or armour may have been destroyed, their respective modifiers still apply for this attack.
If the Jaedai has chosen the Agressive Power Sabre style, he may also use this skill to target a monster's magical weapon or magical armour (at a total cost per attempt of 4 power). However, this task will prove a bit more difficult, only succeeding on a 6+ as Knight (5+ as Master, and 4+ as Lord).
+1D6 wounds on a natural 6 to hit (as Knight; 5+ as Master, and 4+ as Lord).
If the Jaedai adopted the Aggressive Sabre Style his attack now does +1D6+2 wounds in addition to the original +1 wound for a total of Damage Dice+1D6+3+Strength on a natural 6 to hit (5+ as Master, 4+ as Lord).
Much practicing has paid off in more accurate wielding of his Power Sabre. The Jaedai now has +1 to hit while using his Power Sabre.
If the Jaedai has the Defensive Power Sabre style, this skill also makes him at times harder to hit, granting +1 Weapon Skill for defense only (whenever a monster attacks him) while wielding his Power Sabre.
Ignore all non-magical Armour on every successful to hit roll while using the power sabre.
If the Jaedai uses the Aggressive style, this skill will also enable him to ignore magical armour on a natural 6 to hit.
Ignore all Monster Toughness while using Power Sabre.
Note: If the natural result of the dice roll is 12 (two 6s), the Jaedai may choose this skill or any other skill on this table that he does not already have. This is true regardless of how much experience his trainer has.
"LS" is Light Side; "N" is Neutral; "*" is Wizard spell modified for the Jaedai; a numeral before the name is the casting cost; "=" means that it works the same as the Wizard's spell; the name of a Wizard's spell after the Force power name shows that the name has been changed.
I will try to underline the aspects that are different.
Pick any Warrior on the board (including the Jaedai) and heal 1 of his Wounds. Each individual Warrior may only have this power used on him once per turn. However, there is a chance that this power may fail. Roll 1D6. On a roll of 1 it fails.
Pick any Warrior on the board (including the Jaedai) and roll 1D6. On a score of 1, 2 or 3 the power has no effect. On a score of 4. 5 or 6 the chosen Warrior has that many Wounds healed.
Pick any Monster on the same board section as the Jaedai and roll 1D6. On a score of 6 any one weapon that it is holding is forcefully ripped from its grasp. He cannot attack this turn as he retrieves it. This power may have other uses (RP).
May be used against any one monster (no more than once per monster) at the time of placement at the beginning of any non-Objective Room monster event (randomly generated for rooms and Unexpected Events). Roll 1D6. On 5+, that monster is distracted from the battle and is not place (or is immediately removed). No one gets the gold (or experience) for any monsters that are so distracted, although if more than one monster generated by the event actually participates in the combat, the party still gets any normally generated treasure.
This power puts the Jaedai into a trance state in a prone position on the floor. While in this state, he may do nothing. No Monster will attack him unless there are no other Warriors standing, in which case the Monster automatically hits. However, any monsters that successfully resist (Magic Resistance) may attack him (hitting automatically).
The Jaedai may Force push any monster (except Large Monsters), warrior, or moveable object within 6 squares range (requires LOS). The target is pushed backwards in a straight line away from the Jaedai Apprentice 1D6+1 (+2 as Knight, +3 as Master; +4 as Lord) squares. A monster or warrior that hits a wall may have the wind knocked out of them (be stunned and do nothing for one turn -- treat as prone -- not applicable to daemons and ethereal) if they fail a toughness test (at +1 to the difficulty per square short of the total rolled for the Force push). The push stops whenever the target hits a solid obstruction such as a wall, but the model passes through other models without disturbing them (assumed it is that other models are constantly in motion like the future). Any target that cannot fly (or is not levitating), will fall into a pit or fire chasm (flying or levitating targets will remain suspended over the pit or chasm) if it stops (at the end of the Force push) over an opening. The target may suffer from whatever it falls into (a monster or warrior will die if they fall into the Firechasm), but the push itself will not damage the monster, because the Jaedai is trying to avoid directly damaging the target with the Force. This may be used with Levitate to prevent the target from falling.
The Jaedai waggles his fingers and speaks words of assurance to the opposing target causing it to forget its role.
Roll 1D6 each time this is attempted. On 4+ as Knight (3+ as Master, 2+ as Lord) it is successful. Pick any Monster on the same board section as the Jaedai. This turn it loses 1 attack. This may not work versus main characters in designed adventures; nor does it work against any magic users, daemons, ethereal, or Large Monsters (except Giants -- they can sometimes be tricked -- a Giant gets 4+ to resist each Mind Trick attempt; and, yes it will work versus many of the undead in the ISLAND WARS adventure.).
The Mind Trick may have certain uses in roleplay.
This power creates a cloak of magical energy around the Jaedai that can absorbs up to 1D6 Wounds.
The Jedi warns the party of an ambush preventing its occurrence on a successful roll: 6+ as Knight, 5+ as Master, 4+ as Lord. This Force Power may only be used if the power points are spent immediately upon the placement of the new group of monsters. If used with a successful Force Vision (on the same event), it only costs 1 power point instead of 3 to attempt.
Pick any model that lies within the Jaedai's line of sight and roll 1D6. If the score is less than or equal to the target's Toughness the spell has no effect. If the score exceeds the target's Toughness it is restrained by invisible bands of the Force energies about it and may not move or fight. While thus helpless, the target cannot be attacked, because the Force barrier is impenetrable from either side.
Note that for every 2 extra points of power the Jaedai adds to cast this spell you may add +1 to the dice roll to see if the target is restrained. The target remains so immobile as long as the Jaedai continues to spend power points equal to the target's Toughness each turn.
Pick any Warrior within line of sight including the Jaedai. Each time he is physically attacked this turn roll 1D6. On a score of 6 all the Wounds that the attack inflicted are rebounded onto whoever caused them. Note that this power does not rebound spells or other Force Powers. To clarify: figure the total damage amount before modifiers that the warrior would have taken, then apply that to the attacker subtracting modifiers.
Roll 1D6; on 4+ as Knight (3+ as Master, 2+ as Lord) all attacks made against the Jaedai (only) are at -1 to their to hit roll for this turn.
The Jaedai calls upon the Force to increase his ability to shrug off physical pain.
This turn the Jaedai (only) is at +2 to his Toughness.
The Jaedai may open any non-magical lock on the same board section as himself. Any traps on the lock are set off as normal.
Pick any Warrior on the board (Including the Jaedai). This turn he is at +1 strength. Each individual Warrior may only have this spell cast on him once per turn. Note: the strength increase will apply for combat and for strength tests (such as for web or net breaking). Therefore, the class has been changed.
This power allows the Jaedai to understand anything said, or even thought (surface thoughts loudly thought), regardless of the language the words are spoken in. It does not allow the Jaedai to speak another language. When used to pick up on surface thoughts, this power may fail. Roll 1D6. The roll is successful on 5+ as Knight, 4+ as Master, and 3+ as Lord.
The Jaedai may use this power to communicate silently with others who understand his language by means of sending a mental message (a sending of thoughts, of reasonably short length per sending -- say one to three lines of information, or one to two short to average sentences). It requires also that the Jaedai has at least met the receiver of the message in person. No, this does not allow the Jaedai to hear the receiver's response to his message, unless the receiver is able to communicate in the same fashion and also sends a message back to the Jaedai. As a Knight the Jaedai may us Telepathy to communicate with the target up to three sections away. As Master this increases to six sections away, and as Lord there is no limit as long as enough power is spent to send the communication. It costs an additional power point for each board section beyond the same one. Beware, if this power is used in an attempt to communicate with powerful enemies, especially those strong in the Force.
The Jaedai calls upon the Force to create a pocket of silence than takes in the whole room.
Works only in the same board section. For the rest of the turn no sound can be heard on this board section, nor can any sound be heard to come from this board section. Any spells, chants and etc. requiring audible words be spoken cannot be used unless this Force power is dispelled or personally resisted (Magic Resistance). As the Jaedai gains experience this zone of silence may be expanded to adjacent board sections at +2 cost per section. He may expand the effects to one adjacent section as Master, and two adjacent sections as Lord. This zone of silence does not prevent the use of Force powers, since they do not rely upon the spoken word.
The Jaedai may leap over any one square (only one as Apprentice) provided that there is room between the obstruction and the ceiling and there is an empty space in which to land. He may jump farther by spending 1 more power per square beyond the first one to be jumped (these are all squares he is jumping over). There is a maximum number of squares that he can jump over:: Knight = 2, Master = 4, Lord = 6. If the Jaedai uses Force Jump in the same turn that he uses Force Speed or Advanced Force Speed, he may jump one additional square at no extra cost (provided he has spent the 4 power needed to be able to jump). So, while using the combined powers, he may jump over two squares before having to spend any additional power. The Jaedai may Force Jump out of a pit (landing next to it, or up to 2 squares away as Master, and up to 4 squares away as Lord).
On a successful roll (5+ as Knight, 4+ as Master, 3+ as Lord), this power allows the Jaedai to determine what is in a room before the Warriors enter it. Once used this power allows you to look at the next Event card in the Event deck just before the Warriors enter a room and reveal it, rolling on tables if necessary. Unlike the Wizard's spell, this power does not allow the Jaedai to change the event. Force Vision may only be cast once per room. When used with Sense Danger, Sense Danger will only cost 1 power point.
This power makes the Jaedai (only) seem to be invisible, while he is not actually invisible as the Wizard can be. While appearing invisible the Jaedai may carry out any action except attacking an opponent: moving, healing, defensive Force powers, and etc. are therefore valid actions, while throwing his Power Sabre at a monster, firing a bow, pushing a monster into a pit, and etc. are not. Magic resistance may enable a monster to see him. Roll Magic Resistance, because this power is directly applied to the minds of the Jaedai's enemies. If successful, only the model that has resisted may see and attack the invisible Jaedai. Roll any Magic Dispel also. If Magic Dispel is successful, the Jaedai's power to appear invisible has failed entirely, and all foes may see and attack him. Of course, he may then also attack them.
Pick any Warrior on the board (including the Jaedai). This turn he gets an increase in his Weapon skill: +1 if the Jaedai is an Apprentice, +2 if he if he is a Knight, +3 if he is a Master, and +4 if he is a Lord.
Heavy Leather Vest - Provides +1 Toughness. Roll 1D6 at the end of each adventure. On a 1 or 2, the vest has worn out and must be replaced in order to have proper protection.
Jagged Dagger - Causes 1D6+2 wounds (normal mods, unless a 6 to hit). If he rolls a natural 6 to hit, then roll on the Deadly Dagger Table (found in the Melee Fighting section).
Modified Pistol - (with enough powder & shot for one adv.). The pistol's accurate range is 6 sq. (+2 in normal load mode), & causes 1D6+6 Wounds. It takes one whole turn to reload the pistol, but he may not reload his pistol in normal mode while adjacent to a monster, nor if he attacks in any way. He may break pinning, move & reload in the same turn (but, see Quick Load Modification).
Accuracy Sight (attachment) - It helps make the pistol accurate at a longer range. While using the accuracy sight, he has an accurate range of 8 in normal load mode & +1 to hit if fired at a range of 4 or less (not cumulative with Pointblank skill). Targets beyond range 8 are at -1 to hit per square beyond.
Quick Load Modification - A dwarf engineer has modified this pistol with a quick loader device that blocks part of the loading chamber making for less shot and powder to fill and allowing for faster reloading, but at the expense of firing power. It takes one turn to switch the loading mode from normal to quick (or to switch back again) while not firing the weapon, not attacking monsters, and not being adjacent to a monster (though movement is okay). He may begin his turn next to a monster, but he must move away to switch the mode. This involves making sure that the loading chamber is empty beforehand and filled up again afterwards. While using the Quick Reload mode, the pistol is at Strength 3 for damage, accurate range of 6 with a -1 to hit for each square beyond 6. He does not get the +1 to hit for targets at 4 or less range, but he does get to use the Pointblank skill for adjacent monsters.
This mode allows the Rogue-smuggler to shoot and reload in the same turn, and even to reload while adjacent to a monster, provided that he first successfully breaks pinning (though he need not move). By this method, he may shoot monsters at point blank range a little more often. Clarification: he must break pinning before shooting or before reloading. He only needs to break pinning once per turn. If he cannot break pinning, then he cannot shoot (if loaded), nor can he reload, but he may switch to a melee weapon as usual.
Pistol Jamming - With the modifications the pistol may get jammed. On a natural 1 to hit, the pistol's mechanisms have jammed. It takes one turn (movement is okay) and the Rogue-smuggler must not be adjacent to a monster at the end of his turn (Warrior Phase) to get it unjammed. However, this only unjams the thing, & it will take another turn to reload before he can fire it no matter which loading method he is using.
Marksman - On a natural 6 to hit using any ballistic weapon, add +1D3 wounds (not modified for toughness or armour). This represents his excellent marksmanship learned while in military training, which enables him to shoot more precisely, thus finding a weak place in armour &/or monster hide.
Pointblank - While using any pistol, the Rogue-smuggler may shoot a monster at pointblank range (adjacent to him), but, only if he first breaks from pinning &/or ends his move next to his target. A pointblank shot is at +1 to hit & a successful hit does +1D3 wounds unmodified for toughness & armour. The Pointblank skill may be used with either loading mode of his modified pistol. Effects are combined with those of Marksman on a 6 to hit (total of 2D3 extra wounds).
Though the Rogue-Smuggler is generally better at shooting his enemy, he at times will need to pull out his dagger or roll up his sleeves and plunge into a good brawl. It is at times like this that his knowledge of less than fair fighting will come quite in handy.
Taunting Remarks Skill - This skill is quite suitable to a rogue. Whenever he actually hits his opponent in melee combat & that opponent survives the damage, roll 1D6 to see if he remembers a good taunt in time to get in a good jibe & maybe an extra jab. On a 5+ as a Scoundrel (and as Honourable Smuggler, and on 4+ as Hero of Rebellion and Rebel General), he taunts his opponent. If successful, roll 1D6 on the Taunting Remarks Table.
Taunting Remarks Table - Roll 1D6 on this table whenever you have a successful taunt roll after hitting a monster but not killing it.
2 - "Say, it looks like your leader is getting pounded by my buddy over there." = (If this taunt is used against the actual leader, use the Say Uncle result instead.) The monster is at -1 to hit warriors for the rest of the turn, at which time it finds out that you just fibbed to it. If it turns out to be true, this monster gets +1 attack for the rest of the combat, but all his attacks are at -1 to hit.
3 - "Hey, what's that on your face, part of your last meal or just plain ugliness?" = While the monster tries to figure out what you are talking about you stomp on its foot, toe, appendage, or whatever, causing 1 unmodified wound.
4 - "Did you know you might be able to hurt somebody if you actually got ahold of the right end of your weapon?" (properly extended your claws, or such like for non weapon-bearing monsters) = This monster is at +1 to be hit in melee combat for one whole turn (until the end of the Rogue-Smuggler's next turn) while it tries to regain its confidence.
5 - "Your momma is ugly and she dresses you funny." = The monster looks a little befuddled. Then if able to speak it repeats, "Momma? Ugly? Dresses? Funny? Oh, funny" and, whether able to speak or not, the monster laughs so hard that it doesn't attack anyone this turn and is at +1 to be hit in melee combat for one whole turn (until end of the Rogue-Smuggler's next turn).
6 - "Hey, did you know that you have GARMENTS on your back?" = The monster tries to look at its back to see what in the world kind of things are on its back. Meanwhile, you get one more immediate attack against it at +1 to hit. If you hit it and it doesn't die, you just might get to taunt it again (Roll to see if you taunt).
Deadly Dagger Table - Roll 1D6 on this table whenever you get a natural 6 to hit using any dagger or knife as a melee weapon.
1 = The dagger got stuck in or on part of the beast, armour, hide, whatever, and the Rogue-Smuggler is at +1 to be hit for the Monster Phase of this same turn AND he may not attack any more this turn (if he has more than 1 attack) while he works to retrieve his dagger -- taunting is allowed, but the garments taunt (#6) result counts as a "Say Uncle" (#1) result instead. At the end of the turn (after Monster Phase) the monster in which the dagger was stuck will receive an additional 1D3 wounds with no modifiers whatsoever, cannot be ignored, dodged, or anything, as it suffers from more cutting and bleeding caused by the dangerous weapon.
He may use any melee weapon that the Elf may use, including magical and magically enhanced melee weapons, but nothing designated as Elf only and nothing that is two-handed. He may also use singe-handed axes. However, anything larger than a dagger or a knife incurs a -1 to hit penalty, since he prefers ballistic weapons and knife fighting. He is right at home with knives and daggers of any type. They are well-suited to Alehouse brawls and alley fights, of which he seems to have more than his share.
The Rogue-Smuggler favors powder weapons, but may also use bows and crossbows. All Fletcher & Gunsmith items are available to him. He may shoot beyond the range of a weapon with range limit, but at -1 to hit per square beyond range. And, yes he may throw any throwing weapons available at the Weaponsmith's. Also, he may be able on occasion to obtain (for a price) certain attachments for missile weapons. If he has a Dwarf Engineer in his party, the engineer may be able to modify his ballistic weapons when they are first found or purchased.
The Rogue-Smuggler cannot wear as much armour as some more sturdy fighters, since he depends a bit more upon his resourcefulness in combat & heavier armour would hinder his fighting style. In addition to his leather vest, he may wear furs (at no penalty). He may wear leather armour or light armour instead of his leather vest. He may use a normal shield, but not a Great Shield. He also may wear a Leather Helm or an Open Helmet, but nothing heavier.
The Rogue-Smuggler may use any treasure (including armour, helms and shields) that an Elf may use as long as it is not an Elf only treasure.
That is looking great! I've had a long day full of death and destruction but will give it my full attention on a day off. Sometimes a 9 to 5 job looks so tempting! | 2019-04-21T10:41:35Z | http://bwarhammerquest.runboard.com/t90033 |
Change of job could be a strategy in vocational rehabilitation when return to the original job is not possible, but research is very limited concerning the effects of job mobility on the future vocational situation. The aim of the study was to investigate whether job-to-job mobility affects the likelihood of remaining on the labour market over time among persons who are employed and have experienced long-term sick leave.
In a longitudinal register study, cohorts from three base years (1994, 1999 and 2004) were created, based on the Swedish population who were 20–60 years old, had sickness allowance insurance, and were employed in the base year and the following year (n > 3,000,000). The likelihood that individuals on long-term sick leave were employed later depending on whether or not they changed workplace during the present or next year of long-term sick leave was analyzed using logistic regression analysis. Age, sector, industry, children, marital status, education, income, rate of sick leave and earlier sick leave and earlier mobility were taken into consideration.
Women with more than 180 days’ sick leave who changed workplaces were more likely to have a job later compared with those who did not change jobs. For men, the association was statistically significant with 1994 and 2004 as base years, but not in the cohort from 1999.
The present study indicates that for those on long-term sick leave that changed workplaces, the opportunities to stay on the labour market might increase. However, the study has methodological limitations and the results for men are ambiguous. We do not therefore have enough evidence for recommending job change as a strategy for vocational rehabilitation.
In November 2010, 36,535 women and 20,232 men had 180 or more days of sick leave in Sweden, corresponding to approximately 1.7% and 0.9% of the employed population respectively (http://www.forsakringskassan.se/statistik/sjuk/sjuk_rehabiliteringspenning/sjukochrehabsjukpenning/ and http://www.ssd.scb.se/databaser/makro/Produkt.asp?produktid=am0207) and contributing to the majority of disbursed days of sick leave.
The costs of disbursed sickness allowance are high for the community. In 2010, the cost of sickness cash benefits was approximately EUR 2,071 million and the expenditure on sickness and disability amounted to just under 4% of GNP in Sweden . Lost competence that has to be replaced may also be costly for employers. For the individual, long-term sick leave may have a negative impact on health and finances [2–6]. Long-term sick leave increases the likelihood of losing affiliation with the labour market in subsequent years [7–10] and reduces the probability of gaining new employment [11, 12]. Poor health, measured as hospital admission, has been found to increase the probability of exit from employment by 48% among men and 43% among women .
According to the Swedish Social Insurance Administration, 62% of the individuals who were on long-term sick leave (60 days or more) in 2006 were assessed as having full working capacity 1 year later. Eighty-one percent of these were employed or self-employed 1 year later, and 15% were unemployed. In a study from 2009 of individuals on sick leave with chronic occupational back pain in Denmark, Germany, Israel, the Netherlands, Sweden, and the United States, the degree of return to work after 2 years ranged from 22% in Germany to 62% in the Netherlands. In Sweden, the degree of return to work was 39% 2 years after the first day of sick leave .
Accommodation at work, such as changing the workplace, the equipment, the conditions or the environment with the purpose of removing barriers for return to work, seems to be effective in facilitating return to the same workplace after periods of sick leave [15–18]. However, such accommodation is not always feasible. An example could be an individual suffering from rheumatism with physically heavy work where no co-workers are available to allow changes to the work. Furthermore, many do not return to their original employment despite accommodation at work due, for example, to cooperation problems among key stakeholders, lack of motivation to return from being sick listed or negative reactions on return to work from supervisors or the work group [15, 19, 20].
Change of job is discussed as a central strategy in vocational rehabilitation when return to the original job is not possible . A change could mean improved ability to work through a better match between the individual’s capacity and the demands of the job. A change could also promote health when the individual is dissatisfied with his or her present job. According to the person–environment fit model, strain develops when the individual’s needs or abilities do not match the supplies or demands of the job. Such strain can lead to illness . A change to a job that better matches the individual's abilities and needs could relieve the strain . One type of mismatch between the individual and the job is being locked in; that is, being in an unwanted occupation and/or workplace and experiencing a real or perceived lack of alternatives [24, 25]. A locked-in situation is associated with having health problems and being on sick leave . Change of work in these situations is associated with increased job satisfaction and fewer conflicts at work .
Mobility on the labour market is a complex concept. One form of such mobility is job-to-job mobility. Job-to-job mobility may be characterized as change of employer/company, change of workplace, and/or change of profession/work tasks. This study concerns change of workplace.
A strong association between health and mobility and between employment and unemployment has been found, but there is a weak association between health and occupational mobility [11, 13]. According to a report from the European Union, 8.8% of the general Swedish population changed jobs during 2005. The United Kingdom had the highest proportion that had changed jobs at 22.9% and Greece had the lowest proportion of job changers at 5.6% . A report on job mobility in the Nordic counties in 2010 showed that Sweden has had a comparatively low rate of mobility compared to the other Nordic countries .
Mobility decreases with age [28–31]. Mobility also differs between occupations. For example, managers in Sweden change jobs to a greater extent than other occupational groups . Mobility also varies with branch code (see Methods section). In Sweden, individuals with a high level of education move to a greater extent than individuals with a low level of education [28, 32]. Married people are less mobile than those who are single or cohabiting. Women with children are in general less prone to change jobs than men. In the Nordic countries, the type of contract and the number of working hours per week have been found to have a strong effect on mobility. Being in temporary employment and/or working part time increases the probability of a job change . These conditions may also affect return to work and are therefore considered in this study. The association between mobility and employment may also be affected by health selection, that is, individuals with better health may have better opportunities to change jobs and better conditions to stay employed.
For employees on sick leave, a job change may thus lead to improved work ability, health and the possibility of remaining employed, but research is very limited concerning the effects of job mobility on the future vocational situation. To our knowledge, there are no previous studies on whether a change of job increases the possibility of remaining on the labour market for individuals who have been on long-term sick leave.
The aim of this study was to investigate whether job-to-job mobility affects the likelihood of remaining on the labour market among persons who have experienced long-term sick leave and whether this likelihood differs between men and women. In addition, this study explored how this association between job-to-job mobility and labour market situation differs with regard to job change among employees without or with fewer days of sick leave.
The study has been approved by the Ethical review board in Linköping, Dnr:169–09.
In this cohort study, data were collected from LISA, a longitudinal database of Swedish registers of social insurance and labour market studies established by Statistics Sweden, the National Insurance Administration and the Swedish Agency for Innovation Systems (VINNOVA). Permission to use the database was given by Statistics Sweden. The database is updated annually with a 3-year delay and includes all registered residents aged 16 years and older for the period 1990 to 2009.
In a first step, three cohorts were created based on the Swedish population who in 1994, 1999 and 2004 were between 20 and 60 years old, had sickness allowance insurance and were employed at the base year and the following year (see Figure 1). Those who were self-employed at the base years and the next year were excluded from the study as they differ from employed persons in having a significantly lower level of sickness absence and other conditions in the social security system such as a longer qualification period before getting sick pay . Based on these criteria, the total number of females varied between 1,448,972 (1994) and 1,503,397 (2004). Comparable figures for males were 1,482,668 (1994) and 1,568,961 (2004).
The individuals were followed for 4 years; emigrants, early retirees (<65 years), and deceased individuals were excluded.
The individuals in each cohort were divided in regard to sickness absence in the base year. In order to be able to investigate the specific research question of this paper, the long-term sick, defined as those having 181 days of sickness absence, is the group in focus. However, we have also analysed those having between 1 to 180 days of sickness absence and those lacking absence at each base year for comparison.
Only between 18.5% and 49.9% of long-term sick men and women matched our criteria of having employment both at the base year and at the year after (Table 1).
In the cohort from 1994, year 1 = 1996, year 2 = 1997 and year 3 = 1998. In the cohort from 1999, year 1 = 2001, year 2 = 2002 and year 3 = 2003. In the cohort from 2004, year 1 = 2006, year 2 = 2007 and year 3 = 2008.
In 2004, there was no maximum duration of sickness benefit in Sweden; in practice, it was possible to be on sick leave for several years. Also, there were no set time limits for getting sickness compensation. Sickness benefit is usually close to 80 percent of the calculated annual income and sickness compensation amounts to 64 per cent of the assumed income. An employee on sick leave could be fired under the same circumstances as an employee not on sick leave. In both cases, there must be objectively based reasons such as shortage of work. The employer has a responsibility to reassign the employee within the company if possible . In 2004, there was also a National Insurance Act stating that the employer shall ensure that actions are taken for active rehabilitation .
After the first 14 days of sick leave, the employer does not fund sickness benefit, thus it is possible to change jobs during sick leave. Traditionally in Sweden, employers can get temporary grants from the Swedish Public Employment Service to partly cover salary costs and work appliance as an incentive to hire disabled individuals.
Job-to-job mobility was defined as a change of workplace identity the year following the base year (Figure 1). Information on workplace identity was based on payment of salaries during a week in November and was collected from administrative registers at the Swedish Tax Agency. Employers in Sweden have a duty to report annually to the tax authorities the salaries paid and the workplace identification numbers for all employees. A workplace is any address, dwelling unit or group of dwelling units where some sort of economic activity is carried out, with at least one employee working at least 20 hours per week. A company can have several workplaces, but a workplace can only belong to one company.
Being employed or not being employed is the outcome variable and is based on being gainfully employed 4 years after the base year (Figure 1). Individuals were classified as gainfully employed if they had worked for at least 1 hour per week in November, and otherwise as non-employed. This is based on information that employers are obliged to provide to the Swedish Tax Agency. During 1998, 190 individuals were found to be classified as gainfully employed despite 12 months of full-time sickness compensation and they were treated as not being in active work and were reclassified as non-employed. In 2003, 945 individuals were classified as gainfully employed despite 12 months of sickness benefits and 1023 individuals were reclassified in 2008. This reclassification only applies to individuals with full time sickness compensation for the whole year, and not to those with part-time sickness compensation. The reclassified individuals most likely have no real attachment to the labour market; the fact that they still have an employment number might be due to retained holiday compensation. Some of those classified as employed also had other sources of income such as economic support, unemployment benefits or sickness benefits to some extent during the year or that they had participated in some form of labour market intervention. In an attempt to control the predictive validity of the outcome variable, the occurrence of alternative sources of incomes was compared between those classified as employed and those classified as non-employed. Individuals classified as non-employed had other income sources to a much greater extent, such as unemployment benefits. This implies that the measurement of employment is valid.
Data were stratified on sick leave and were collected from the Swedish Social Insurance Administration. In Sweden, the employer pays for the first 14 days of sick leave, apart from the first day, which is a qualifying day of sickness. The Swedish Social Insurance Administration pays from day 15. As information about days of sick leave is collected from the Swedish Social Insurance Administration, this means that one registered day of sick leave corresponds to 15 days of sick leave (14 + 1) in reality. In Sweden, sickness allowance can be given for a whole day or 0.25, 0.50, 0.75 of the working day. One way to describe sick leave based on sickness allowance is to ascribe 1 day of sick leave regardless of whether it is given for a whole or part of a day (gross days). An alternative way, which is used here, is to recalculate allowance for part of a day to full days (net days) so that 1 day of sick leave can mean e.g. 1 day of full sick allowance, 2 days of half-sickness allowance (0,50) or 4 days of 0,25 sickness allowance.
The population was stratified into three categories based on days of sick leave registered by The Swedish Social Insurance Administration in the base year: 0 days; 1–180 days; and 181–365 days. As pointed out above, the category ‘0 days’ encompasses days of sick leave lasting 14 days or less which are paid by the employer. The population was also stratified according to gender.
All confounders were collected from the base year (1994, 1999, 2004). Age, Sector and branch of employer, children, marital status, income, education, sick leave before the base year, job change before the base year and rate of sickness absence were considered as possible confounders. All confounders had a statistically significant univariate correlation with employment status 3 years later (p < 0.05). The variance inflation factor (VIF) scores in this study ranged between 1.01 and 1.37, which can be considered acceptable .
Age: Age was calculated from the year of birth based on the Social Security Number and was used as a continuous variable.
Sector of employer and branch of employer: Information about sector was collected from Statistics Sweden’s Business Register. Statistics Sweden is assigned by the Swedish parliament to maintain a register of enterprises, government offices and organizations and their workplaces. The sectors are divided according to the standard classification by institutional sector. The institutional sectors correspond to ESA sectors (European System of National and Regional Accounts) with one difference: the general government sector has been divided into three sectors. Which ESA sector a unit belongs to depends on the type of activity, its function and what is being produced. Based on the institutional sector code, each company is assigned a sector code. These sector codes are grouped in ten categories. In this study, these categories were merged into municipal (primary municipal administration, county councils and municipally-owned companies and organizations), public (public administration, public utility companies and government-owned companies and organizations), private (stock corporations and other non-public companies) and other (any other organization). Information about sector is connected to the company where the individual is employed. Information about company is collected during a week in November, so if the individual has several jobs during the year, it is the sector of the company from which the individual got the major part of his or her paid salary in November that is registered. Information on branch was collected from Statistics Sweden’s company register with information from the Swedish Tax Agency. Based on the activities carried out, every company is assigned one or several activity codes according to the Swedish Standard Industrial Classification. This classification is based on the EU’s recommended standard NACE (Nomenclature statistique des activités économiques dans la Communauté européenne) . The short, two-digit version was used.
Children and marital status: Information about number of children was collected from national registrations conducted by the Internal Revenue Service. In the register, children are connected to their family identity and are registered at the same property as the parents. Children with divorced parents are connected to the same family identity as the parent with whom they are nationally registered. The other parent is registered as childless unless he or she is living with another parent with children nationally registered at the same address. Family identities are created by the social security number of the oldest individual of a maximum of two generations who are connected to each other (married, registered partners, cohabitants with common children, parents or foster parents). Marital status is categorized as unmarried, married/registered partner, divorcee or widow/widower.
Income and education: Income and education were used as indicators of socioeconomic status. Income refers to disposable income and is the individual’s contribution to the household income. Disposable income is what is left of salaries and benefits from the state and local authorities after taxes and deductions. Income was used as a continuous variable. Information on education was collected from the Swedish Register of Education, which records the highest education registered from all formal education units in Sweden for each individual each year. Education is classified according to the Swedish Nomenclature of Education (SUN), which is adjusted to meet the International Standard Classification of Education (ISCED).
Sick leave in the year before the base year: The study works with days of sick leave during the year before the base year (see section on stratification variables for description).
Mobility between the previous year and the base year: The study works with mobility between the previous year and the base year (see section on prediction variables for description) in order to check individuals with a pattern of frequent job changes.
Rate of sickness absence: The rate of sickness absence was calculated by dividing the sum of net days of sick leave at the base year with the sum of gross days. One gross day of absence could mean being absent 100%, 75% or 25% of the day (see description of net and gross day above under Stratification variables). With net days, one day of absence means 100% of a day, two days with 50% absence or four days with 25% absence. The rate between net days and gross days was used to check whether part-time or full-time sick leave affect the association between job change and future labourmarket situation.
Differences in being employed or not 3 years later with respect to job change were investigated using Pearson’s chi-squared test. Logistic regression analysis was used to calculate the likelihood (odds ratio (OR)) that individuals sick listed for more than 180 days were employed 2, 3 and 4 years later depending on whether or not they changed their job between the base year and the next year. The comparison group consisted of individuals that stayed at the same job both years. The likelihood for individuals with no sick leave or 1–180 days of sick leave being employed with regard to job-to-job mobility was also calculated for use as comparisons. Confounders were introduced additively in six models. In Model 1, adjustment was made for age. In Model 2, adjustments were also made for sector and industry. In Model 3, the number of children living at home and marital status were added to the previous confounders, and in Model 4, income and education were added. In Model 5, sick leave the year before the base year was added. Mobility in the year before the base year was added to the other confounders in Model 6. All analyses were conducted separately for men and women and for the various sick leave strata. A 95% confidence interval (CI) was computed for each OR. All analyses were performed using IBM SPSS software (version 20).
In all three cohorts, the proportions in employment 3 years after being mobile differed with regard to sickness absence. Men and women show similar patterns. A greater proportion of individuals with more than 180 days sick leave who changed job were employed 4 years later compared with individuals who did not change job (p < .05) (Table 2). Among individuals with 1–180 days sick leave, the proportion of non-employed and employed were similar among those who changed workplace and those who did not. Among individuals with no sick leave who changed workplace, a greater proportion were without employment 4 years later than among those that did not change (p < .05) (Table 2).
*p = <0.05. x2, comparing distributions between non-employed and employed among those who changed jobs and those that remained in the same jobs, within each level of sick leave.
In the cohort from 1994, 1998 is the outcome year. In the cohort from 1999, 2003 is the outcome year. In the cohort from 2004, 2008 is the outcome year.
Women with more than 180 days of sick leave in 1994, 1999 and 2004, and who had changed workplace, were less likely to be unemployed 4 years later compared with those who stayed at the same work place, based on crude data and in the full model. Adjustment for confounders did not affect the ORs. Therefore, only models 1 and 7 are shown (Table 3). Men with more than 180 days sick leave who changed workplace in 1994/1995 or in 2004/2005 were also more likely to be employed 4 years later, based on data adjusted for age and in the full model. However, men with more than 180 sick leave days in 1999 who changed job did not have a higher likelihood of remaining in work than men who did not change job.
Model 1, days of sick leave + age; model 7, model 1 + sector, industry;+ children, marital status + education, disposable income + sick leave year before base year + job change year before base year + rate of sickness absence.
Females and males with no sick leave or 1–180 days of sick leave in 1994, 1999 and 2004 who had changed workplace were, unlike those with the highest level of sick leave, less likely to be employed 4 years later compared with those who stayed in the same job. As in the analysis on individuals with more than 180 days of sick leave, adjustment for confounders did not affect the ORs (not shown) (Table 3).
The analyses (full model) were also done 2 and 3 years after the base years. With 1994 as the base year, both females and males with more than 180 days sick leave who had changed workplace had a decreased likelihood for unemployment in 1996 and 1997 compared with people who stayed at the same work place. With 1999 as the base year, females with more than 180 days sick leave who had changed workplace had a decreased likelihood for unemployment in 2001 and 2002. For males in the cohort from 1999, this was only true in outcome year 2001, in outcome year 2002 the association was not statistically significant. With 2004 as the base year, individuals with more than 180 days of sick leave who had changed workplaces had a decreased likelihood for unemployment in 2006 and 2007, except for males in outcome year 2006, when the association was not statistically significant.
The aim was to investigate whether job-to-job mobility affected the likelihood of men and women with a history of long-term sick leave remaining on the labour market. The results show that females had an increased probability of being in employment 2–4 four years later if they had changed jobs compared with if they had not. Among men with high sickness absence, job change was associated with the future vocational situation in the cohort from 1994 and in the cohort from 2004. Among individuals with a history of 1–180 days sick leave and among individuals without a history of sick leave, changing jobs was associated with a decreased probability of being in employment later.
There is a lack of previous studies on the association between job-to-job mobility and the future vocational situation for individuals with a history of long-term sick leave with which our results can be compared. Ekberg et al. suggested that job mobility could be a possible rehabilitation strategy and Sandmark et al. report in an interview study that mobility in working life could counteract sick leave and contribute to retained work ability.
A finding that was not the focus of this study but which is still noteworthy is that individuals with no history of sick leave had an increased probability of unemployment after a job change. One reason might be that job change is associated with fixed-term contracts and part-time work. Sixteen percent of all those employed in Sweden had temporary employment in 2008. Individuals with temporary employment are more likely to have experienced multiple workplace changes. Moreover, those with temporary employment contracts are more likely to move from employment to unemployment . In an attempt to take into account the type of employment contract, earlier mobility between 2003 and 2004 was introduced as a confounder. The correlation between mobility and not having employment for individuals with no history of sick leave weakened, but was still statistically significant. This indicates that some of the individuals who changed jobs and ended up non-employed could belong to a group of frequent job changers.
In Sweden, the purpose of the Employment Protection Act is to protect employees in cases of termination or dismissal. This law includes rules for turn-taking and states that employees with a longer length of service have priority over employees with a shorter length of service, if they are qualified enough. For individuals who have recently changed workplaces, this could be a disadvantage. For this reason, one possible explanation why mobility increases the likelihood of being out of work for individuals without a history of sick leave is that in the case of dismissals, the most recently employed is the first one to be dismissed owing to legislation. If this is correct, we could expect another result if the same study is performed in a place where the law is different. Another explanation could be that frequent job changes are associated with health risk behaviours such as smoking . Health risk behaviours could lead to worse health in the future and may increase the probability of unemployment. To take into account frequent job changes, mobility the year before the base year was introduced as a confounder. For individuals with between 1 and 180 days sick leave, introducing earlier mobility as a confounder reduced the probability of not having a job later for individuals who changed workplaces, but the association between job change and future unemployment was still statistically significant.
In the light of the possible explanations above, the results of the analysis of individuals with no history of sick leave seem plausible. However, these possible explanations do not seem to be valid for individuals with a history of long-term sick leave. Job change among those with many days of sickness absence and those with no such absence may represent different strategies. Among those with no sickness absence, job change may represent an unstable position on the labour market or attempts to seek better circumstances. For those with many days of sickness absence, job change is likely to represent a strategy to obtain a job situation that better matches the individual’s health in order to stay on the labour market.
Individuals with long-term sick leave who changed jobs may have better health than those who did not change jobs and therefore had better conditions not to be non-employed, which may explain why job change is associated with an increased likelihood of staying in employment. An attempt to take into account eventual differences in health between those who changed jobs and those who did not was made by adjusting for days of sick leave the year before the base year, assuming that those with worse health had a longer history of sick leave. However, adjustment for earlier days on sick leave did not affect the results.
It is possible that the increased probability of remaining on the labour market among individuals with long-term sick leave was underestimated. As described earlier, those with a temporary employment contract are more likely to change jobs. They are also more likely to move from employment to unemployment . Temporary employments are also associated with poor health . As those with a temporary employment contract are more likely to change jobs it is likely that a higher proportion of those who had changed jobs in this study had temporary jobs. Information about temporary employment contracts was not available. In an attempt to take into account the type of employment contract, earlier mobility was introduced as a confounder, but this had a marginal effect.
Among individuals classified as not mobile, there might be some who were internally mobile, that is, they changed tasks within the workplace. Information on internal mobility is lacking. If such mobility increases the likelihood of staying in work, our results on individuals with a history of long-term sick leave will be underestimated.
Adjustment latitude, that is, opportunities to adjust work to health, increases the likelihood of return to work for people on long-term sick leave . It is possible that the individuals who stayed in the same job had greater adjustment latitude or got more workplace interventions at the current workplace and therefore had no need to change workplaces. If those who did not change jobs had greater adjustment latitude, our results might be underestimated. It is also possible that moving to a new job with greater adjustment latitude is a reason for mobility, which could partly explain our findings. Future studies that include internal mobility and adjustment latitude are required. The probability of men with high levels of sick leave being employed for 1999 was not affected by whether they changed jobs or not. A possible explanation why job mobility affects future employment status differently among men and women may be that men have more opportunities to adjust work to health than women . Thus males in the control group who did not change workplace may be able to stay employed to a greater extent than females in a comparable situation due to better opportunities to adjust work to health.
The effect of job-to-job mobility on the likelihood of people with many days of sick leave staying on the labour market might differ in welfare systems with different rules and different incentives for mobility. However, in this study a similar pattern emerged over a time period of 15 years, despite variations in sick leave and unemployment levels.
The cohorts studied only comprise those having employment in each base year and the following year. To be able to identify job change, the individual has to be employed in both years. Job change is defined as a change of employment number. As there is only one employment number each year, it is not possible to use only one year; job change has to be defined as a change from one year to another. Another reason for setting up this criterion is to enable comparisons with individuals that are employed at the same work place both years, that is, the non-mobile. Owing to a selection of individuals with employment in both years in the mobile group but not in the comparison group, our results may have been overestimated. If this criterion was not set up, job change would have appeared more favourable as all individuals in the job change group had employment in both years, which could indicate, for example, better health, higher motivation or self-efficacy, factors that could predict remaining on the labour market. It is still possible that the results might be due to differences in the group that we were not able to take into account. We have tried to account for differences in health by using earlier days of sick leave as a confounder (see above under Individuals with more than 180 days sick leave). In future studies, the role of factors such as motivation and self-efficacy should be considered.
Long-term sick leave is associated with unemployment and disability pension [7–10]. As the study concerns job-to-job mobility and not mobility in and out of the labour market, the majority of the long-term sick are excluded from the cohorts. Males are excluded to a greater extent than women, especially in the cohorts from the 1990s. This might be due to that fact that the employment rate in the Swedish population in the latter half of the 1990s was comparatively low. The employment rate among men decreased more than the employment rate among women .
Gainfully employed was classified as working at least 1 hour a week in November. Although a test was conducted in which the proportions of other income sources were compared between those classified as gainfully employed and those not, showing that those classified as not gainfully employed had other income sources such as unemployment benefits during the year to a much higher degree, it is possible that some individuals have been classified as gainfully employed that worked only 1 hour a week in November. This could mean that our results are underestimated. November was chosen with the aim of minimizing the number of individuals engaged in seasonal work, which is more common in summertime.
The analyses were carried out separately for women and men. The difference between men and women is not statistically significant. We still choose to show the results separately as we believe that men and women have different life and working conditions and that different models may therefore affect their chances in working life.
One strength of this study is that the material allows a longitudinal design with identical data for several years. By choosing three cohorts from every fifth year, we were able to consider potential economic and market condition effects. We also wanted to increase the validity by avoiding an outcome caused by chance and certain specific condition in a particular year. In addition, sick leave has varied during these years, which can result in the composition of those listed as sick differing in the groups.
Another strength is the extensive material with information on almost the entire Swedish population. The annual gathering of information on sick leave and workplace is required by law and this is likely to increase reliability and contribute to the small attrition rate. The report on sick leave is also connected to payment of sickness benefits, which increases the reliability of the report. Information on income may have deficient validity as income data were collected for the same year as the sick leave data. Disposable income includes allowances and compensation, but the number of days of sick leave is still likely to affect income, which means that individuals with many days of sick leave were placed somewhat below their normal income level. As a test, income from the year before the base year was used as a confounder instead of income at the base year. This did not alter the results. In future studies, a more valid measurement of income level is desirable.
In the present study, mobility between workplaces was studied. Such mobility may involve moving to a similar job or to a different job and might be perceived as a change to a more or less preferable job. The individual may also have different incentives for changing jobs. Disabled workers are more likely to experience involuntary job changes than nondisabled workers . Such differences in mobility may affect the likelihood of remaining on the labour market. Thus these dimensions should be included in future studies.
The results of this study imply that job change might be a way of remaining on the labour market for individuals with a history of long-term sick leave, particularly women. The inclusion criterion in this study, however, limits the validity of the results for individuals with an attachment to the labour market (employment for two years in a row). Furthermore, there might be situations where a job change may not be viable. There might be obstacles that hinder mobility among people who have experienced long-term sick leave. In a Swedish study from 2008, six out of ten personnel managers had a negative attitude about hiring people on sick leave from another workplace . Individuals on long-term sick leave report that their sick leave negatively affects their career and opportunities to change to another job . The results of this study support the hypothesis that job change is a viable strategy for people with a history of long-term sick leave to remain on the labour market. If our results are correct, this would indicate that welfare and labour market policies should be designed to facilitate job change for people on sick leave. “Flexicurity”, which describes a balance between a flexible labour market with a high level of mobility and high levels of social security, has been adopted by the European Union as a strategy for mobility and integration on the labour market. By having flexible and reliable contractual arrangements, employers are supposed to be more willing to employ people with, for example, physical disabilities. By having an adequate and sustainable social protection system, individuals will be protected from job loss . However, as discussed above, the study has methodological limitations and the results for men are ambiguous. We do not therefore have enough evidence to be able to recommend job change as a strategy for vocational rehabilitation.
Research on the importance of job-to-job mobility among individuals with many days of sick leave is still scarce. The present study indicates that those on long-term sick leave who change workplaces, have better possibilities to stay on the labour market. Since this study is, to the best of our knowledge, the first one to investigate how job change affects the likelihood to remain on the labour market, more evidence is needed before any guidance can be given. In future studies, better measurements of differences in health, type of employment contract and other variables that might affect the conclusions in this study are desirable.
Financial support was provided by AFA Insurance.
Funding has been received from AFA Insurance. The authors declare that they have no competing interests.
KN participated in the design of the study, performed the statistical analyses, contributed to data interpretation and drafted the manuscript. KE contributed to the design of the study and the interpretation of data and participated in drafting the manuscript. TH contributed to the design of the study and the interpretation of data and participated in drafting the manuscript. GJ initiated the study, participated in the design, supervised KN in the statistical analyses and contributed to the interpretation of the data and drafting the manuscript. All authors read and approved the final manuscript. | 2019-04-24T22:37:17Z | https://bmcpublichealth.biomedcentral.com/articles/10.1186/1471-2458-14-305 |
a. The parish has an active stewardship committee that nurtures a year-round stewardship education effort. Year round stewardship education effort is nurtured by hosting a yearly stewardship fair, which is currently held at the Parish Festival, dedicating one weekend per year to each of the four pillars of stewardship, i.e. Formation Sunday, promoting and attending international, regional and diocesan conferences and workshops, and incorporating lectio divina, Liturgy of the Hours, and forms of sustained prayer into our monthly meetings.
b. The pastor has an active role on the stewardship committee. It is through the leadership of our pastor that Blessed Sacrament has embraced the New Evangelization, which has revitalized the stewardship way of life at our parish. He attends the monthly meetings of the Stewardship Council, attends the ICSC conference with council members and recruits new members for the council when needed. Father Jirak is especially dedicated to deepening the personal formation and prayer life of the members of the stewardship council.
d. The parish stewardship committee has a detailed annual plan with responsibilities on an on-going basis that is formulated with the collaboration and buy-in of other major parish councils. We have developed a yearly pdf Stewardship Calendar (219 KB) that easily transitions from one year to the next. It captures the major tasks of the Stewardship Council in a concise and functional document while allowing for the details to be executed by the creative and passionate minds of the current council members. There is intentional crossover between the membership of the Stewardship Council and other major councils in the parish so as to facilitate communication and collaboration toward the same long-term goals. For example, the chair of the Stewardship Council serves on the Pastoral Council.
e. Parish produces an annual report that reflects Stewardship throughout every area of parish life. Attached are examples of the pdf annual report (7.96 MB) . We also have included a report that was created in conjunction with " pdf Our Challenge (778 KB) ". During Our Challenge we are raising funds to provide major infrastructure repairs to the church and school buildings, replace the aging school playground, and replenish the Reserve and Replacement account. Additionally during Our Challenge, Fr. Jirak is challenging us to take our prayer life to a deeper level and to discern a fuller response in our gifts of time and talent.
a. Pastor or parish administrator shows leadership and commitment to Stewardship as a way of life. Blessed Sacrament Parish and its former pastors have been dedicated to stewardship since the beginning of the parish in 1927. Since 2010, under the direction of Fr. John Jirak, our parish has developed a renewed vigor for living the stewardship way of life. In his homilies and at parish gatherings both large and small, Fr. Jirak constantly calls our attention to the connection between stewardship and the New Evangelization. It is through our personal encounter with the Lord and the resulting desire to be in relationship with Him that the Holy Spirit fuels our fervor to be generous stewards in our daily lives. Fr. Jirak shows leadership in stewardship by attending the monthly Stewardship Council meetings, completing his own stewardship commitment forms, as well as using personal stories of family, farm and fun to inspire and challenge his parish flock.
b. The parish shows signs of a long-term commitment to Stewardship. The Church of the Blessed Sacrament along with the Diocese of Wichita made a long-term commitment to stewardship in 1985 by converting the Catholic education system from tuition-based admission to stewardship-based sponsorship. Soon after the Diocese made this change, Blessed Sacrament Pastoral Council began the practice of an annual stewardship renewal which included a stewardship fair, lay witness speakers, annual parish resource directory, and stewardship forms. Blessed Sacrament formed a Stewardship Committee in 1997, which was elevated to a parish council in 2009 and has been increasingly active since that time. In February of 2012, the parish once again solidified its commitment to stewardship by hiring a Stewardship Coordinator. Due to our steadfast belief that the New Evangelization is absolutely critical to the enduring success of stewardship, a New Evangelization Coordinator was incorporated into the parish staff in 2013.
c. The parish shows signs of spiritual growth. Over the last few years Blessed Sacrament has embraced the New Evangelization and the ardor of the Holy Spirit has truly ignited our parish.
Perpetual Adoration: In 1983 the parish of Blessed Sacrament dedicated itself to Eucharistic adoration by starting the first perpetual adoration chapel in the Diocese of Wichita. We currently have 324 committed adorers of which 19 new adorers were added in 2011, 46 new adorers in 2012, 31 new adorers in 2013 and 28 new adorers in 2014. In addition to the adorers who have a weekly committed hour, the chapel has many drop-in visitors. Sometimes it is so crowded it is difficult to find a seat.
Sacrament of Reconciliation: There has been an increase from 5 to 8 priests at each of the three penance services held during the year and 2 priests hear voluntary confessions of school age youth for 3+ hours one day a month.
Dead Theologians Society (DTS): In the fall of 2012, DTS began with 8 high school students and now has a core of 20 attendees.
A Liturgy Coordinator was added to the staff in 2014.
In 2013, to enrich and better form our new Church members, a Mystagogy program was begun. It was further enhanced in 2015 when mentors were given to each new member in the program.
Scripture Study: Before school begins on Thursday mornings approximately thirty 7th and 8th graders attend lectio divina and study the upcoming Sunday scriptures.
Spiritual Literature: Each year the parish purchases and gives as a gift 2,800 books to the attendees of Christmas and Easter Mass. In the weeks following, book study groups are formed to study the text and grow in faith together. Since we began the Book Study Program almost 1,200 parishioners and non-parishioners, who are both Catholic and non-Catholic have participated together in the book study groups. In response to requests we added two more Lighthouse Catholic Media stands.
Vocations Traveling Statue: Families can sign up to take the traveling statue to their home for a week, to pray for an increase in vocations. This statue is transferred every week to a new home so there is constant prayer coverage for vocations.
In response to the desire of the faithful for more personal relationship with our Lord, ChristLife is being initiated in the Fall of 2015.
While Familia has been an active ministry for many years at Blessed Sacrament, in 2014, Men's Familia was added as prayer and formation opportunity for the men of the parish.
Mass Captains: In addition to regular ongoing liturgical training and service, the Mass captains meet on a regular basis for opportunities to work together on service projects and to experience virtuous leisure and fraternity through which they learn to be Catholic gentlemen and leaders.
d. The parish has grown in the area of community outreach and has made outreach a major priority. Blessed Sacrament has a long history of community outreach and in the last few years, community outreach has become a major priority and passion.
Lord’s Diner: One Sunday each month approximately 45 Blessed Sacrament parishioners prepare and serve dinner to approximately 425 people. This outreach has been active for many years and in the last four years 200 new stewards have signed up for this ministry.
pdf Youth Mission Trips (134 KB) : During spring break in 2011, 19 high school students participated in a youth mission trip where they worked at food banks, spruced up inner city churches, and performed street ministry to the homeless. The following year 40 students went on the trip and it has continued ever since. In 2015, the youth went to St. Joseph's Mission in San Fidel, New Mexico, the poorest parish in the country. They took supplies to help work on the church and the school and committed not only to return on subsequent trips but also to adopt this parish and support them throughout the year.
Oktoberfest Run for the Poor: Each year on the first Saturday of October in conjunction with our Men’s Club's Oktoberfest a 5k and youth fun run are held at Blessed Sacrament to raise money for various community outreach organizations that are chosen by the Pastor. Last year there were over 600 runners, more than 100 volunteers and over $6,000 raised.
Coordinated a program that gives other parishioners the opportunity to prepare and serve a hot breakfast at a local family shelter, St. Anthony Family Shelter.
The Men’s Club monetarily supports StepStone, Kairos Prison Ministry, Midwest Catholic Family Conference, and the Sisters of the Immaculate Heart of Mary. One aspect of the Women's Altar Society fund-raiser is to create an art piece with the residents of the St. Anthony Family Shelter; it is auctioned and all the proceeds go directly to the shelter. Our parishioners support pro-life activities with Kansans for Life and the diocesan Respect Life office through Fill the Crib and Baby Bottle campaigns. Altar Society also supports pro-life organizations by hosting a Baby Jesus Shower each December to benefit local crisis pregnancy centers. Blessed Sacrament hosted a Final Friday Art event, featuring artists of the parish, at Interfaith Ministries. Many parishioners also serve the homeless through Warming Souls winter overflow shelter, an effort sponsored by Inter-faith Ministries.
e. The parish offertory has increased. The parishioners of Blessed Sacrament are generous in their gifts of treasure. We have seen a steady increase in dollars contributed to support the mission, ministries, and physical aspects of the parish. From 2010 to 2014 the gifts of treasure have increased more than 26%. We are blessed that our parish offertory remained stable while our parishioners also generously gave nearly 1.9 million dollars to the Diocesan Together Campaign.
f. Number of ministries and volunteers has grown. Since 2010 we have added 19 new ministries to meet the spiritual, social, and physical needs of the members of our parish and our community. We have added Knights of Columbus Council #15134, Military Ministry, Mystagogy, Compassionate Care Ministry, Bereavement Ministry, Little Flowers Girls Club, Familia for Men, Parish Book Program, People to People Ministry, Playgroup, Social Media, Meal Ministry for those in Need, and Junior St. Vincent de Paul (affectionately nicknamed Mini Vinnies). Additionally the following ministries have formed since 2010: 18-22 Group for young parishioners who are away at college, serving in the military, or in the workforce; Cana Couples to promote healthy and happy marriages for those married less than 15 years and Vintage Cana Couples for those married over 15 years; St. Gianna Guild for healthcare professionals and students to incorporate faith into their work; Encore to promote fellowship among parishioners 60 years of age and older; Financial Peace University to help parishioners manage their gift of treasure more effectively; and New Evangelization Task Force, to promote and encourage a personal and parish wide commitment to the New Evangelization.
St. Vincent de Paul - began with 9 members and 1 associate, now they have 35 members and 8 associates with over 100 contributing members.
g. Parish leadership attends regional, diocesan and/or ICSC offered Stewardship conferences, workshops, institutes, webinars, etc. Ongoing education and formation is essential to creating and maintaining a vibrant parish. In January 2015, Blessed Sacrament hired a part-time Faith Formation Coordinator, to provide a more robust faith formation program for adults. Each year Father Jirak and the New Evangelization Council host an annual leadership retreat for over 100 ministry leaders. The parish supports and encourages members of the parish councils to attend diocesan, regional and international conferences. 2012: 17 parishioners attended the Diocesan Stewardship Conference, 5 attended the ICSC in Chicago, and 3 attended the Parish Leadership Institute 2013: 6 parishioners attended the Regional Stewardship Conference in Kansas City, 8 attended the ICSC Conference in Dallas, 3 attended the New Evangelization Symposium at Benedictine College in Atchison, KS and 19 attended the Parish Leadership Institute 2014: 16 parishioners attended the Diocesan Stewardship Conference, 5 attended the ICSC in Orlando, 4 attended the Amazing Parish Conference in Denver, 6 attended the New Evangelization Symposium, and 8 attended the Parish Leadership Institute.
a. Describe how the parish weaves stewardship education throughout the following demographic groups. What are the elements of Stewardship education in each area below?
1) Children: Our parish provides a Catholic education to approximately 570 students in grades Kindergarten through 12th and operates a 3 and 4 year old preschool for approximately 50 students. Kindergarten through 8th grades are taught in the school that is adjacent to the church and 9th through 12th graders are sponsored at one of the diocesan Catholic high schools. We dedicate 80% of our yearly budget to education with the knowledge and intent that our Catholic schools are forming our students to be servants to the world and these young people are the stewards of the future. We use lesson plans on stewardship provided by the diocese in our school and in the Parish School of Religion (PSR) and the K-8 teachers are provided with monthly stewardship formation by the Stewardship Coordinator. While the children are preparing for service projects, the teachers and volunteers connect the project to the use and sharing of God's gifts. A visual reminder, a poster promoting stewardship, hangs in each classroom, the entry of the school, in the library and in the cafeteria. Additionally, Fr. Jirak meets with each 8th grade student during the interview process to receive sponsorship at our diocesan Catholic high school, which gives him the opportunity to tailor education and formation for each student in evangelization and the stewardship way of life.
2) Youth & Teens: Stewardship education continues through a monthly breakfast at the high school with Fr. Jirak where the 4 Pillars of Stewardship are often the basis for questions with cash prizes. Annually the Catholic high schools host a service fair where community organizations and parishes present the various opportunities for service. Preparation for the Sacrament of Confirmation is also a time when teens are taught about stewardship opportunities and commit to acts of service. Each year the Catholic high schools host a Pastor’s Day and on another occasion, the pastor meets with each Blessed Sacrament student to talk about deepening his or her relationship with Christ and living stewardship.
3) Young Adults: Graduating high school seniors write pdf letters of gratitude (181 KB) and appreciation to the parish for the opportunity to receive a Catholic education. These letters are printed in the bulletin and featured on the parish website and Facebook page. The 18-22 Group connects with parishioners who are away from home at college by sending prayers and care packages and asks for prayers for the parish in return.
4) Adults: We host annual meetings for all parents with children entering kindergarten and for parents with a child entering high school that has a portion dedicated to the history of stewardship and living stewardship in our daily lives. A dinner is held for families whose youngest child is graduating from high school, to thank and encourage them in the perpetuation of the stewardship way of life. Fr. Jirak hosts and invites leaders to attend conferences and workshops and annually our parish has a three day pdf Parish Mission (393 KB) and several one evening opportunities for spiritual growth and learning from recognized authors and speakers. The RCIA program also weaves the theme of stewardship through its learning and discernment process for those adults preparing to enter the Church. When a couple asks to be married at Blessed Sacrament, they receive one on one stewardship formation with our Stewardship Coordinator prior to meeting with a priest for marriage preparations.
5) Seniors: In addition to the other adult formation opportunities, a new ministry named Encore was launched in 2013 to provide formation and fellowship to parishioners who are 65 and older. They gather following Mass on Friday mornings for breakfast and plan a quarterly event. The group has planned a trip to Pilsen, Kansas, home of Father Emil Kapaun for September of 2015. The Encore team is in the process of providing the seniors with various needs in their homes and yards, as well as, preparing a mechanism through which the seniors can share their varied talents and skills. Another effort includes connecting the seniors of the parish with our diocesan ministry, Harvest House.
6) Various Parish Cultures: Our parish membership is limited in ethnic diversity so there is not a need to provide different or additional educational resources to accommodate various cultures. However, stewardship materials are always on hand in both Spanish and Vietnamese.
7) Overall: The love of Christ and living out stewardship is our primary focus. We use the 4 pillars of stewardship - Hospitality, Prayer, Formation, and Service - to organize our bulletin and parish resource directory, the pillars are incorporated into the ceiling of one of our gathering spaces and stewardship posters are displayed throughout our campus. Fr. Jirak writes about stewardship in his pastor’s column and reinforces stewardship as a way of life while preaching and teaching us about scripture continuously throughout the year.
a. Parish conducts an annual stewardship/commitment renewal. The annual stewardship renewal begins in June with a stewardship fair that is held in conjunction with our parish feast day, Feast of Corpus Christi, and our Parish Festival. In October we have four weekends of lay witness talks that culminate in the reception of the annual stewardship packet by mail. The forms are collected on a weekend in mid-November and brought up to the altar with the offertory gifts during Mass. Forms can be completed online, mailed, or dropped off at the parish office.
b. Samples of parish-created materials. See Samples here: pdf 2011-2012 Stewardship Packet (1.11 MB) , pdf 2012-2013 Stewardship Packet (3.23 MB) , pdf 2013-2014 Stewardship Packet, (1.49 MB) pdf 2014-2015 Stewardship Packet (727 KB) . The stewardship packet contains the Time & Talent forms, the Pledge of Tithe form, pastor's letter, prayer card, and the pdf Parish Resource Directory (6.14 MB) .
c. Review process for distributing and receiving pledge cards. Pledge cards are included with the other materials that are mailed out in late October and are collected with the Time and Talent forms.
d. Use of lay witness testimony. There are three to four weekends of lay witness talks in October/November. Each weekend focuses on a different aspect of stewardship and recounts for the parish family an individual experience of embracing Christ and living the stewardship way of life.
e. Review follow-up strategy including acknowledgements, bulletin or website updates, mid-year communication. In January, a letter is written to each parishioner who returned stewardship forms committing time, talent and treasure. This letter thanks them for their yearly commitment and lists each ministry in which they indicated interest. In addition, it encourages them to take initiative and make contact with the ministry leader or to seek out other ways they can use their gifts in the service to the Lord. Each ministry leader is given a list of parishioners who checked their ministry. The leaders are given directions on contacting the stewards, thanking them for their interest, and inviting them to participate in specific tasks and activities. Bulletin and website announcements, email communications, Facebook and Twitter posts, as well as individual meetings are all utilized in the area of follow-up. As new parishioners join the parish their gifts and areas of interest are identified after which contact information is passed along to respective ministry leaders.
f. Annual ministry fair or other ministry awareness activities conducted and ministry guidebook is produced and updated annually. The annual stewardship fair is held in conjunction with our parish feast day and Parish Festival. This event draws over 1,000 parishioners and visitors; it offers an ideal venue to celebrate our parish and to learn about all the ministries, organizations and activities the parish has to offer throughout the year. Each year a Resource Directory is updated, printed, and mailed with the stewardship renewal materials. This directory includes all the ministries, along with a description and a contact person for each ministry. It also includes the names, addresses, phone numbers, and emails for each registered parish family as well as general information on how to live the stewardship way of life.
a. Parish has dedicated Volunteer Coordinator or Stewardship Director to serve as gifts discernment leader, coach and ministry coordinator. Stewardship Coordinator has been on parish staff since February 2012 and has recently become full-time. In addition to her hours a staff member and a steward each dedicate one day a week to assist with stewardship. The position is comprised of three main components.
To meet with new parishioners and with families who seek school sponsorship. The meeting includes stewardship formation, encompassing time, talent, and treasure; listening to their “story”, assessing their gifts and helping them decide where to place those gifts at the service of the parish; helping them discern a fair tithe; and tour of the campus which concludes at the Perpetual Adoration Chapel.
To provide coaching to parishioners who are discerning their gifts or whose circumstances have changed allowing them to give their time, talent, and treasure in different amounts or capacity.
To serve as parish office liaison with all ministry leaders providing communication between the leaders and the office staff, providing training and tools, bridging the gifts of the parishioners with the needs of the ministries and connecting those parishioners with our 70+ ministry and organization leaders.
b. Parish offers a gifts discernment process to help parishioners identify their gifts and discern where best to use them for the benefit of the parish community and beyond. The process includes personal meetings with the Stewardship Coordinator, reviewing the Parish Resource Directory, completing the parish stewardship forms that include pledges of time, talent, and treasure. The Stewardship Council and Stewardship Coordinator follow up by connecting the parishioner with the ministry or organization in which he or she has indicated interest in serving.
c. Parishioners are aware of expectations of parish membership. Expectations are communicated through bulletin articles, pledge cards, covenant/stewardship prayers, challenging stewardship-themed homilies, welcome packet materials. We sincerely desire and hope that our parish is made up of disciples of Christ who yearn to be active stewards. But what is an active steward? We answer this question and communicate this to parish members in many different ways. Fr. Jirak incorporates the message of living a stewardship way of life in his homilies, letters and blog posts. We use “Stewardship by the Book” messages in the bulletin to reinforce the readings and the stewardship message. The Stewardship Coordinator sends a monthly stewardship message to all ministry leaders and parish and school staff; the message is posted in the bulletin, on the parish website and Facebook page, and in the school newsletter The Baron Buzz. The resource directory that is mailed with the renewal materials and given to new parishioners in the welcome packet defines an active steward. During pdf stewardship formation meetings (178 KB) with parishioners, the Stewardship Coordinator describes parishioners' responsibilities as active stewards.
d. Parishioners are regularly recongonized for using their gifts to serve the community. Each ministry recognizes its servants differently, some use the bulletin to offer thanks for its members, others use Facebook to add pictures and tag its ministers for the day, and others value a hand written thank you note. The Stewardship Coordinator offers an hour of Eucharistic adoration weekly for the intentions of a specific ministry leader and sends that person a thank you card. The Men's Club awards "Man of the Year" to one of its stewards each year and the Women's Altar Society hosts a Past Presidents and Volunteer Apprecaiation Dinner to honor and recognize its many stewards.
e. Ministry descriptions are used to effectively communicate expectations for serving in ministry and indicated term limits. Term limits are strongly encouraged to refresh ministries and ministers. Parish Pastoral Council, Finance Council, School Council, Men’s Club, Women’s Altar Society, and Stewardship Council practice regular rotation of leadership. Youth ministries, faith formation ministries, prayer groups, or those ministries that provide services may not have expressed term limits. We consider leaders’ gifts, energies, and strengths along with the needs of the ministry and the parish community; a defined term limit does not always serve the community best. The pastor and the Stewardship Coordinator review the ministries and organizations on a case-by-case basis to ascertain if there is a need for additional support, coaching or training, or whether new leadership is needed.
f. Leaders of ministry and formed in Stewardship and effectively follow-up and welcome parishioners as they indicate interest. The following efforts are tools which are used continuously to form ministry leaders in the stewardship way of life, as well as, to encourage evangelization and to increase prayer life.
Stewardship Conferences – all leaders are encouraged to attend the Diocesan Stewardship Conference. Stewardship Council members attend the Regional Stewardship Conference and the ICSC Conference.
Follow Up & Welcome: Leaders are given initial lists generated from the annual stewardship renewal. Instructions include contacting the stewards within 30 days. The Stewardship Council follows up with the leaders to ensure that contact has been made and to offer support. Outside the renewal period, new parishioner information is sent from the Parish Office Manager to the Welcoming Committee, Men’s Club, Women’s Altar Society, and Knights of Columbus. Representatives from these groups call and welcome the new parishioners. When new or newly-engaged parishioners indicate interest in a ministry, the Stewardship Coordinator sends that information to the leaders.
a. Describe what forms of media are used to permeate the Stewardship message throughout parish life. The stewardship message is powerful and we try to share it with everyone. We utilize all the traditional methods of communication (bulletin, mass announcements, email messages, website, mailings, posters, bulletin boards, events and telephone). More recently we have embraced the use of Social Media to broadcast messages and the response has been astonishing. The Church of the Blessed Sacrament Facebook page has gone from 308 friends in August of 2012 to 1,250 friends today. On average our pdf Facebook (519 KB) posts reach nearly 10,000 people a week. We generally begin the day with a prayer post: part of the daily readings, a quote from the Saint honored that day, or other inspirational quote. Then each day we try to also promote an upcoming event, post pictures of stewardship in action, introduce a new family, or feature a person/family receiving a Sacrament. The use of social media has made our parish family accessible, comfortable, and hospitable to people all around the world and we believe has spread the seeds of evangelization even further than we may ever know.
b. Describe any unconventional or unique communication means for reaching a higher percent of parishioners. We are reaching out to a higher percentage of the parishioners by meeting them where they are. We are now using monthly newsletters, blogs, Instagram, Pinterest, Twitter, and Tumblr as a means of communication and evangelization. Pastor emails are sent to parishioners every few weeks with relevant messages regarding parish life, stewardship and spirituality. We also post the weekend homilies on our website.
a. New parishioner orientation/official welcome/mentor families. We make every effort to be hospitable and welcoming to everyone; we realize that an impression is formed the first time the person has an interaction with a current or previous parishioner, a staff member, the website, the Facebook page, or printed materials. For our Parish Festival in 2013 we invited every household ( pdf see invite (1.89 MB) ) within our parish boundaries to join us for an outdoor Mass and an evening of food, fun and fellowship. It did not matter to us if they were members of our parish or not, we wanted everyone in the area to feel welcome at Blessed Sacrament. We made many new friends that day, some joined the parish as a result of the invitation and others became and remained our friends in Christ.
pdf Welcome Cards (375 KB) in Pews: This past Christmas and Easter we placed a welcome card in the pews inviting visitors to contact us if they would like more information about the Catholic faith, Blessed Sacrament's parish life and activities, or if they would like a call from a priest. The card is perforated so they can keep the portion with Mass and confession times along with parish contact information.
New Parishioners: Once an individual/family decides that Blessed Sacrament is the parish family they want to join, they can fill out a registration card on our website, by calling the parish office, or in person in the parish office. The Stewardship Coordinator meets with new parishioners to welcome them, give them orientation, and provide stewardship formation (See 5a above). The contact information for each new parishioner is then distributed to the Welcome Committee, and a representative of the Altar Society, Men’s Club and the Knights of Columbus. These members make phone calls, emails, or write personal notes to the new parishioners in order to invite them to an upcoming event or simply to answer a question. Quarterly dinners are held for new parishioners following the Saturday evening Mass (see invite) to serve as an opportunity for more personal interaction with Fr. Jirak and established parishioners.
b. Visitor guide/newcomer's package/gift. At the time the new parishioner registers, they are given printed materials such as the resource directory, a picture directory, a map of the campus, the parish annual report, the most recent bulletin and a card with Mass and Confession times.
c. Weekly hospitality/socialization after mass. Ushers are present at each Mass not only to assist individuals/families in finding a seat prior to Mass but also to greet people and open the doors as people enter our church. Ushers position themselves at the exits of the church at the conclusion of Mass to distribute bulletins, answer questions, and to offer well wishes for the upcoming week. Monthly there are members of the Altar Society at the exits to extend a themed Save the Date card and a personal invitation to all women to join in their next meeting or event. All parishioners are invited to coffee, donuts, bagels, and juice following the 6:30 and 9:00 AM Masses and following the 11:00 AM Mass on the first Sunday of the month. Childcare during Mass and other parish events has become of utmost importance. Adults, high school youth and middle school youth serve the parish by offering their time and talent to care for the small children of our parish family so that adults can attend meetings, bible studies, retreats, and formation opportunities.
d. Kiosk or table outside church for welcoming and ministry information distribution. For parish events such as the Parish Festival, the Parish Mission, large parish dinners, and Masses around Christmas, Easter, Confirmation and First Communion we have a group of parishioners who serve as Hospitality Hosts. They are available at these events to greet, serve, answer questions, direct traffic, open doors, carry plates or drinks, clear tables etc. At the Parish Festival the Hospitality Hosts wear bright green shirts with name tags so that they can be clearly and quickly identified as someone who can help.
e. Hospitality ministers greeting parishioners by name. Our Ushers and Hospitality Hosts understand the importance of a personal connection. They greet anyone they know by name and introduce themselves to everyone they may not recognize. Posting new parishioner pictures and information on social media allows for the entire parish to welcome newcomers by name.
f. Important days acknowledged. The Parish Christmas card, which pictures our parish priests, is one of the most anticipated mailings of the year, sometimes it is elegant, sometimes it is casual and other times it is downright funny. Every parishioner is mailed this card during the Christmas season and they are found displayed in parishioners' homes for weeks following. Ministries such as Altar Society and Men’s Club host volunteer appreciation events to thank stewards for the countless hours of time and immeasurable amount of talent given to the parish. At other times token of thanks are given by the parish staff, the ministry leaders or the priest himself (e.g. gift given to outgoing chairperson or mission speaker). Handwritten “Thank You” cards abound and lots of celebration of parish and personal successes are shared and encouraged at Blessed Sacrament.
a. Parish is an example to other parishes of similar size and is open to mentoring other parishes in the Diocese/Archdiocese. The Church of the Blessed Sacrament is filled with the Holy Spirit and its work is recognized throughout the Diocese of Wichita. The parish Stewardship Coordinator serves on the Diocesan Stewardship Advisory Council and the parish Business Manager is the chairman of the Diocesan Business Managers Association. Out of this association a parish bookkeepers group and a business manager mentoring program are being developed. Additionally, our parish has coached other parishes both within the diocese and outside of the diocese regarding the role and tasks of our Stewardship Coordinator, our welcoming process and hospitality efforts, our Parish Book Program, and our annual report. The Stewardship Council has exhibited at the Region IX Conference and the Stewardship Coordinator and New Evangelization Coordinator presented at the pdf Diocesan Stewardship Conference (2.97 MB) in April as well as at several other parishes.
b. What is unique about this parish? What lived lessons does the parish have to offer other parishes just starting to embrace Stewardship? Our parish is unique because we have discovered a way to sustain a stewardship way of life for the long term: stewardship inspired and shaped by the New Evangelization. Once a person is passionate about his relationship with Christ and strives to ever deepen this relationship, he has an unending and renewed vigor to respond to the love of Christ expressed in the life of an active steward. We would offer to other parishes that are beginning a stewardship journey to focus on developing the personal encounter with Christ and the interior life as a precursor to concentrating on time, talent, and treasure.
c. In what area does the parish have the greatest opportunity for growth in living Stewardship? Our greatest opportunity is to cooperate with the Holy Spirit and continue to integrate the new evangelization and stewardship way of life in order to reach out further to those who are not engaged in the Church. The challenge is to strengthen the infrastructure of the parish to ensure continuity & growth in all dimensions of the stewardship way of life. Accordingly, last year we began work with the Catholic Leadership Institute to create a parish priority plan. This work has included a parish-wide survey called the Disciple Maker Index and the creation of a pastoral planning team. The parish priority plan is scheduled to launch in December 2015.
1. Total offertory includes gifts of tithe and gifts designated to "Our Challenge". | 2019-04-24T12:19:14Z | https://blessedsacramentwichita.com/about/archbishop-thomas-j-murphy-award |
Powered wheelchair (PW) training involving combined navigation and reaching is often limited or unfeasible. Virtual reality (VR) simulators offer a feasible alternative for rehabilitation training either at home or in a clinical setting. This study evaluated a low-cost magnetic-based hand motion controller as an interface for reaching tasks within the McGill Immersive Wheelchair (miWe) simulator.
Twelve experienced PW users performed three navigation-reaching tasks in the real world (RW) and in VR: working at a desk, using an elevator, and opening a door. The sense of presence in VR was assessed using the iGroup Presence Questionnaire (IPQ). We determined concordance of task performance in VR with that in the RW. A video task analysis was performed to analyse task behaviours.
Compared to previous miWe data, IPQ scores were greater in the involvement domain (p < 0.05). Task analysis showed most of navigation and reaching behaviours as having moderate to excellent (K > 0.4, Cohen’s Kappa) agreement between the two environments, but greater (p < 0.05) risk of collisions and reaching errors in VR. VR performance demonstrated longer (p < 0.05) task times and more discreet movements for the elevator and desk tasks but not the door task.
Task performance showed poorer kinematic performance in VR than RW but similar strategies. Therefore, the reaching component represents a promising addition to the miWe training simulator, though some limitations must be addressed in future development.
Reaching for objects, along with manoeuvrability within confined spaces, is a key factor in powered wheelchair (PW) mobility, i.e. the ability to overcome the physical and social obstacles of daily activities . The ability to reach is necessary in a wide variety of common tasks: preparing food, working at an office, etc. Considering that PW users typically spend all their waking hours in their wheelchair [2, 3], learning how to best navigate their PW in order to reach for objects is crucial to their independence and quality of life. This advanced task-related training is often not possible in rehabilitation centers as access to training for PWs is already limited [4, 5].
Virtual reality (VR) simulators offer a highly feasible supplement for rehabilitation training either at home or in a clinical setting. Several simulators for PW are already in development [6–8]. Critical to the effectiveness of VR training is the transfer of skills to real-world scenarios [9–11]. To simulate reaching tasks for training, motion capture technology may be used to recreate the user’s manual movements in the VR environment, in real-time. In VR research, however, this usually requires large and expensive 3D cameras that are impractical for an at-home simulator [12–14]. Recent advancements in consumer-level motion-capture technology provide a low-cost and portable substitute. The focus of this study was to validate a six degree-of-freedom hand motion controller (Razer Hydra, Sixense, USA), as a training tool for reaching tasks in PW use. The Razer Hydra is a device that fits into one hand, similar in shape to a TV remote. The motion capture aspect of this device allows the user to physically control a virtual hand or cursor in 3D space with hand and arm movements. We chose this device for its low cost ($150 USD), portability, and ease of use (plug & play USB connection). This 3D hand motion controller was evaluated as an integrated tool in the miWe simulator.
An important consideration in VR research is the user’s sense of presence (SOP), i.e. the temporary suspension of disbelief such that users feel as if they were ‘in’ the VR environment . Accordingly, presence is thought to make tasks in the VR environment feel more natural and relevant to the user and therefore could enhance task training and transfer of task performance to the real world (RW) environment. The SOP can be enhanced through visual immersion in the virtual world via head mounted display or large projection screens . However, a greater degree of interactivity or the number of things that can be authentically performed in the virtual environment can also contribute to a greater SOP [15, 16]. Therefore, the addition of a 3D hand motion controller is expected to contribute to a greater SOP by providing a means of interacting with the VR environment using one’s hands.
The Hydra motion controller was integrated into the McGill Immersive Wheelchair (miWe) simulator, a VR training simulator for PW users. The miWe is a first-person perspective environment that runs on an ordinary computer. The virtual PW is controlled using a common PW joystick modified to connect to the simulator via USB. It can be used at home and is designed to teach PW users navigation and obstacle avoidance skills in the outside community. Manual tasks, such as opening doors, in the miWe were originally accomplished by keystroke. This project enabled users to physically perform such manual tasks in combination with manoeuvring their wheelchair in the simulator.
expound the way in which participants feel the combined navigation-reaching tasks, in context of the simulator, are appropriate for PW training.
This study was approved by the Institutional review board of the Interdisciplinary Research Center in Rehabilitation (CRIR), reference number CRIR-728-0412.
This study focused on the participation of experienced PW users, with a minimum of 2 years’ experience, as they were most likely to have stable behaviour and know how best to perform tasks; they were presumed to be familiar with scenarios encountered during activities of daily living. These users could provide expert opinions and feedback on the overall learning utility of the added reaching feature to the simulator from a standpoint of retrospective experience.
Participants were recruited from the Lucie Bruneau Rehabilitation Center (Canada). Participants needed to have a standard indoor/outdoor PW controlled by joystick. Other inclusion criteria consisted of: able to fully understand the tasks with a score of 13 or more on the Montreal Cognitive Assessment , have one able arm and hand for controlling the wheelchair, able to grasp at 40 cm forward and laterally, and normal or corrected vision. Potential participants were asked if they were able to perform the three tasks without assistance and only those who affirmed they could were recruited. Participants were excluded if they were unable to answer questions in French or English.
Participants provided informed consent to participate according to CRIR guidelines.
Participants provided informed consent to have their collected data published.
Participants performed three tasks in the RW and in the miWe simulator (VR). These tasks were designed to reflect a variety of hand-arm movements (pushing, pulling, turning, transporting an object) with different levels of difficulty and are illustrated in Fig. 1a.
For this task, participants began in front of the desk. On the opposite side of the desk from where the participant began were two chairs with enough space in between to fit the PW. On the left side of the desk was a desktop drawer and on the right side was a lightweight circular object. Participants were tasked with manoeuvring around the table, parking between the two chairs, opening the drawer (pulling), placing the object in the drawer (contralateral reaching, object transport), and finally closing the drawer (pushing).
Participants began diagonally away from the elevator’s door. They were tasked with manoeuvring into position to press the elevator’s call button (reaching forward or to the side), entering the elevator when the ‘door opened’ (6 s delay, indicated by auditory beep), and pressing the floor button (reaching forward or to the side).
For this task, participants began directly in front and oriented towards the door. Participants were tasked to approach the door, open the door outward (hand-arm rotation, pushing), and proceed through the doorway. The task ended when the wheelchair crossed through the doorway.
The starting environment was randomized, with 50 % of participants performing tasks in VR first. Participants performed each task 5 times in succession for each environment. After participants completed tasks in one environment, they proceeded to the second after a 5–10 min break. Instructions regarding how to perform the tasks in VR and RW were limited to the goals in the above task descriptions. Participants were encouraged to perform tasks ‘as they see fit’ and we avoided any instructions that suggested they perform tasks ‘as they normally would’ in VR.
The RW tasks took place in an open space facility with a table and doorway; for the elevator task, an elevator mock-up was used. Participants performed the RW tasks using their own PW, with maximal speed adjusted to their comfortable indoor speed. Since participants were compared to themselves, using their individually preferred speed was more accurate to their everyday performance than using a standard speed across participants. Participants were familiarized by verbal instruction and practice with each task, until they felt comfortable (approx. 15 min), before proceeding with data collection. The task order in RW was fixed to minimize time spent moving props and to keep total session time below three hours: Elevator, Desk, Door. Since these tasks are ordinary for experienced PW users, we reasoned that the order would minimally affect RW performance.
For VR, participants were seated in front of the computer monitor in their own PW (Fig. 1b). The user’s PW joystick was swivelled to the side and the simulator’s joystick was fixed, using an adjustable mounting arm, in the regular place of the PW joystick. The simulator joystick was similar to joysticks utilized by many PW models (Penny & Giles joystick, Traxsys, UK). The Hydra motion controllers (Sixense, USA) were modified with straps to be easily attached to the back of each hand. These are capable of one-to-one position and orientation tracking in 3D space. Each controller contains a magnetic sensor that interacts with a weak magnetic field produced by a base unit, providing tracking of the controller’s movement and orientation through space (accuracy of <1 mm and <1°). The advantage of this system is that it does not require line-of-sight between controller and sensor. Participants practiced navigating and interacting with objects in each virtual task (max 15 min).
For the VR tasks, environments developed for the miWe simulator included objects (doorway, desk, etc.) that were dimensional recreations of the objects used in RW; reaching and driving movements performed by the participant were translated 1:1 into the virtual world. The virtual PW was modeled as a generalized PW based on weight, acceleration, size, and directionality. We were interested in the reaching movement only and not in hand manipulations. Therefore, manual interaction in the simulator with objects was contextual and initiated by proximity, i.e. when the participant reached close enough to the object. For example, in the door task, the virtual hand would automatically grasp the door on proximity; however, the participant needed to supinate their forearm in order to rotate the handle 45°, then make a pushing gesture, which would cause the door to swing completely open.
In VR, participants generally performed the Door task first, followed by the Desk then Elevator tasks. We reasoned that while participants were given time to become familiar with the simulator, some learning effects were still likely to occur. Therefore, the Door task, as the most straight-forward task and least likely to see varied strategy, was presented first. However, the ultimate order depended on the participant; sometimes a participant had difficulty completing a given task at first—this task was revisited after completing the other tasks.
The iGroup Presence Questionnaire (IPQ) was used to determine the users’ SOP while using the miWe simulator. We used the IPQ to determine if the addition of the motion-controlled reaching interaction increased SOP for the miWe. The IPQ comprises of fourteen items in four subcategories: Spatial Presence, Involvement, Experienced Realism, and a general ‘sense of being there’ . All items are scored on a seven-point scale (0–6), with a higher score indicating a greater SOP. The IPQ has good internal consistency, with with Cronbach’s alpha of 0.87 for the complete scale and approximately 0.75 for each subscore . The IPQ was administered immediately after completing the all tasks in VR and RW.
For joystick position data in RW, we used a modified PW joystick connected to a data logging system , which sampled at 200Hz, that we mounted on the participant’s wheelchair. We also used a ceiling-mounted wide-lens Logitech HD Pro Webcam C920 (Morges, Switzerland) with an average sampling rate of 30 Hz at 1080p resolution and encoded in H.264/MPEG-4 to record video data.
For VR, the miWe simulator recorded joystick input, virtual PW position, and motion controller position and orientation at an average sampling rate of 50 Hz, corresponding to the simulator’s video frame rate.
Participant-reported data was collected from a task-specific and general questionnaire that prompted participants to provide feedback regarding usability, relevance, limitations, improvements, etc. for the simulator. The questionnaire was similar to the feedback form used in a previous miWe study . We emphasized feedback regarding the reaching component and the motion controller. The feedback form was administered immediately after the IPQ.
IPQ scores were compared to data gathered from a previous study on the miWe without the reaching component using an independent t-test . Questionnaire data were summarized with common trends.
Video and joystick data from the RW environment were time synchronized by the manual marking of the onset of first joystick movement—the task start. Task completion time was determined by task-specific criteria: closing the drawer, pressing the floor button of the elevator, and crossing through the doorway. Furthermore, time spent reaching was defined by the onset of a reaching movement towards a reaching objective to the end of returning the arm to rest or the end of task completion criteria.
In both the RW and VR environments, joystick excursion was calculated via the vector norm of x and y displacements. Joystick movements were defined as an excursion away from the neutral position (threshold of 10 %). Since the wheelchair brakes automatically engaged when the joystick was in neutral position, this definition provided a clear picture of go-stop driving patterns.
Number of reaching movements was counted by visual inspection of video data for RW tasks and from the hand position data collected from the simulator for VR (cross referenced with video data). A reaching movement was defined as ‘an effortful movement towards an object’; thus, pressing a button counted as 2 movements (reach to press and return to rest), while reaching to grasp with lateral drifting (searching behaviour) counted as one movement.
Quantitative measures were compared across participants in pairwise fashion. Data pairs (RW, VR) were the mean of the five trials per task per environment. Wilcoxon sign-rank tests were used to compare non-normally distributed continuous and count data and t-test was used for normally distributed data.
A video task analysis was performed to compare task errors and behaviours. For each task, two unblinded researchers identified and agreed on sub-tasks that comprised of a single goal, e.g. driving up to the door. Within each sub-task, two researchers independently identified (across all trials) on distinct behaviours that could vary from trial to trial. Any disagreement on these observations was solved by discussion until a consensus was reached. Each behaviour comprised of mutually exclusive options and both researchers agreed on strict contextual criteria for coding. One researcher coded all trials and a third blinded researcher verified the coding of 3 participants for consistency. Task behaviours included strategies (e.g. which hand was used for reaching) and performance characteristics (e.g. un/interrupted driving). Errors were evaluated similarly, but separately from task behaviours using relative risk assessment.
Concordance between RW and VR tasks was determined for each behaviour of each task. For a given behaviour, each participant’s dominant behaviour in RW was identified and compared to their corresponding dominant behaviour in VR. To illustrate, we may consider the behaviour, ‘drive forward or reverse into the elevator’, during the Elevator task. If the participant reversed in 5/5 times in RW and 3/5 times in VR, the dominant behaviour in both environments would be ‘reverse’. Therefore, behaviour, ‘forward/reverse in’, would be rated as concordant for the Elevator task of the participant. If, however, the participant reversed in 3/5 times in RW and 2/5 times in VR, the dominant behaviour in RW would be ‘reverse’ and the dominant behaviour in VR would be ‘forward’. Therefore, the dominant behaviour would be rated as discordant between the two environments.
Each behaviour for each participant was rated concordant/discordant (1/0); ‘dominant behaviour’ in this context was selected to describe the expert participants’ preferred behaviour and most likely reflects their ‘best practice’ for task performance in RW. We wanted to see how closely VR performance matched these behaviours. Furthermore, PW users do not always perform tasks in the same manner in RW. A VR simulator that elicits authentic behaviour should also reflect this.
where Pr(a) is the proportion of counted concordant cases and Pr(e) is the proportion of concordant cases due to ‘random chance’ behaviour, e.g. the Pr(e) of ‘used hand’ would be 0.5; for the purposes of this study, we assumed equal proportion of all identified behaviours for Pr(e). Kappa values were evaluated according to guidelines proposed by Fleiss .
Of fourteen people recruited, four women and eight men aged between 36 and 60 years (50.1 SD 9.1) participated in this study (Table 1). One person proved unable to perform our tasks independently on arrival and did not participate and another failed to appear due to prior injury. The participants had between 2 and 30 years (16.1 SD 9.7) experience using their PWs and an overall MOCA score of 20.1 SD 4.5. The right-handed to left-handed ratio was 1:1.
All participants completed all tasks for both RW and VR environments. In VR, 10 of 12 participants completed the door task first. Two participants needed to complete the session over 2 days, with one environment (VR/RW) completed on each day. In both cases, the session was delayed by difficulties adapting the PW joystick logger to the participant’s PW.
Measures of task completion time, reaching time, joystick movement count, and reaching movement count were averaged for each task for each participant. Distributions of these averages were found to be non-normal (Shapiro-Wilk, p < 0.05). Therefore, the Wilcoxon signed-rank test was appropriate for comparing paired data.
Presence was measured for the VR simulator using the IPQ; scores were normally distributed and are summarized with mean and standard deviation in Fig. 2. Overall, ‘general sense of presence’, ‘spatial presence’, and ‘realism’ averaged slightly below three; only ‘involvement’ averaged above three. In comparison with previous data collected on the miWe , without a reaching component, our results showed a significantly greater (independent t-test, p < 0.05) sense of ‘involvement’. However, scores in the remaining three categories were not significantly different.
The Elevator task took the longest total time with a median time of 24.9 s (interquartile range [IQR] 21.4—31.7 s) in RW and 57.6 s (IQR 42.6—69.2 s) in VR. The median time for the Desk task was 19.5 s (IQR 15.3—24.9 s) in RW and 52.6 s (IQR 39.4—77.4 s) in VR. The Door task took the least time overall with a median task time of 10.6 s (IQR 7.5—14.4 s) in RW and 13.4 s (IQR 42.6—69.2 s) in VR.
Only the Door task demonstrated similar task completion times with no significant difference between VR/RW (p = 0.3). For the Desk and Elevator tasks, the VR completion times were both significantly (p < 0.01) longer; the Desk task showed the greatest difference: median 33.0 s (IQR 15.4—53 s) longer to complete in VR than RW. A plot of task completion time differences is shown in Fig. 3a.
Within each task in the RW, participants spent time reaching for objects a median of 6.1 s (IQR 4.8—9.0 s) in the Desk task, 5.2 s (IQR 4.1—6.7 s) in the Elevator task, and 3.8 s (IQR 3.4—5.6 s) in the Door task. By comparison, participants spent significantly more time in VR for all three tasks (p = 0.02 for Desk, p < 0.01 for Elevator, p = 0.03 for Door). The greatest difference in reaching time was in the Desk task where participants took a median 14.2 s (IQR 4.0—19.7 s) longer for reaching in VR than in RW. A plot of reaching time differences is shown in Fig. 3b.
Figure 4a shows an example of the Elevator task performed by one participant in VR. Figure 4b shows example traces representing joystick excursion during the Elevator task in RW and in VR. The complexity of the navigation component of this task is demonstrated by the number of joystick movements. Moreover, the VR trace shows noticeably more joystick movements than in the RW counterpart.
Within each task in the RW, participants completed tasks with a median number of joystick movements of 2.7 (IQR 1.8—4.5) in the Desk task, 4.4 (IQR 3.4—6.0) in the Elevator task, and 3.6 (IQR 2.4—5.2) in the Door task. By comparison, participants utilized significantly more joystick movements in VR for the Desk task (p < 0.01) and Elevator task (p < 0.01). The greatest difference was in the Elevator task where the VR environment required a median of 8.4 (IQR 4.8—12.3) more joystick movements than in RW. However, joystick movement count was concordant between RW and VR in the Door task, with no significant difference between counts (p = 0.45). A plot of joystick movement differences is shown in Fig. 5a.
Similarly, the number of reaching movements utilized was concordant between RW and VR only for the Door task (p = 0.74). A significantly greater number of reaching movements were made in the VR environment for the Desk task (p < 0.01) and Elevator task (p = 0.04). The greatest difference was in the Desk task where the VR environment required a median of 1.9 (IQR 1.0—2.7) more reaching movements than in RW. For comparison, participants required a median count in RW of 6.3 (IQR 6.0—6.7) in the Desk task, 3.8 (IQR 3.4—4.1) in the Elevator task, and 4.1 (IQR 3.8—4.7) in the Door task. A plot of reaching movement differences is shown in Fig. 4b.
Two task errors and twenty-two behaviours were identified throughout all sub-tasks . The task errors were collisions (driving error) and errors in judgment of maximum reaching distance (reaching error). A collision was defined as any contact of the PW with an obstacle. An error in reaching distance occurred when the participant misjudged the distance required to reach a target (e.g. a button) and needed to adjust their PW position closer. Trials were divided into those where one or more driving errors occurred and those where no collisions occurred; the same procedure was done for reaching errors. For each task and across all participants, there was a significantly greater relative risk (RR, p < 0.05) of errors occurring during a trial performed in VR than in RW across all tasks: Desk (RR driving = 3.72, RR reaching = 2.93), Elevator (4.31, 5.86), Door (1.89, 1.5).
Table 2 describes all the sub-tasks identified and Table 3 describes all of the behaviours identified for each sub-task. These were developed from the task analysis for this study.
Performance in the Desk task showed fair (0.4 < K < 0.75) to excellent (K > 0.75) agreement for most reaching behaviours except for the ‘close drawer hand’. However, driving behaviours showed poor agreement. Of note, the ‘fluid drive-to-park’ behaviour showed a negative Kappa score (K = −0.17), indicating that participants tended towards the opposite behaviour in VR. Performance in the Elevator task showed generally fair agreement between RW and VR for driving and reaching behaviours. Only the ‘fluid drive-to-park’ and ‘waiting for door’ behaviours showed poor agreement. Finally, performance in the Door task showed generally fair agreement for driving and reaching behaviours except for the ‘advance straight’ and ‘fluid turn and push’ behaviours. All agreement statistics are listed in Table 4.
Participants answered additional task specific and general questions (Fig. 6) on a 5-point Likert scale (Not at all, Not very, Neutral, Somewhat, Very) and were prompted to make task specific and general suggestions and comments (Table 5) about the VR simulator.
When asked, ‘Does the task seem useful for learning to use a powered wheelchair’ in context of the VR simulator, 9/12 participants or more rated each of the tasks as somewhat or very useful. When asked, ‘Does this task seem realistic’, nearly all (10/12 or more) participants rated tasks as somewhat to very realistic. However, only 6/12 to 7/12 participants rated the difficulty of the simulator tasks as somewhat to very appropriate. Likewise, 5/12 to 6/12 participants rated the tasks as somewhat to very motivating. Finally, 10/12 participants rated the added realism due to the Hydra as somewhat to very much (Fig. 6b).
Participants’ comments regarding specific tasks and the simulator in general varied and included both positive and negative feedback. One participant commented, ‘Interesting. I like the word “success” in the end, it's motivating!’ Another participant commented, ‘I was a little stressed. I do not like playing with joysticks in a virtual environment’. Participants were also prompted to suggest other relevant tasks; one task was suggested more than once: ‘getting coffee’. A list of common comments is summarized in Table 5.
We anticipated that the inclusion of the navigate-to-reach component and the Razer Hydra 3D hand motion controller interface would increase the SOP in the miWe simulator. In the previous miWe study, where manual tasks were performed by keystroke, average scores were above three for general sense of presence and spatial presence, but below three for involvement and realism . In our study, involvement showed a significant increase in the involvement score; this likely reflects a positive effect from the added interactivity provided by the hand controllers and the increased complexity, both physically and cognitively, of combined navigation-reaching tasks. Interestingly, no significant changes were observed in the other categories. We believe that drawbacks in the implementation of the virtual environment and simulation may have counteracted potential gains from the implementation of the hand controller and reaching tasks in the general, spatial presence, and realism categories of the IPQ. Examination of participant feedback, task performance, and task strategies help elucidate how this is the case.
Participants responded positively with respect to training utility, realism, and graphical quality. The task difficulty and motivation were judged less positively, but were generally neutral or better. These results suggest that the overall design of the tasks and task environments were representative of tasks in RW. Participants’ comments also reflected frustration with the some aspects of the simulator; they indicated that VR tasks felt more difficult to accomplish than the corresponding RW tasks, particularly because controlling the PW was harder and noticeably different from what they were used to in RW. A previous study comparing PW driving in VR vs RW showed similar reactions from participants . However, several participants also commented that the reaching tasks were fun and engaging, indicating the potential for improving the motivational aspect of the simulator.
Overall, the feedback comments were ambivalent, with some participants responding very positively and others having severe difficulty with the simulator. One factor to consider in these responses is the novelty of the PW simulator, particularly with respect to the reaching component; since the study was cross-sectional, the novelty of the situation may have led to greater initial enthusiasm for those who already enjoyed VR experiences (e.g. videogames) and insufficient familiarization for those who were already anxious about VR environments. Furthermore, these data were from PW users recruited from one site in Montréal, which may limit generalizability. On the other hand, participants represented ages spanning a range of 23 years and experience ranging from 2 to 30 years; they were also providing feedback with respect to fairly rudimentary and universal tasks. In context of the participants’ SOP, their feedback regarding realism of task presentation reflects positively on their SOP. However, it seems the overall difficulty of performing the tasks in VR was likely a key factor in the lack of change in the IPQ realism score.
Participants also largely viewed the simulator as useful for learning to use a PW. It may have been some time since experienced users first learned to use their PW and may have forgotten what the specific challenges they had to go through. However, expert users will have likely experienced a wider range of situations and challenges, compared to beginners and therefore would have a more complete perspective on the learning utility of the simulator.
We compared task performance between RW and VR environments. We found that, in two of three tasks (Desk and Elevator), task completion time, time spent reaching, number of joystick movements, and number of reaching movements were all significantly greater when the task was performed in VR compared to RW. Only the Door task showed any concordant performance measures.
Joystick movements were represented by continuous deviation from the joystick neutral position and therefore reflect distinct PW manoeuvres. As such, concordant joystick movements in the Door task indicate that participants followed similar manoeuvring sequences in VR and PW; discordant joystick movements for the Desk and Elevator tasks indicate that participants navigated to objectives differently.
Few studies have directly compared PW task performance between VR and RW. Similar to our results, the study by Harrison and colleagues reported greater task completion times and a greater number of discrete manoeuvres in VR compared to RW when comparing several manoeuvring tasks and one route-finding task. However, the previous study involving the miWe simulator showed no significant difference in task completion times in 4/7 Wheelchair Skills Test type tasks and no significant difference in the number of joystick movements in 6/7 of these tasks. The authors noted that the tasks with significantly greater times and movements were the most difficult ones. Specifically, in their ‘Door (Push)’ task, participants lined up with the door, ‘pushed’ the door open, drove through, turned around, and closed the door. In comparison, our Door task required no turning and minimal manoeuvring through tight spaces. Therefore, as our simplest task, it is unsurprising that the Door task was the one that did show concordant performance in total task time and joystick control.
Our video task analysis showed a higher risk of collisions in VR compared to RW. Of note, collisions occurred in 100 % of Desk trials and 93 % of Elevator trials in VR. Similarly, Harrison and colleagues counted a total of 4 collisions over all their RW trials and 140 over all VR trials, in their manoeuvring and route-finding tasks. The authors noted that collision rates were greatest in tasks that required turning. Furthermore, Archambault and colleagues noted frequent collisions and adjustments in VR compared to RW for their most complex manoeuvring tasks. This is consistent with our results where the greatest relative risk of collisions in VR were with regard to the Desk and Elevator tasks, which required turning in tight spaces. Therefore, corrective and repeat movements for collisions likely contributed to greater task times. The poor agreement of the driving behaviours ‘advance straight’ (Door task) and ‘fluid drive-to-park’ further suggests that navigation was overall more efficient in RW than in VR.
The poorer navigation performance is reflective of the participants’ feedback regarding difficulty of control and may be explained by a number of simulator limitations. The miWe simulator has a fixed field of view (FOV) of the virtual world; the virtual camera is fixed in the forward position and participants cannot easily ‘look around’ their wheelchair to focus on obstacles. Moreover, the miWe system uses a 2D, monoscopic display instead of a 3D stereoscopic display, meaning participants lacked depth perception for judging distances to obstacles. Participants also responded on the questionnaire that the joystick control of the PW was unrealistic, e.g. wide turn radius and needing improvement in precision and accuracy. Together, these limitations make obstacle avoidance, especially in tight spaces, more challenging in VR than in RW and likely make a major contribution to the observed discordance in navigation performance.
For cognitive skills such as path finding and overall task planning, however, participants tended to adopt concordant (moderate to excellent agreement) strategies when making navigation choices in VR and RW: they generally parked in the same position relative to the reaching target and they approached the buttons on the elevator in the same relative orientation. Also, the majority of observed reaching behaviours and strategies were concordant (moderate to excellent agreement) for each task in VR and RW: participants tended to use the same hand for reaching a given object and had similar start-of-reach timing relative to parking. This suggests that, while participants may have driven less efficiently in VR compared to RW, they still performed both route finding and task planning (for navigation and reaching components) in similar ways.
Reaching movements were represented by distinct arm movements to a target. Similar to the joystick results, participants showed concordant reaching sequences in the Door task and discordant reaching sequences in the Desk and Elevator tasks.
To our knowledge, this study is the first to compare reaching performance between VR and RW in context of using a PW. However, there is much research on motor performance in VR with respect to upper-limb rehabilitation . Of note, Viau and colleagues compared motor performance and movement patterns between VR (2D display) and RW during a reach-grasp-release task. These authors reported similar overall movement strategies between the two environments, but different movement with respect to degree of elbow and wrist extension. However, other studies have demonstrated mixed results [12, 25–27]. Some of the differences in performance in VR (both 2D and 3D) have been attributed to the presence or absence of haptic feedback and display platforms .
The lack of haptic feedback and depth perception in our study likely contributed to the greater difficulty reported by participants and explain the greater number of reaching movements (Door and Elevator tasks) and reaching time (all tasks) observed in our study; one participant commented in the questionnaire that they had difficulty knowing if they had pressed the button in the Elevator task, even with the visual feedback (button lighting up). Additionally, the reaching tasks in our study differed from other studies in that the starting position of the user relative to the reaching objective was variable and dependent on the participant’s judgement; they decided where to park. As such, participants were required to accurately judge that the reaching objective was indeed within reach. Our results showed that, for all tasks, participants were more likely to misjudge this reaching distance in VR, i.e. higher relative risk of reaching errors.
Overall, the above mentioned limitations in the simulator may have contributed negatively to participants’ SOP and likely countered potential gains in the realism, spatial presence, and general sense of presence categories of the IPQ due to our implementation of the Hydra controller and combined navigation-reaching tasks. Unfortunately, it seems the greater complexity and number of features we have for a simulator, the more opportunities there are for participants to experience unrealism in some aspect of the simulator.
A potential solution for many of these issues may be the utilization of low cost consumer-level HMDs, e.g. the Oculus Rift (Oculus VR, Irvine, USA), featuring a 1080p resolution stereoscopic display, a physical 90° by 110° FOV, and head motion tracking capabilities. This would provide greater visual immersion, depth perception, and enable users to look around the virtual environment using head movements and may be implemented in future versions of the simulator.
Furthermore, the upcoming Sixense STEM system (Sixense, USA) is the next generation of the Hydra motion controller. The STEM system features small blocks that feature just the motion sensor and additional haptic feedback and could be readily implemented in the miWe. These blocks could more easily be attached to a user’s hands and the haptic feedback would increase the interactivity of reaching in the miWe.
In summary, this study on the Razer Hydra 3D motion controller provides evidence supporting its use as an interface for combined navigation-reaching tasks in the miWe simulator. SOP was increased in the involvement domain compared to the simulator without reaching; participants demonstrated concordant task behaviours and strategies and concordant kinematic performance on the least difficult task between VR and RW; and feedback from participants indicated that the combined navigation-reaching tasks were appropriate, useful for PW training, and engaging. Therefore, this device is a valid interface for training and familiarizing combined manual-navigation tasks from a task planning/strategy standpoint and may be utilized in future versions of the simulator. However, important limitations of the simulator explain discordant measures and ultimately the lackluster increases in participants’ SOP; therefore, future development of the simulator must address these issues through improved hardware and refinement of the virtual environment.
We believe that, in more complex tasks, fundamental differences between VR (e.g. PW steering characteristics, depth perception, multiple interfaces) and RW are more likely to be compounded, resulting in divergent task performances. However, it is this very capacity for complex tasks that marks a key advantage of VR simulators. It allows us to expand traditional training to include, in VR, a greater variety of stakeholder-relevant tasks, scenarios, and difficulty levels. In context of this study, we may consider any situation, at home or in the community, in which PW users would need to interact using their hands, i.e. capitalizing on the integration of a 3D had motion controller. Therefore, future development will need focus on minimizing the experiential differences, with an emphasis on difficulty optimization, from the real world. Some of these developments in the miWe are underway and reported by Archambault and colleagues .
The authors would like to thank all the participants who took part in this study. Helen Zhu and Elise Busilacchi assisted in data collection and processing. Christian Beaudoin, Frederic Bobohn, and Frederic Vicaire contributed to software development and Igor Sorokin constructed the props used in the experiment.
Gordon Tao was the recipient of a scholarship from the School of Physical and Occupational Therapy of McGill University. This project was funded in part by Le Projet Stratégique Innovant of CRIR.
GT carried out or was involved in every aspect of this project, including study design, integration of the motion controller into the simulator, design of the virtual environment, preparation of equipment and data collection space, recruitment, data collection, data processing and analysis, and manuscript preparation. PA acted in a supervisory role, providing critical feedback, assistance, and guidance at each stage of the project. He also reviewed, revised, and edited the manuscript. All authors read and approved the final manuscript.
University D. Wheelchair Skills Test (WST) Power WC - Wheelchair User, Version 4.2.2. Dalhousie University. 2013. http://www.wheelchairskillsprogram.ca/eng/. Accessed 01/08/2014 2014. | 2019-04-19T06:37:13Z | https://jneuroengrehab.biomedcentral.com/articles/10.1186/s12984-016-0112-2 |
A Crypto Currency Boom is fuelling a new startup financing market - But can it help Save The News?
So How Then Is PressCoin Going to Change any of this?
A primer on Scoop’s "ethical Paywall"
For the past couple of weeks I’ve been working behind the scenes getting to know the team behind Presscoin.com, the latest participant in the remarkable Initial Coin Offering (ICO) boom which is rocking financial markets around the world, and which may well herald an inflection point in the history of money.
Scoop Co-editor Joseph Cederwall brought PressCoin to my attention initially. And after exploring the PressCoin website and reading the white-paper, my initial impression of PressCoin – just three weeks ago- was one of admiration for the audaciousness of their plans, mixed with a healthy dose of skepticism.
As I dug deeper, and got to know the crew, I embarked on a fairly steep learning curve. To understand their plans I needed to better understand the blockchain itself (which can perhaps be most easily thought of in the case of PressCoin as trust mediation technology which can be used to facilitate cooperation) as well as the extraordinary boom in Crypto Currencies (1500% growth over the past 12 months). One of the things I quickly stumbled upon is the fact that it is in all likelihood the ICO Boom which started in earnest in July this year – that has been driving the explosion in the broader Crypto Currency market - and most spectacularly and the value of Bitcoin (BTC) the oldest and, for now, most valuable crypto-currency in the market.
The report that follows (Part one of a two part series) outlines what I have discovered in my inquiries, about PressCoin and its plans and the people and businesses behind it. It also provides some context around recent developments in the #FutureOfNews debate, to assist those who might consider investing in PressCoin to better understand the business processes the PressCoin project is hoping to address and disrupt.
And I conclude by talking briefly about why I decided to join the team working on the project.
My Conclusion: The PressCoin ICO is certainly worth consideration, and if you are interested in the future of news like I am probably worth investing a few dollars in. Hence my deciding to join the effort to help it succeed.
From what I can see most ICOs tend to be based around traditional disruptive high risk technology plans – companies hoping to be disruptive, to achieve exponential growth, and which aspire to join the ranks of the unicorns - or failing that be bought out by one of them.
PressCoin by contrast is at its heart a collaborative play, a venture which plans to build its future around assisting an existing industry to better chart its path through troubled waters in a cooperative manner.
And in a sense therefore it is a blockchain venture that plays directly to the promise inherent in this remarkable new technology - and indeed into the promise that the internet showed in its early days.
Of course like everything at the bleeding edge of this technological maelstrom, it is a high risk investment. But at the same time it has - in my view a more credible plan than most, the possibility of systemic change - albeit a remote one, plus a great spirit.
And consequently I have become a supporter and joined the team.
20 years after I started working in the online news business back in 1997, it has become blindingly obvious in the past four years that an industry which looked to have such a bright future back in 1990s is now fundamentally broken.
And it’s not simply a question of Facebook and Google eating the old media world’s lunch.
The way the traditional news industry has responded to the threat has also been fundamentally mal-adaptive. The consolidated media giants have been for the most part closed-minded, combative and competitive. The industry has rejected opportunities to join forces and form industry responses to the challenge – and continues to ignore innovative ideas even when they presented to them on a plate.
Back in 1997, when a group of four Kiwis (Peter Fowler, Ian Llewellyn, Andrew McNaughton and myself) launched NewsRoom.co.nz immediately after the first MMP (proportional representation) election in NZ of 1996, we had hopes for a bright future for our venture.
It was only a short time after the World Wide Web and its foundational language HTML had been invented by Tim Berners-Lee. The prospect of being able to publish at very low cost to a worldwide readership looked certain to herald a new golden age of news publishing. And in political and readership terms the promise of our new form of up-to-the-minute internet publishing was immediately realised.
NewsRoom, like Scoop.co.nz, digitised the in-box of NZ’s Parliament, and revolutionised the manner in which political parties talked to each other, the media and the public. Within a few short months the quality of material being produced by the participants in the democratic process had dramatically improved and we had become an invaluable part of NZ’s political nervous system.
By providing participants in the political process - especially the smaller and less powerful ones - with the ability to flag to the world their views on what ought to be done, I think we helped facilitate the massive improvement in NZ’s Parliamentary process that arrived with MMP. Within months of our launch we would often see political parties trading releases about particular issues over the course of a day. In the past such discussion would have taken several days to work its way through, as the news cycle worked on a daily or perhaps twice daily update cycle at best.
But while we disrupted - and we think improved politics - we quickly found that translating this into revenue was also difficult. NewsRoom’s main initial source of revenue was a contract to provide a news service to one of NZ’s first ISPs, ClearNet, which was later merged into TelstraClear. And when this contract was lost, the loss of revenue precipitated the fall of Newsroom 1.0.
Scoop.co.nz arose out of that early foretaste of the precariousness of digital publishing. And in the years since, I have had the benefit of a ring-side view of the ever accelerating cycles of disruption of the old-order of journalism and news publishing.
The rise of blogging and forums, the empowerment of angry "commenting" personalities set free by anonymity to express their malice, market-eating algorithmic marketing systems, the invention of the smart-phone, the rise and rise of "the platforms", and most recently the commercialisation of fake news, the segregation of points of view on Facebook (and creation of echo-chambers) and the weaponisation of news information delivery systems to attack democracy - as seen in Fake News epidemic that took place during the US 2016 presidential election.
Today as we approach the end of 2017, seven election cycles later in NZ, I can only see a very bleak future for the so-called Fourth Estate. While journalism is a things which everybody seems to acknowledge as a vital component of our democratic systems, our economic and political system appears to be unable or unwilling to support it.
Confidence in the news industry both internally - among journalists and publishers - and externally, by readers, is at an all time low. The endless cycles of journalist headcount cutting which began in the 1990s continues at pace. The ubiquity of complete nonsense and click-bait masquerading as news is painful to experience.
Meanwhile the pace of technological innovation in marketing and news delivery systems continues to accelerate, making it impossible for small independent publishers to join the game – no matter how talented they are – unless they wish to do for several years as a hobby – happen to know a millionaire - or are willing to stake their house of the gamble that they might be able to achieve what nobody else has been able to.
These days globally only the very biggest of the biggest are even close to breaking even in their digital publishing divisions. Using a combination of advertising and paywall/membership revenues – global reach and viral content delivery channels, the New York Times, Washington Post, Guardian and Daily Mail are the leaders amongst a handful of publications making a go of commercialising news in the online space.
But the reality is that all four of those publications is also propped by old-school industrial news business models, namely print advertising and cover price revenue. And all of them also started this cycle of destruction with deep reservoirs of cash reserves - most of which are now gone.
There’s also a bit of irony in the fact that the three quality journalism publishers among this group are arguably doing better right now, precisely because they have - in a sense failed in their role of informing society? The twin trans-Atlantic democratic debacles, Brexit and Trump, have been a great boon for quality news media membership models (like the Guardian’s), and a fillip to paywall subscription sales at the NYT and Washington Post.
In the event that these crises are at some point resolved, public subscription and membership revenue for all three of these publications may well start to fall again.
Meanwhile for the new generation of digital publishers, Vox, Axios, Buzzfeed, Mashable, The Intercept and Vice, the news is also not so good – even though they are definitely doing great high quality journalistic work they are beginning to hit a ceiling, after having barely taken off.
After a fairly brief flirtation by venture capital firms with new media companies in 2015 and 2016, the interest of the disrupters in the media fizzled out around the time Gawker media was killed off by Peter Thiel and Hulk Hogan. Two years on their valuations are falling and revenue targets are being reset, downwards. Buzzfeed in particular has discovered the sponsored editorial model doesn’t scale well –it turns out becoming a digital agency in this day and age can be a relatively low margin high maintenance business.
The possible exception to this is Politico, a publication which like Scoop.co.nz reports on the core democratic processes - so far in the US and the EU. Politico’s highly valued news intelligence output has secured it a special place among partially paywalled websites, distinguishing itself from other paywalled sites which serve a deep pocketed elite with the information they require to function such as the The Financial Times, The Wall Street Journal, and Bloomberg news.
None of all this has been much of a surprise to me. Over the decade since 2017 the direction of the "attention market" – wherein publishers decided they were in the business of selling the eyeballs of their readers - has been steady and remorseless - disrupting both the advertising and news industries in an equally inexorable fashion.
As technical solutions to the challenges of servicing e-commerce businesses, i.e. finding the right targeted audience were solved, the vast bulk of advertising inventory became nearly worthless.
Here in New Zealand, while the recent, and rather spectacular success of the Jennings/Murphy/Hickey NewsRoom.co.nz re-launch, and the rise and rise of TheSpinoff.co.nz are certainly bright spots in the history of digital media in NZ, their success is being achieved against the flow of the market, and will be hard to maintain.
In the end their futures will be decided by a group of perennially fickle corporate marketing managers, who will be constantly advised by their agencies that there are higher ROI [Return on Investment] options to help them deliver bottom line performance in selling widgets or whatever else they’re buying advertising to achieve.
Call me a cynic - and I hope I am wrong about this- but my experience strongly suggests that corporate organisations struggle to understand the value of association with excellence in content, no matter how well it is presented to them.
These days, news just seems so ubiquitous, so commodified. As consumers of information it almost seems oppressive at times.
And this is so in part because there is no concerted effort by the news industry to sell itself, to convince their advertising clients, corporations who rely on the success of democratic institutions and the rule of law, that the news industry is nothing more than a carrier signal for marketing messages.
Perhaps realising they are stuffed, Stuff (Formerly Fairfax) appears to have decided to continue its diversification strategy expanding its foray into the fibre-broadband market and the online video entertainment space.
This was my question when Scoop co-editor Joseph Cederwall sent me a link to the ambitious USD$100 million ICO plan a couple of weeks ago.
If the news market is so screwed, what could possibly make a difference?
Joseph lined up a call with Amit Rathore, the erstwhile leader of the PressCoin project, to explore the possibility of a collaboration between PressCoin and Scoop. Our Skype discussion - NZ/US/France - started with a brief explanation of Scoop.co.nz and its raw-news aggregation and ScoopPro business models.
Amit listened with interest and then explained his background as a founder of Quintype, a high-tech cloud based publishing platform provider which simplifies the deployment of state of the art news publishing systems.
We quickly established that Quintype may well be a good fit for the next stage of Scoop’s development.
Amit then explained that PressCoin’s vision of a way to fix the future of news was to grow a 100 million strong network of thinking and discerning readers to support a decentralised, platform based news eco-system that would serve the news needs of people who care about fate of the planet and democracy.
So far so good, but like a lot of people I was wondering how exactly this would work. How would this USD$100 million investment kick off this systemic change?
Amit was certainly saying all the right things when it came to defining the problem. But that has always been the easy part. My initial feeling was that on the solution side the story PressCoin was telling was still a bit fuzzy.
Nevertheless I was open to being convinced, and our discussion continued over the next few days.
The core business-model for PressCoin in its early stages will be Software As A Service (SaaS) subscription revenues paid by independent publishers for use of PressCoin built, shared, scalable, state of the art (data driven) publishing system. Systems which Amit is confident can be provided at a fraction of the cost publishers routinely pay when trying to build such systems via the traditional digital agency/developer model.
These services will be provided on top of the AWS (Amazon Web Services) news publisher developer-kit which Amit had previously built at Quintype. The company is now servicing a variety of different clients and serving 120 million pages of content a month. Perhaps most notable among these clients is The Quint, an Indian Huffington Post like publication in English. Fortune and Bloomberg also have deployed Quintype-powered publications.
Having spent years trying to keep up with the technology requirements in the industry, and failing, this part of the pitch made perfect business sense to me as a publisher.
And this shared data-driven technology platform approach immediately reminded me of Scandinavian news publisher Schibsted Group’s call in 2016 for the formation of a global alliance among news publishers.
In June 2016 , The Tinius Trust – which owns half of the Schibsted Group (Scandinavia’s largest newspaper publisher – and the owner of a large number of online classified market sites in the EU) – had assembled a cast of news luminaries including legendary Guardian Editor Alan Rusbridger to introduce their ideas.
They published a wonderful report dissecting both the ailments of the news industry, and proposing a solution.
Schibsted’s plan was to build a state of the art data-first publishing platform to personalise the news services provided to readers who would be, by virtue of the benefits of doing so, be encouraged to login to use the fully featured product. This would make news services functionally more like Facebook, and thereby give the news industry sufficient scale sufficiently to directly compete with Facebook and Google in advertising markets.
But Schibsted quickly discovered that asking News Companies to work together is a bit like trying to train cats to hunt mice together. The Tinius Trust’s call for a global media alliance wasn’t even reported on in Alan Rusbridger’s own newspaper.
PressCoin’s plans are more fluid than Schibsted’s but broadly similar, and focussed on a different tier in the publisher world. PressCoin hopes to help network the new and emerging publishers of the world keep up with the pace of change.
And while USD$100 million will only get you so far in developing such technology, using development teams based in India ought to make this sum of money go at least five times as far as it might go if invested in tech teams based in Stockholm.
However for me there remained a key unsolved challenge in this story.
In a market where revenue yields on advertising have been on a steady downward path for a decade – crippling every new entrant to the game before they even get started – SaaS revenue from publishers might also be difficult to grow, unless PressCoin was able to also bring to bear some other innovations to tilt the playing field in their direction.
If lowering the costs of news publishers by using shared digital infrastructure is leg one of the PressCoin vision, leg two involves enlisting the assistance of engaged readers to improve the quality of the product – and to help the network grow.
This idea also rang a few bells.
2. Dutch crowd-funded start-up De-Correspondent – which is set to launch soon in New York with what can be expected to be a fire-cracker crowd-funding campaign.
WikiTribune, which is presently operational in Beta – built on a modified WordPress platform, is providing its readers with the ability to participate in news creation by contributing articles, proposing ideas, and suggesting edits, additions and corrections to articles on the site. Article production is supervised by a staff of paid editors and journalists. It’s early days so far, but it is definitely an exciting project (which you can join here if you want to have a look inside the kitchen).
WikiTribune, like Wikipedia, presently has a reader donation funding model and the project already has a fairly large number of supporters who have committed to recurring monthly funding. This is the same business model which is powering De-Correspondent and Jeremy Scahill’s Intercepted podcast (on The Intercept, First Look Media’s investigative journalism powerhouse led by Glenn Greenwald, Jeremy Scahill and Laura Poitras and funded by billionaire Ebay founder Pierre Omidyar.
For its part De-Correspondent is a reporter’s dream, a publisher built by writers for readers who value quality thoughtful content from subject specialist reporters. Their model is also reader funded, and includes baked in opportunities for informed readers to help shape the news agenda via facilitated engagements with reporters and newsletters. There is much more to its very well thought out approach that can be explored here.
Given that PressCoin is a crypto-currency based project, it is unsurprising that Amit’s vision for facilitating reader assistance is blockchain based.
Amit’s plan is to provide for blockchain tools to be integrated into publishing platforms to reward engaged readers for their "mid-funnel" assistance with the news publishing and distribution process. This could range from submitting stories, and tips, to fact-checking, collecting source material from the scene of a news event, and sharing material on Social media.
Rewards would be securely and transparently tracked using the Blockchain and delivered in the form of PressCoin tokens.
While I have some skepticism about how well monetary incentives work in such circumstances, I can see very clear value in a cross publisher karma system to enable engaged and clever readers to move about a news universe and assist publishers in subjects they are expert in.
In addition, paying for assistance in crypto-currency is all very well, but will the PressCoin tokens be worth anything?
The facility of PressCoin for the purpose of making a new market for news will be backed up by provision of a real-money/PressCoin gateway via an associated project which lends quite a lot of credibility to the PressCoin project.
CointypeX is a brand new Cryptocurrency exchange with an integrated Swiss Bank, featuring super-low transaction fees on transfers, payments and even fiat foreign exchange. CointypeX was built by a team of Wall St. technologists with experience in high-frequency trading, and investors in PressCoin are being encouraged to open up their crypto wallets inside this new exchange.
In addition, PressCoin’s NEWS tokens are backed with share in ownership of the PressCoin platform company itself – PressCoin PLC - which makes it entirely different than most of the new ICOs presently being issued, some of which have no real asset lying behind them at all.
By providing an external market to price PressCoin, and encouraging PressCoin transactions within its eco-system, it should be possible for PressCoin network publishers and technology providers to start trading internally to build network connections – for example by building a web-traffic exchange to direct readers to related websites and content - and to pay writers, designers, technologists and sales commissions for referrals with PressCoin earned from the sale of advertising and subscriptions.
Crowd-funding will also be able to be carried out using PressCoin for finance, and if the PressCoin marketplace achieves sufficient liquidity the value of PressCoin could start to rise independently of the value of the underlying business that it sits on.
This aspect of the Initial Coin Offering method of funding a networked platform business is a fascinating aspect to the economics of crypto currencies and I plan to discuss this in part two of this report.
This was the part of PressCoin’s vision that initially had me excited, albeit for somewhat self-interested reasons, in relation to Scoop.co.nz.
As readers of Scoop.co.nz will know, we have developed a novel way to fund our public interest news services - our Ethical Paywall and our raw news publication model. These are approaches to news revenue generation that we are very keen to accelerate and see used for funding more quality public interest journalism.
A couple of months ago the Scoop team even began internal discussions around planning a crowd-equity raising - a project we called Scoop 3.0 - to provide us with funds to develop a new cloud based SaaS version of Scoop, one which could be deployed by small groups of entrepreneurial reporters and technologists in other jurisdictions.
PressCoin’s support and the Quintype technology suite - if it works as advertised - would enable us to massively accelerate this path. it was therefore very exciting to see the support of projects like this in their roadmap.
Scoop’s "Ethical Paywall" is so-named - using Fair/Ethical trade parlance - because it addresses the market failures for two groups in the news supply chain : a) journalists and publishers who can’t get paid; and b) readers who are increasingly finding themselves on the wrong-side of paywalls which prevent them from reading articles they need to access to fulfil their obligations as informed voters.
"help create a polis trained to participate generatively in the public sphere"
After our initial conversation I followed up to Amit with a written description of Scoop.co.nz’s "Ethical Paywall" and raw news publishing approach to news monetisation.
I pitched the idea as a good fit for PressCoin’s objectives – a business model which is neither advertising nor member funded, and one which is by its very nature decentralised and which results in an open website that can serve the public interest.
In May 2015, responding to a precipitous collapse in advertising revenue yields after NZ’s 2014 General Election Scoop.co.nz introduced a novel news monetisation model which we originally called an "invisible paywall". Invisible because we don’t actually have a paywall at all – and a paywall because we require professional users of Scoop to pay to access the site.
the ability to reach, through Scoop, a high quality audience of decision-makers with their news releases.
Our funding model incentivises us to produce content which is useful for our paying institutional and organisation readers – and this content is by default also useful for society as a whole, and is unlikely to be very click-bait like.
When we introduced the idea we thought we had a pretty marginal chance of success – I put our odds of succeeding at around 10% at the beginning of 2015. But thanks to the amazing support of our readers, who donated more than $150,000 in crowd-funding campaigns to enable us to make the transition over a two year period, by May 2017 we had grown our licensed professional user base to 180 organisations and were within sight of reaching our goal, advertising-free sustainability.
Amit sent off our proposal to his collaborators for their consideration and invited me to assist with the effort to put PressCoin together.
At which point I began to meet the PressCoin team.After a week of working with them I confess that I am growing rather fond of their way of doing business.
First of all Amit Rathore, the driving force behind the PressCoin project.
A technologist first and foremost – and a remarkably adept one on the basis of what I have seen – Amit is also a very open, down to earth, accessible and kind person. He seems to be very genuinely concerned for the future of the planet and of its people just as I am.
Based in San Mateo California Amit coordinates the work of the PressCoin ICO team, which at this point numbers about 20, and is and based in at least four countries, India, the UK, the UK and France (me).
Early on in my engagement with Amit I pushed him a little to help him prepare for what it will be like if an investigative journalist decides to have a go at him about the ICO funding model. Amit responded very naturally and confidently, albeit a little tersely. My impression at this point is that he comes more from the Tim O’Reilly/Craig Newmark mould of entrepreneurs, as opposed to the Mark Zuckerberg/Steve Jobs one.
My introduction to Amit’s team came shortly after we spoke, and initially via the online collaboration tool Slack. To get to know their community PressCoin had simply set up an open slack instance and invited all-comers to talk to them directly. A very open start-up approach. Inside Slack I soon met Amit’s cousin Manshu Rathore, an ex-Quintype engineer, who is based in India, very helpful, and as far as I can tell doesn’t sleep.
Next I met Andreas Stenzel, who lives near Amit and whose kids play together, Andreas is managing the paid marketing side of the launch using an impressive array of spreadsheets - another very down to earth, open and competent, experienced technology industry person.
I next met two more of the founders – Andrew Markell and Gunther Sonnenfeld, who are also partners of Amit’s in another related venture, HigherOrderVC, a VC company which is focussing on Blockchain technologies for "Enlightened Value Creation". Andrew and Gunther are busy working behind the scenes to line up high net-worth investors in the PressCoin ICO.
For some considerable time Gunther has been working closely with Journalist Dr Nafeez Ahmed, whose INSURGE Intelligence investigative journalism platform is the initial flagship platform for the PressCoin crypto-economy. A beta version of the platform is online and a working version is expected to be launched early in the new year.
Nafeez is an experienced investigative journalist whose work Scoop had the privilege of publishing as early as 2002.
Over a skype call from the Geneva waterfront I talked with Andrew and Gunther for some time about the amazing rise in the price of Bitcoin. I was quickly brought up to speed with various theories on the remarkable events of the past few months in the cryptocurrency world.
Finally I have conversed via IRC with, albeit not yet met by voice or video conference, another of PressCoin’s founders Amit Bansal, a web-wizard and entrepreneur and who is the CEO of PressCoin’s NextElection platform, a new digital townhall which plans to bring the best aspects of digital communications to bear during (and after) elections everywhere, to ensure voters are fully informed about what and for whom they are voting.
More importantly, NextElection will maintain a real-time collaborative spotlight on the incumbents, relevant issues, and challengers - 24/7 - to ensure elected officials are doing their job, and their ratings are transparent. After all, as Amit likes to say, "citizens should be like politicians, remembering at all times, that there’s always a next election coming up …"
And it’s worth mentioning that one of the team members I haven’t yet met is a leading fintech player and who is the genius behind Cointype and CointypeX.
So all in all a pretty impressive team.
But right now the pressure is coming on the PressCoin team, fast and hard. The next 28 days will be a baptism of fire.
To get to USD$100 million will be a remarkable feat, and this team has its work cut out for it. If successful this will be unquestionably the largest initial public fund-raise of any new-media venture ever.
The ICO proper opened today.
India was the first jurisdiction where investors are able invest directly using fiat currency – and the fiat investment gateway is now open. This allows. investors to purchase NEWS tokens directly in Indian Rupees (INR) without having to first create a crypto wallet and buy some other cryptocurrency. A fiat currency gateway for investors in US Dollars (USD) has now also been opened up.
In coming days pounds (GBP), Swiss Francs (CHF) and Euros (EUR) will also be able to be used to purchase NEWS tokens. In some jurisdictions in order to invest with regular fiat currencies, investors will need to prove that they are qualified investors in order to satisfy security laws.
Which highlights one of the most fascinating aspects of the ICO boom.
At its heart the PressCoin ICO is effectively an unregulated IPO, financed by the sale of a brand new currency. If it succeeds then in all likelihood investors will soon be able to purchase coffee directly from their phones with fractions of their investment – something which is hard to do with shares in Facebook or Appal and also with most other ICO tokens - most of which are not presently listed on crypto-exchanges.
The stated intention of PressCoin PLC. is to eventually seek a sharemarket listing for PressCoin, probably in the UK, with each NEWS Token mapping to a share in the new company on the London Stock Exchange.
So will PressCoin succeed in this crowd-sale?
Obviously time will tell. The ICO closes on January 8th, and if everything goes to plan PressCoin’s NEWS tokens will then be immediately tradeable on the CointypeX exchange.
While I have no idea whether it will succeed, I would certainly like it to do so, and not only because it may benefit Scoop.co.nz.
If there hadn’t been a bunch of recent ICOs for similar amount of money with significantly less substance behind them than this one I’d have thought this a true moon-shot.
But as it is I think this one has a chance – and with the Crypto Currency Boom exploding in the headlines PressCoin’s timing appears to be perfect. And for the reasons discussed in this article, right now, I think the PressCoin plan I have seen so far to save the news industry. And potentially our planet from the scourge of misinformation.
And for all these reasons I am greatly honoured to have been invited to join the team. | 2019-04-25T02:43:40Z | http://www.scoop.co.nz/stories/HL1712/S00024/why-i-am-supporting-the-presscoin-ico-by-alastair-thompson.htm |
2008-01-31 Assigned to IGT reassignment IGT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DEWAAL, DANIEL J.
A gaming system where in one embodiment, as players play the primary games of the gaming devices, players are enabled to join one of a plurality of teams associated with a secondary team game. Each of the teams includes a plurality of players. The gaming system periodically monitors at least one factor or parameter of each player's gaming activity to determine a score for that player. In one embodiment, the scores for each of the players on each team are accumulated to determine that team's cumulative score. If a team's cumulative score reaches a winning value, the gaming system provides a prize to one or more of the players on that team. The gaming system enables players to switch from one team to another in attempt to be on a particular team when that team's cumulative score reaches a winning value.
A portion of the disclosure of this patent document contains or may contain material which is subject to copyright protection. The copyright owner has no objection to the photocopy reproduction by anyone of the patent document or the patent disclosure in exactly the form it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
Gaming machines which provide players awards in primary or base games are well known. Gaming machines generally require the player to place or make a wager to activate the primary or base game. In many of these gaming machines, the award is based on the player obtaining a winning symbol or symbol combination and based on the amount of the wager (e.g., the higher the wager, the higher the award). Symbols or symbol combinations which are less likely to occur usually provide higher awards.
Secondary or bonus games are also known in gaming machines. The secondary or bonus games usually provide an additional award to the player. Secondary or bonus games usually do not require an additional wager by the player to be activated. Secondary or bonus games are generally activated or triggered upon an occurrence of a designated triggering symbol or triggering symbol combination in the primary or base game. For instance, a bonus symbol occurring on the payline on the third reel of a three reel slot machine may trigger the secondary bonus game. When a secondary or bonus game is triggered, the gaming machines generally indicates this to the player through one or more visual and/or audio output devices, such as the reels, lights, speakers, video screens, etc. Part of the enjoyment and excitement of playing certain gaming machines is the occurrence of the secondary or bonus game (even before the player knows how much the bonus award will be). In other words, obtaining a bonus award is part of the enjoyment and excitement for players.
In recent years, gaming has become a more social leisure activity. Casinos often strive for ways to allow players to work together in gaming. Working together can create camaraderie among the players and provide an enhanced gaming experience.
It is contemplated to provide secondary games which include a group gaming aspect, wherein a plurality of players playing at linked gaming machines participate in a group event for one or more awards. In certain known gaming systems, groups of gaming machines are grouped into teams. The players playing at such gaming machines have the opportunity to participate in a shared bonus event, such as a communal bonus game provided to the players upon a triggering condition. Based upon the number of members on a team and the players' wagering history, the team can compete in the bonus event with little or no strategy. In such systems, it is often difficult for the players to understand their interest or involvement in the bonus event.
To increase player enjoyment and excitement with gaming devices, it is desirable to provide new and different games which promote interactivity among players on a team thereby enhancing the casino experience while giving players decision making ability which affects the team's eligibility for prizes.
One embodiment of the present disclosure provides a gaming system including a plurality of gaming devices which each include a primary game operable upon a wager by a player. The gaming system includes a secondary team game and enables players of the gaming devices to join one of a plurality of teams which each include a plurality of players. The gaming system monitors at least one factor or parameter of each player's gaming activity to determine a score or rank for that player. In one embodiment, the scores or ranks for each of the players are accumulated for each team. If a team's cumulative score or rank reaches a designated or winning value, the gaming system provides one or more of the players on that team a prize or designated awards. In various embodiments, the gaming system enables each of the players to switch from one team to another in attempt to be on a team when that team's cumulative score or rank reaches a winning value.
In various embodiments, each player may join a team or change teams in any suitable manner. In one embodiment, the gaming system enables the player to select their initial team. In another embodiment, the gaming system determines each player's initial team. In one embodiment, the gaming system enables the player to join a team or change teams while playing on a gaming machine of the gaming system. In another embodiment, the gaming system enables a player to join teams or change teams at another electronic device affiliated with the gaming establishment, such as a hand held device, a kiosk or a hotel room entertainment system. In another embodiment, the gaming system enables players to join or switch teams from an off-site location, such as via the Internet, as will be discussed in more detail below.
In one embodiment, the secondary game is associated with a community, group or team display device. The community, group or team display device includes a plurality of positions or locations wherein at least one of the positions or locations is associated with an award. In one such embodiment, the community or team display device is a game board which includes a plurality of positions. At least one of the positions on the game board is a winning position, and at least one of the positions is a non-winning position. In one embodiment, each of a plurality of teams associated with the secondary game is represented by a marker or symbol on the game board. The markers move to different positions on the game board based on move values which are determined by the gaming system for each of the teams. When a team's marker lands on a winning position of the game board, the gaming system provides the players of that team with an award or prize.
In one such embodiment, the gaming system provides each player playing at one of the gaming devices the opportunity to participate in or to qualify for the secondary team game. In one embodiment, if the player chooses or otherwise qualifies to participate in the secondary team game, the gaming system enables the player to join one of the teams associated with the secondary team game. Each of the teams includes or is capable of including a plurality of players. When selecting a team, the player tries to select a team when that team's marker is close to landing on a winning position on the game board. Thus, the player will have a better chance of winning an award in the secondary team game.
As the players play the primary games of their respective gaming devices, the gaming system monitors one or more factors of each player's gaming activity. For example, in various alternative embodiments, the gaming system monitors a player's wins, losses and/or the amount wagered by the player. The gaming system determines a score for each player based on the monitored factor. Based on the individual player scores determined for each of the players on a team, the gaming system determines a cumulative score for each team. The gaming system determines a move value for each team based on the determined cumulative score determined for that team. The gaming system causes the marker representing each team on the game board to move a number of positions on or around the game board based on the determined move value for that team.
In one such embodiment, the gaming system periodically determines the cumulative score for each team. In one embodiment, a time parameter is set for each team's gaming activity to be sampled. The game operator can establish the time parameter in any suitable manner. In different embodiments, the time parameter is random or is set to predetermined intervals. When the time parameter is met, the gaming system determines the cumulative score for each team and associates each team with a move value based on the determined cumulative score. The move value for each team is used to move that team's marker a number of spaces or positions on the game board. When a team's marker moves to a winning position on the game board, one or more prizes become available to the members of that team.
For example, to move one position on the game board, the gaming system requires a team to wager $1000. That is, the players on the team must collectively wager $1000 for their team to advance one position on the game board of the secondary team game. The gaming system evaluates the team's gaming activity (i.e., monitors the amounts wagered by each member of the team) at one hour intervals. The gaming system determines that, in a first hour, the members of the team have wagered $3000. Thus, the marker representing the team will move forward three positions on the game board for that one-hour interval.
In one embodiment, the gaming system enables players to change teams in an attempt to be on a team when that team's marker lands on one of the winning positions. That is, the gaming system enables players to switch teams to be on the team with the most advantageous board game position. In one such embodiment, players can change teams at any suitable or designated time. However, in various embodiments, changing teams does not guarantee a win. The players may not know which gaming activity factor or factors are being monitored to determine the players' scores. Thus, players can only guess where a particular team's marker will move next. The players estimate when and where a team's marker will move next based on how many people they think are on the team and which factors they believe are being monitored as each team member plays on his or her respective gaming device. From this estimation, a player tries to join the team she believes will land on a prize next or land on a specific prize that player wants. If the player is correct, the player has a chance to win a prize. If the player is incorrect (i.e., the marker did not move where the player thought it would), the player does not win a prize. The player can stay with the same team in attempt to win another prize, or the player can switch teams.
It should be appreciated that switching teams does not guarantee that a player will win a prize. For example, in one embodiment, the gaming system determines a move value for each team based on the total coin-in for that team within a designated time period. If too many players join a team, this could cause the move value determined for that team to dramatically increase which, in turn, could cause the team's marker to overshoot a winning position.
In this manner, the present disclosure provides an interactive game among players in which players can incorporate strategy and choice in determining which team they want to join. This enables players to have an active role while gaming and to make decisions which directly affect their ability to win an award or prize.
In different embodiments when a team marker reaches a winning position, one, a plurality, or each of the players of that team win an award. The number of awards or prizes available may be less than or equal to the number of members on the team. In one embodiment, the gaming establishment operator determines the number of awards for each winning position. In another embodiment, a player's status determines when the player can claim an award or how many awards are available to them. For example, if the team's marker lands on a winning position, the gaming system enables platinum players to claim the award first, while bronze players have to wait for a time period before claiming an award. In one embodiment, the gaming system only enables a certain number of team members to win an award. For example, the gaming system enables the first five members of the winning team that claim one of the awards to have the awards.
It should be appreciated that the awards may be any suitable types of awards including credits, gift certificates, or physical awards such as mobile telephones. In one embodiment, the gaming system queues the available awards and transfers or associates the awards with the winning positions in a first in first out manner. In this embodiment, the awards are rotated and change, resulting in the players having a degree of uncertainty as to which position a specific award is associated with. This embodiment enables players to strategize where the team's marker may land and to use strategy to change teams to try to align themselves with the team they feel has the greatest chance of winning the award the player wants.
In one alternative embodiment, the teams of the secondary game accumulate points based on the gaming activity of each team's players. In one such embodiment, when a team accumulates a winning number of points, the gaming system provides one or more players of that team with a designated award or prize. In one embodiment, the gaming system enables each of the players to switch from one team to another in attempt to be on a team when that team's accumulated number of points reaches a winning number of points. In one such embodiment, when a player switches teams, the player retains any points accumulated as a result of that player playing on the prior team. In another embodiment, the player does not keep the accumulated points when the player switches to a new team.
Accordingly, one advantage of the present disclosure is to provide an interactive team game in which players use strategy to determine which team to join and when to join such teams.
Another advantage of the present disclosure is to provide a game which enables players to make decisions which directly affect their ability to win a prize.
Additional features and advantages are described herein and will be apparent from the following Detailed Description and the figures.
FIGS. 1A and 1B are perspective views of example alternative embodiments of the gaming device of the present disclosure.
FIG. 2A is a schematic block diagram of one embodiment of an electronic configuration for one of the gaming devices disclosed herein.
FIG. 2B is a schematic block diagram of one embodiment of a network configuration for a plurality of gaming devices disclosed herein.
FIG. 3A is a flow chart illustrating one embodiment of the present disclosure.
FIG. 3B is a flow chart illustrating another embodiment of the present disclosure.
FIGS. 4A to 4G illustrate screen shots for one player who is participating in the secondary team game of one embodiment of the present disclosure.
FIG. 5 illustrates one example embodiment of the present disclosure where a plurality of gaming devices are associated with a common or shared display configured to display information relating to the secondary team game.
The present disclosure may be implemented in various configurations for gaming machines or gaming devices, including but not limited to: (1) a dedicated gaming machine or gaming device, wherein the computerized instructions for controlling any games (which are provided by the gaming machine or gaming device) are provided with the gaming machine or gaming device prior to delivery to a gaming establishment; and (2) a changeable gaming machine or gaming device, where the computerized instructions for controlling any games (which are provided by the gaming machine or gaming device) are downloadable to the gaming machine or gaming device through a data network when the gaming machine or gaming device is in a gaming establishment. In one embodiment, the computerized instructions for controlling any games are executed by at least one central server, central controller or remote host. In such a “thin client” embodiment, the central server remotely controls any games (or other suitable interfaces) and the gaming device is utilized to display such games (or suitable interfaces) and receive one or more inputs or commands from a player. In another embodiment, the computerized instructions for controlling any games are communicated from the central server, central controller or remote host to a gaming device local processor and memory devices. In such a “thick client” embodiment, the gaming device local processor executes the communicated computerized instructions to control any games (or other suitable interfaces) provided to a player.
In one embodiment, one or more gaming devices in a gaming system may be thin client gaming devices and one or more gaming devices in the gaming system may be thick client gaming devices. In another embodiment, certain functions of the gaming device are implemented in a thin client environment and certain other functions of the gaming device are implemented in a thick client environment. In one such embodiment, computerized instructions for controlling any primary games are communicated from the central server to the gaming device in a thick client configuration and computerized instructions for controlling any secondary games or bonus functions are executed by a central server in a thin client configuration.
Referring now to the drawings, two example alternative embodiments of the gaming device disclosed herein are illustrated in FIGS. 1A and 1B as gaming device 10 a and gaming device 10 b, respectively. Gaming device 10 a and/or gaming device 10 b are generally referred to herein as gaming device 10.
In the embodiments illustrated in FIGS. 1A and 1B, gaming device 10 has a support structure, housing or cabinet which provides support for a plurality of displays, inputs, controls and other features of a conventional gaming machine. It is configured so that a player can operate it while standing or sitting. The gaming device may be positioned on a base or stand or can be configured as a pub-style table-top game (not shown) which a player can operate preferably while sitting. As illustrated by the different configurations shown in FIGS. 1A and 1B, the gaming device may have varying cabinet and display configurations.
In one embodiment, as illustrated in FIG. 2A, the gaming device preferably includes at least one processor 12, such as a microprocessor, a microcontroller-based platform, a suitable integrated circuit or one or more application-specific integrated circuits (ASIC's). The processor is in communication with or operable to access or to exchange signals with at least one data storage or memory device 14. In one embodiment, the processor and the memory device reside within the cabinet of the gaming device. The memory device stores program code and instructions, executable by the processor, to control the gaming device. The memory device also stores other data such as image data, event data, player input data, random or pseudo-random number generators, pay-table data or information and applicable game rules that relate to the play of the gaming device. In one embodiment, the memory device includes random access memory (RAM), which can include non-volatile RAM (NVRAM), magnetic RAM (MRAM), ferroelectric RAM (FeRAM) and other forms as commonly understood in the gaming industry. In one embodiment, the memory device includes read only memory (ROM). In one embodiment, the memory device includes flash memory and/or EEPROM (electrically erasable programmable read only memory). Any other suitable magnetic, optical and/or semiconductor memory may operate in conjunction with the gaming device disclosed herein.
In one embodiment, part or all of the program code and/or operating data described above can be stored in a detachable or removable memory device, including, but not limited to, a suitable cartridge, disk, CD ROM, DVD or USB memory device. In other embodiments, part or all of the program code and/or operating data described above can be downloaded to the memory device through a suitable network.
In one embodiment, as discussed in more detail below, the gaming device randomly generates awards and/or other game outcomes based on probability data. In one such embodiment, this random determination is provided through utilization of a random number generator (RNG), such as a true random number generator, a pseudo random number generator or other suitable randomization process. In one embodiment, each award or other game outcome is associated with a probability and the gaming device generates the award or other game outcome to be provided to the player based on the associated probabilities. In this embodiment, since the gaming device generates outcomes randomly or based upon one or more probability calculations, there is no certainty that the gaming device will ever provide the player with any specific award or other game outcome.
In another embodiment, as discussed in more detail below, the gaming device employs a predetermined or finite set or pool of awards or other game outcomes. In this embodiment, as each award or other game outcome is provided to the player, the gaming device flags or removes the provided award or other game outcome from the predetermined set or pool. Once flagged or removed from the set or pool, the specific provided award or other game outcome from that specific pool cannot be provided to the player again. This type of gaming device provides players with all of the available awards or other game outcomes over the course of the play cycle and guarantees the amount of actual wins and losses.
In another embodiment, as discussed below, upon a player initiating game play at the gaming device, the gaming device enrolls in a bingo game. In this embodiment, a bingo server calls the bingo balls that result in a specific bingo game outcome. The resultant game outcome is communicated to the individual gaming device to be provided to a player. In one embodiment, this bingo outcome is displayed to the player as a bingo game and/or in any form in accordance with the present disclosure.
In one embodiment, as illustrated in FIG. 2A, the gaming device includes one or more display devices controlled by the processor. The display devices are preferably connected to or mounted to the cabinet of the gaming device. The embodiment shown in FIG. 1A includes a central display device 16 which displays a primary game. This display device may also display any suitable secondary game associated with the primary game as well as information relating to the primary or secondary game. The alternative embodiment shown in FIG. 1B includes a central display device 16 and an upper display device 18. The upper display device may display the primary game, any suitable secondary game associated or not associated with the primary game and/or information relating to the primary or secondary game. These display devices may also serve as digital glass operable to advertise games or other aspects of the gaming establishment. As seen in FIGS. 1A and 1B, in one embodiment, the gaming device includes a credit display 20 which displays a player's current number of credits, cash, account balance or the equivalent. In one embodiment, the gaming device includes a bet display 22 which displays a player's amount wagered. In one embodiment, as described in more detail below, the gaming device includes a player tracking display 40 which displays information regarding a player's playing tracking status.
In another embodiment, at least one display device may be a mobile display device, such as a PDA or tablet PC, that enables play of at least a portion of the primary or secondary game at a location remote from the gaming device.
The display devices may include, without limitation, a monitor, a television display, a plasma display, a liquid crystal display (LCD) a display based on light emitting diodes (LED), a display based on a plurality of organic light-emitting diodes (OLEDs), a display based on polymer light-emitting diodes (PLEDs), a display based on a plurality of surface-conduction electron-emitters (SEDs), a display including a projected and/or reflected image or any other suitable electronic device or display mechanism. In one embodiment, as described in more detail below, the display device includes a touch-screen with an associated touch-screen controller. The display devices may be of any suitable size and configuration, such as a square, a rectangle or an elongated rectangle.
The display devices of the gaming device are configured to display at least one and preferably a plurality of game or other suitable images, symbols and indicia such as any visual representation or exhibition of the movement of objects such as mechanical, virtual or video reels and wheels, dynamic lighting, video images, images of people, characters, places, things and faces of cards, and the like.
In one alternative embodiment, the symbols, images and indicia displayed on or of the display device may be in mechanical form. That is, the display device may include any electromechanical device, such as one or more mechanical objects, such as one or more rotatable wheels, reels or dice, configured to display at least one or a plurality of game or other suitable images, symbols or indicia.
As illustrated in FIG. 2A, in one embodiment, the gaming device includes at least one payment device 24 in communication with the processor. As seen in FIGS. 1A and 1B, a payment device such as a payment acceptor includes a note, ticket or bill acceptor 28 wherein the player inserts paper money, a ticket or voucher and a coin slot 26 where the player inserts money, coins, or tokens. In other embodiments, payment devices such as readers or validators for credit cards, debit cards or credit slips may accept payment. In one embodiment, a player may insert an identification card into a card reader of the gaming device. In one embodiment, the identification card is a smart card having a programmed microchip or a magnetic strip coded with a player's identification, credit totals (or related data) and other relevant information. In another embodiment, a player may carry a portable device, such as a cell phone, a radio frequency identification tag or any other suitable wireless device, which communicates a player's identification, credit totals (or related data) and other relevant information to the gaming device. In one embodiment, money may be transferred to a gaming device through electronic funds transfer. When a player funds the gaming device, the processor determines the amount of funds entered and displays the corresponding amount on the credit or other suitable display as described above.
As seen in FIGS. 1A, 1B and 2A, in one embodiment the gaming device includes at least one and preferably a plurality of input devices 30 in communication with the processor. The input devices can include any suitable device which enables the player to produce an input signal which is received by the processor. In one embodiment, after appropriate funding of the gaming device, the input device is a game activation device, such as a play button 32 or a pull arm (not shown) which is used by the player to start any primary game or sequence of events in the gaming device. The play button can be any suitable play activator such as a bet one button, a max bet button or a repeat the bet button. In one embodiment, upon appropriate funding, the gaming device begins the game play automatically. In another embodiment, upon the player engaging one of the play buttons, the gaming device automatically activates game play.
In one embodiment, one input device is a bet one button. The player places a bet by pushing the bet one button. The player can increase the bet by one credit each time the player pushes the bet one button. When the player pushes the bet one button, the number of credits shown in the credit display preferably decreases by one, and the number of credits shown in the bet display preferably increases by one. In another embodiment, one input device is a bet max button (not shown) which enables the player to bet the maximum wager permitted for a game of the gaming device.
In one embodiment, one input device is a cash out button 34. The player may push the cash out button and cash out to receive a cash payment or other suitable form of payment corresponding to the number of remaining credits. In one embodiment, when the player cashes out, a payment device, such as a ticket, payment or note generator 36 prints or otherwise generates a ticket or credit slip to provide to the player. The player receives the ticket or credit slip and may redeem the value associated with the ticket or credit slip via a cashier (or other suitable redemption system). In another embodiment, when the player cashes out, the player receives the coins or tokens in a coin payout tray. It should be appreciated that any suitable payout mechanisms, such as funding to the player's electronically recordable identification card may be implemented in accordance with the gaming device disclosed herein.
In one embodiment, as mentioned above and seen in FIG. 2A, one input device is a touch-screen 42 coupled with a touch-screen controller 44, or some other touch-sensitive display overlay to allow for player interaction with the images on the display. The touch-screen and the touch-screen controller are connected to a video controller 46. A player can make decisions and input signals into the gaming device by touching the touch-screen at the appropriate places. One such input device is a conventional touch-screen button panel.
The gaming device may further include a plurality of communication ports for enabling communication of the processor with external peripherals, such as external video sources, expansion buses, game or other displays, an SCSI port or a key pad.
In one embodiment, as seen in FIG. 2A, the gaming device includes a sound generating device controlled by one or more sounds cards 48 which function in conjunction with the processor. In one embodiment, the sound generating device includes at least one and preferably a plurality of speakers 50 or other sound generating hardware and/or software for generating sounds, such as playing music for the primary and/or secondary game or for other modes of the gaming device, such as an attract mode. In one embodiment, the gaming device provides dynamic sounds coupled with attractive multimedia images displayed on one or more of the display devices to provide an audio-visual representation or to otherwise display full-motion video with sound to attract players to the gaming device. During idle periods, the gaming device may display a sequence of audio and/or visual attraction messages to attract potential players to the gaming device. The videos may also be customized for or to provide any appropriate information.
In one embodiment, the gaming machine may include a sensor, such as a camera in communication with the processor (and possibly controlled by the processor) that is selectively positioned to acquire an image of a player actively using the gaming device and/or the surrounding area of the gaming device. In one embodiment, the camera may be configured to selectively acquire still or moving (e.g., video) images and may be configured to acquire the images in either an analog, digital or other suitable format. The display devices may be configured to display the image acquired by the camera as well as display the visible manifestation of the game in split screen or picture-in-picture fashion. For example, the camera may acquire an image of the player and the processor may incorporate that image into the primary and/or secondary game as a game image, symbol or indicia.
Gaming device 10 can incorporate any suitable wagering primary or base game. The gaming machine or device may include some or all of the features of conventional gaming machines or devices. The primary or base game may comprise any suitable reel-type game, card game, cascading or falling symbol game, number game or other game of chance susceptible to representation in an electronic or electromechanical form, which in one embodiment produces a random outcome based on probability data at the time of or after placement of a wager. That is, different primary wagering games, such as video poker games, video blackjack games, video keno, video bingo or any other suitable primary or base game may be implemented.
In one embodiment, as illustrated in FIGS. 1A and 1B, a base or primary game may be a slot game with one or more paylines 52. The paylines may be horizontal, vertical, circular, diagonal, angled or any combination thereof. In this embodiment, the gaming device includes at least one and preferably a plurality of reels 54, such as three to five reels 54, in either electromechanical form with mechanical rotating reels or video form with simulated reels and movement thereof. In one embodiment, an electromechanical slot machine includes a plurality of adjacent, rotatable reels which may be combined and operably coupled with an electronic display of any suitable type. In another embodiment, if the reels 54 are in video form, one or more of the display devices, as described above, display the plurality of simulated video reels 54. Each reel 54 displays a plurality of indicia or symbols, such as bells, hearts, fruits, numbers, letters, bars or other images which preferably correspond to a theme associated with the gaming device. In another embodiment, one or more of the reels are independent reels or unisymbol reels. In this embodiment, each independent or unisymbol reel generates and displays one symbol to the player. In one embodiment, the gaming device awards prizes after the reels of the primary game stop spinning if specified types and/or configurations of indicia or symbols occur on an active payline or otherwise occur in a winning pattern, occur on the requisite number of adjacent reels and/or occur in a scatter pay arrangement.
In an alternative embodiment, rather than determining any outcome to provide to the player by analyzing the symbols generated on any wagered upon paylines as described above, the gaming device determines any outcome to provide to the player based on the number of associated symbols which are generated in active symbol positions on the requisite number of adjacent reels (i.e., not on paylines passing through any displayed winning symbol combinations). In this embodiment, if a winning symbol combination is generated on the reels, the gaming device provides the player one award for that occurrence of the generated winning symbol combination. For example, if one winning symbol combination is generated on the reels, the gaming device will provide a single award to the player for that winning symbol combination (i.e., not based on the number of paylines that would have passed through that winning symbol combination). It should be appreciated that because a gaming device with wagering on ways to win provides the player one award for a single occurrence of a winning symbol combination and a gaming device with paylines may provide the player more than one award for the same occurrence of a single winning symbol combination (i.e., if a plurality of paylines each pass through the same winning symbol combination), it is possible to provide a player at a ways to win gaming device with more ways to win for an equivalent bet or wager on a traditional slot gaming device with paylines.
In one embodiment, the total number of ways to win is determined by multiplying the number of symbols generated in active symbol positions on a first reel by the number of symbols generated in active symbol positions on a second reel by the number of symbols generated in active symbol positions on a third reel and so on for each reel of the gaming device with at least one symbol generated in an active symbol position. For example, a three reel gaming device with three symbols generated in active symbol positions on each reel includes 27 ways to win (i.e., 3 symbols on the first reel×3 symbols on the second reel×3 symbols on the third reel). A four reel gaming device with three symbols generated in active symbol positions on each reel includes 81 ways to win (i.e., 3 symbols on the first reel×3 symbols on the second reel×3 symbols on the third reel×3 symbols on the fourth reel). A five reel gaming device with three symbols generated in active symbol positions on each reel includes 243 ways to win (i.e., 3 symbols on the first reel×3 symbols on the second reel×3 symbols on the third reel×3 symbols on the fourth reel×3 symbols on the fifth reel). It should be appreciated that modifying the number of generated symbols by either modifying the number of reels or modifying the number of symbols generated in active symbol positions by one or more of the reels, modifies the number of ways to win.
In another embodiment, the gaming device enables a player to wager on and thus activate symbol positions. In one such embodiment, the symbol positions are on the reels. In this embodiment, if based on the player's wager, a reel is activated, then each of the symbol positions of that reel will be activated and each of the active symbol positions will be part of one or more of the ways to win. In one embodiment, if based on the player's wager, a reel is not activated, then a designated number of default symbol positions, such as a single symbol position of the middle row of the reel, will be activated and the default symbol position(s) will be part of one or more of the ways to win. This type of gaming machine enables a player to wager on one, more or each of the reels and the processor of the gaming device uses the number of wagered on reels to determine the active symbol positions and the number of possible ways to win. In alternative embodiments, (1) no symbols are displayed as generated at any of the inactive symbol positions, or (2) any symbols generated at any inactive symbol positions may be displayed to the player but suitably shaded or otherwise designated as inactive.
In one embodiment wherein a player wagers on one or more reels, a player's wager of one credit may activate each of the three symbol positions on a first reel, wherein one default symbol position is activated on each of the remaining four reels. In this example, as described above, the gaming device provides the player three ways to win (i.e., 3 symbols on the first reel×1 symbol on the second reel×1 symbol on the third reel×1 symbol on the fourth reel×1 symbol on the fifth reel). In another example, a player's wager of nine credits may activate each of the three symbol positions on a first reel, each of the three symbol positions on a second reel and each of the three symbol positions on a third reel wherein one default symbol position is activated on each of the remaining two reels. In this example, as described above, the gaming device provides the player twenty-seven ways to win (i.e., 3 symbols on the first reel×3 symbols on the second reel×3 symbols on the third reel×1 symbol on the fourth reel×1 symbol on the fifth reel).
In one embodiment, to determine any award(s) to provide to the player based on the generated symbols, the gaming device individually determines if a symbol generated in an active symbol position on a first reel forms part of a winning symbol combination with or is otherwise suitably related to a symbol generated in an active symbol position on a second reel. In this embodiment, the gaming device classifies each pair of symbols which form part of a winning symbol combination (i.e., each pair of related symbols) as a string of related symbols. For example, if active symbol positions include a first cherry symbol generated in the top row of a first reel and a second cherry symbol generated in the bottom row of a second reel, the gaming device classifies the two cherry symbols as a string of related symbols because the two cherry symbols form part of a winning symbol combination.
After determining if any strings of related symbols are formed between the symbols on the first reel and the symbols on the second reel, the gaming device determines if any of the symbols from the next adjacent reel should be added to any of the formed strings of related symbols. In this embodiment, for a first of the classified strings of related symbols, the gaming device determines if any of the symbols generated by the next adjacent reel form part of a winning symbol combination or are otherwise related to the symbols of the first string of related symbols. If the gaming device determines that a symbol generated on the next adjacent reel is related to the symbols of the first string of related symbols, that symbol is subsequently added to the first string of related symbols. For example, if the first string of related symbols is the string of related cherry symbols and a related cherry symbol is generated in the middle row of the third reel, the gaming device adds the related cherry symbol generated on the third reel to the previously classified string of cherry symbols.
On the other hand, if the gaming device determines that no symbols generated on the next adjacent reel are related to the symbols of the first string of related symbols, the gaming device marks or flags such string of related symbols as complete. For example, if the first string of related symbols is the string of related cherry symbols and none of the symbols of the third reel are related to the cherry symbols of the previously classified string of cherry symbols, the gaming device marks or flags the string of cherry symbols as complete.
After either adding a related symbol to the first string of related symbols or marking the first string of related symbols as complete, the gaming device proceeds as described above for each of the remaining classified strings of related symbols which were previously classified or formed from related symbols on the first and second reels.
After analyzing each of the remaining strings of related symbols, the gaming device determines, for each remaining pending or incomplete string of related symbols, if any of the symbols from the next adjacent reel, if any, should be added to any of the previously classified strings of related symbols. This process continues until either each string of related symbols is complete or there are no more adjacent reels of symbols to analyze. In this embodiment, where there are no more adjacent reels of symbols to analyze, the gaming device marks each of the remaining pending strings of related symbols as complete.
When each of the strings of related symbols is marked complete, the gaming device compares each of the strings of related symbols to an appropriate paytable and provides the player any award associated with each of the completed strings of symbols. It should be appreciated that the player is provided one award, if any, for each string of related symbols generated in active symbol positions (i.e., as opposed to being based on how many paylines that would have passed through each of the strings of related symbols in active symbol positions).
In one embodiment, a base or primary game may be a poker game wherein the gaming device enables the player to play a conventional game of video draw poker and initially deals five cards all face up from a virtual deck of fifty-two card deck. Cards may be dealt as in a traditional game of cards or in the case of the gaming device, may also include that the cards are randomly selected from a predetermined number of cards. If the player wishes to draw, the player selects the cards to hold via one or more input device, such as pressing related hold buttons or via the touch screen. The player then presses the deal button and the unwanted or discarded cards are removed from the display and the gaming machine deals the replacement cards from the remaining cards in the deck. This results in a final five-card hand. The gaming device compares the final five-card hand to a payout table which utilizes conventional poker hand rankings to determine the winning hands. The gaming device provides the player with an award based on a winning hand and the credits the player wagered.
In another embodiment, the base or primary game may be a multi-hand version of video poker. In this embodiment, the gaming device deals the player at least two hands of cards. In one such embodiment, the cards are the same cards. In one embodiment each hand of cards is associated with its own deck of cards. The player chooses the cards to hold in a primary hand. The held cards in the primary hand are also held in the other hands of cards. The remaining non-held cards are removed from each hand displayed and for each hand replacement cards are randomly dealt into that hand. Since the replacement cards are randomly dealt independently for each hand, the replacement cards for each hand will usually be different. The poker hand rankings are then determined hand by hand and awards are provided to the player.
In one embodiment, a base or primary game may be a keno game wherein the gaming device displays a plurality of selectable indicia or numbers on at least one of the display devices. In this embodiment, the player selects at least one or a plurality of the selectable indicia or numbers via an input device such as the touch screen. The gaming device then displays a series of drawn numbers to determine an amount of matches, if any, between the player's selected numbers and the gaming device's drawn numbers. The player is provided an award based on the amount of matches, if any, based on the amount of determined matches and the number of numbers drawn.
In one embodiment, in addition to winning credits or other awards in a base or primary game, the gaming device may also give players the opportunity to win credits in a bonus or secondary game or bonus or secondary round. The bonus or secondary game enables the player to obtain a prize or payout in addition to the prize or payout, if any, obtained from the base or primary game. In general, a bonus or secondary game produces a significantly higher level of player excitement than the base or primary game because it provides a greater expectation of winning than the base or primary game and is accompanied with more attractive or unusual features than the base or primary game. In one embodiment, the bonus or secondary game may be any type of suitable game, either similar to or completely different from the base or primary game.
In one embodiment, the triggering event or qualifying condition may be a selected outcome in the primary game or a particular arrangement of one or more indicia on a display device in the primary game, such as the number seven appearing on three adjacent reels along a payline in the primary slot game embodiment seen in FIGS. 1A and 1B. In other embodiments, the triggering event or qualifying condition may be by exceeding a certain amount of game play (such as number of games, number of credits, amount of time), or reaching a specified number of points earned during game play.
In another embodiment, the gaming device processor 12 or central server 56 randomly provides the player one or more plays of one or more secondary games. In one such embodiment, the gaming device does not provide any apparent reasons to the player for qualifying to play a secondary or bonus game. In this embodiment, qualifying for a bonus game is not triggered by an event in or based specifically on any of the plays of any primary game. That is, the gaming device may simply qualify a player to play a secondary game without any explanation or alternatively with simple explanations. In another embodiment, the gaming device (or central server) qualifies a player for a secondary game at least partially based on a game triggered or symbol triggered event, such as at least partially based on the play of a primary game.
In one embodiment, the gaming device includes a program which will automatically begin a bonus round after the player has achieved a triggering event or qualifying condition in the base or primary game. In another embodiment, after a player has qualified for a bonus game, the player may subsequently enhance his/her bonus game participation through continued play on the base or primary game. Thus, for each bonus qualifying event, such as a bonus symbol, that the player obtains, a given number of bonus game wagering points or credits may be accumulated in a “bonus meter” programmed to accrue the bonus wagering credits or entries toward eventual participation in a bonus game. The occurrence of multiple such bonus qualifying events in the primary game may result in an arithmetic or exponential increase in the number of bonus wagering credits awarded. In one embodiment, the player may redeem extra bonus wagering credits during the bonus game to extend play of the bonus game.
In one embodiment, no separate entry fee or buy in for a bonus game need be employed. That is, a player may not purchase an entry into a bonus game, rather they must win or earn entry through play of the primary game thus, encouraging play of the primary game. In another embodiment, qualification of the bonus or secondary game is accomplished through a simple “buy in” by the player, for example, if the player has been unsuccessful at qualifying through other specified activities. In another embodiment, the player must make a separate side-wager on the bonus game or wager a designated amount in the primary game to qualify for the secondary game. In this embodiment, the secondary game triggering event must occur and the side-wager (or designated primary game wager amount) must have been placed to trigger the secondary game.
In one embodiment, as illustrated in FIG. 2B, one or more of the gaming devices 10 are in communication with each other and/or at least one central server, central controller or remote host 56 through a data network or remote communication link 58. In this embodiment, the central server, central controller or remote host is any suitable server or computing device which includes at least one processor and at least one memory or storage device. In different such embodiments, the central server is a progressive controller or a processor of one of the gaming devices in the gaming system. In these embodiments, the processor of each gaming device is designed to transmit and receive events, messages, commands or any other suitable data or signal between the individual gaming device and the central server. The gaming device processor is operable to execute such communicated events, messages or commands in conjunction with the operation of the gaming device. Moreover, the processor of the central server is designed to transmit and receive events, messages, commands or any other suitable data or signal between the central server and each of the individual gaming devices. The central server processor is operable to execute such communicated events, messages or commands in conjunction with the operation of the central server. It should be appreciated that one, more or each of the functions of the central controller as disclosed herein may be performed by one or more gaming device processors. It should be further appreciated that one, more or each of the functions of one or more gaming device processors as disclosed herein may be performed by the central controller.
In one embodiment, the game outcome provided to the player is determined by a central server or controller and provided to the player at the gaming device. In this embodiment, each of a plurality of such gaming devices are in communication with the central server or controller. Upon a player initiating game play at one of the gaming devices, the initiated gaming device communicates a game outcome request to the central server or controller.
In one embodiment, the central server or controller receives the game outcome request and randomly generates a game outcome for the primary game based on probability data. In another embodiment, the central server or controller randomly generates a game outcome for the secondary game based on probability data. In another embodiment, the central server or controller randomly generates a game outcome for both the primary game and the secondary game based on probability data. In this embodiment, the central server or controller is capable of storing and utilizing program code or other data similar to the processor and memory device of the gaming device.
In an alternative embodiment, the central server or controller maintains one or more predetermined pools or sets of predetermined game outcomes. In this embodiment, the central server or controller receives the game outcome request and independently selects a predetermined game outcome from a set or pool of game outcomes. The central server or controller flags or marks the selected game outcome as used. Once a game outcome is flagged as used, it is prevented from further selection from the set or pool and cannot be selected by the central controller or server upon another wager. The provided game outcome can include a primary game outcome, a secondary game outcome, primary and secondary game outcomes, or a series of game outcomes such as free games.
The central server or controller communicates the generated or selected game outcome to the initiated gaming device. The gaming device receives the generated or selected game outcome and provides the game outcome to the player. In an alternative embodiment, how the generated or selected game outcome is to be presented or displayed to the player, such as a reel symbol combination of a slot machine or a hand of cards dealt in a card game, is also determined by the central server or controller and communicated to the initiated gaming device to be presented or displayed to the player. Central production or control can assist a gaming establishment or other entity in maintaining appropriate records, controlling gaming, reducing and preventing cheating or electronic or other errors, reducing or eliminating win-loss volatility and the like.
In another embodiment, a predetermined game outcome value is determined for each of a plurality of linked or networked gaming devices based on the results of a bingo, keno or lottery game. In this embodiment, each individual gaming device utilizes one or more bingo, keno or lottery games to determine the predetermined game outcome value provided to the player for the interactive game played at that gaming device. In one embodiment, the bingo, keno or lottery game is displayed to the player. In another embodiment, the bingo, keno or lottery game is not displayed to the player, but the results of the bingo, keno or lottery game determine the predetermined game outcome value for the primary or secondary game.
In the various bingo embodiments, as each gaming device is enrolled in the bingo game, such as upon an appropriate wager or engaging an input device, the enrolled gaming device is provided or associated with a different bingo card. Each bingo card consists of a matrix or array of elements, wherein each element is designated with a separate indicia, such as a number. It should be appreciated that each different bingo card includes a different combination of elements. For example, if four bingo cards are provided to four enrolled gaming devices, the same element may be present on all four of the bingo cards while another element may solely be present on one of the bingo cards.
In operation of these embodiments, upon providing or associating a different bingo card to each of a plurality of enrolled gaming devices, the central controller randomly selects or draws, one at a time, a plurality of the elements. As each element is selected, a determination is made for each gaming device as to whether the selected element is present on the bingo card provided to that enrolled gaming device. This determination can be made by the central controller, the gaming device, a combination of the two, or in any other suitable manner. If the selected element is present on the bingo card provided to that enrolled gaming device, that selected element on the provided bingo card is marked or flagged. This process of selecting elements and marking any selected elements on the provided bingo cards continues until one or more predetermined patterns are marked on one or more of the provided bingo cards. It should be appreciated that in one embodiment, the gaming device requires the player to engage a daub button (not shown) to initiate the process of the gaming device marking or flagging any selected elements.
After one or more predetermined patterns are marked on one or more of the provided bingo cards, a game outcome is determined for each of the enrolled gaming devices based, at least in part, on the selected elements on the provided bingo cards. As described above, the game outcome determined for each gaming device enrolled in the bingo game is utilized by that gaming device to determine the predetermined game outcome provided to the player. For example, a first gaming device to have selected elements marked in a predetermined pattern is provided a first outcome of win $10 which will be provided to a first player regardless of how the first player plays in a first game and a second gaming device to have selected elements marked in a different predetermined pattern is provided a second outcome of win $2 which will be provided to a second player regardless of how the second player plays a second game. It should be appreciated that as the process of marking selected elements continues until one or more predetermined patterns are marked, this embodiment ensures that at least one bingo card will win the bingo game and thus at least one enrolled gaming device will provide a predetermined winning game outcome to a player. It should be appreciated that other suitable methods for selecting or determining one or more predetermined game outcomes may be employed.
In one example of the above-described embodiment, the predetermined game outcome may be based on a supplemental award in addition to any award provided for winning the bingo game as described above. In this embodiment, if one or more elements are marked in supplemental patterns within a designated number of drawn elements, a supplemental or intermittent award or value associated with the marked supplemental pattern is provided to the player as part of the predetermined game outcome. For example, if the four corners of a bingo card are marked within the first twenty selected elements, a supplemental award of $10 is provided to the player as part of the predetermined game outcome. It should be appreciated that in this embodiment, the player of a gaming device may be provided a supplemental or intermittent award regardless of if the enrolled gaming device's provided bingo card wins or does not win the bingo game as described above.
In another embodiment, one or more of the gaming devices are in communication with a central server or controller for monitoring purposes only. That is, each individual gaming device randomly generates the game outcomes to be provided to the player and the central server or controller monitors the activities and events occurring on the plurality of gaming devices. In one embodiment, the gaming network includes a real-time or on-line accounting and gaming information system operably coupled to the central server or controller. The accounting and gaming information system of this embodiment includes a player database for storing player profiles, a player tracking module for tracking players and a credit system for providing automated casino transactions.
In one embodiment, the gaming device disclosed herein is associated with or otherwise integrated with one or more player tracking systems. Player tracking systems enable gaming establishments to recognize the value of customer loyalty through identifying frequent customers and rewarding them for their patronage. In one embodiment, the gaming device and/or player tracking system tracks any players gaming activity at the gaming device. In one such embodiment, the gaming device includes at least one card reader 38 in communication with the processor. In this embodiment, a player is issued a player identification card which has an encoded player identification number that uniquely identifies the player. When a player inserts their playing tracking card into the card reader to begin a gaming session, the card reader reads the player identification number off the player tracking card to identify the player. The gaming device and/or associated player tracking system timely tracks any suitable information or data relating to the identified player's gaming session. Directly or via the central controller, the gaming device processor communicates such information to the player tracking system. The gaming device and/or associated player tracking system also timely tracks when a player removes their player tracking card when concluding play for that gaming session. In another embodiment, rather than requiring a player to insert a player tracking card, the gaming device utilizes one or more portable devices carried by a player, such as a cell phone, a radio frequency identification tag or any other suitable wireless device to track when a player begins and ends a gaming session. In another embodiment, the gaming device utilizes any suitable biometric technology or ticket technology to track when a player begins and ends a gaming session.
During one or more gaming sessions, the gaming device and/or player tracking system tracks any suitable information or data, such as any amounts wagered, average wager amounts and/or the time these wagers are placed. In different embodiments, for one or more players, the player tracking system includes the player's account number, the player's card number, the player's first name, the player's surname, the player's preferred name, the player's player tracking ranking, any promotion status associated with the player's player tracking card, the player's address, the player's birthday, the player's anniversary, the player's recent gaming sessions, or any other suitable data. In one embodiment, such tracked information and/or any suitable feature associated with the player tracking system is displayed on a player tracking display 40. In another embodiment, such tracked information and/or any suitable feature associated with the player tracking system is displayed via one or more service windows (not shown) which are displayed on the central display device and/or the upper display device.
In one embodiment, a plurality of the gaming devices are capable of being connected together through a data network. In one embodiment, the data network is a local area network (LAN), in which one or more of the gaming devices are substantially proximate to each other and an on-site central server or controller as in, for example, a gaming establishment or a portion of a gaming establishment. In another embodiment, the data network is a wide area network (WAN) in which one or more of the gaming devices are in communication with at least one off-site central server or controller. In this embodiment, the plurality of gaming devices may be located in a different part of the gaming establishment or within a different gaming establishment than the off-site central server or controller. Thus, the WAN may include an off-site central server or controller and an off-site gaming device located within gaming establishments in the same geographic area, such as a city or state. The WAN gaming system may be substantially identical to the LAN gaming system described above, although the number of gaming devices in each system may vary relative to each other.
In another embodiment, the data network is an internet or intranet. In this embodiment, the operation of the gaming device can be viewed at the gaming device with at least one internet browser. In this embodiment, operation of the gaming device and accumulation of credits may be accomplished with only a connection to the central server or controller (the internet/intranet server) through a conventional phone or other data transmission line, digital subscriber line (DSL), T-1 line, coaxial cable, fiber optic cable, or other suitable connection. In this embodiment, players may access an internet game page from any location where an internet connection and computer, or other internet facilitator is available. The expansion in the number of computers and number and speed of internet connections in recent years increases opportunities for players to play from an ever-increasing number of remote sites. It should be appreciated that enhanced bandwidth of digital wireless communications may render such technology suitable for some or all communications, particularly if such communications are encrypted. Higher data transmission speeds may be useful for enhancing the sophistication and response of the display and interaction with the player.
As mentioned above, in one embodiment, the present disclosure may be employed in a server based gaming system. In one such embodiment, as described above, one or more gaming devices are in communication with a central server or controller. The central server or controller may be any suitable server or computing device which includes at least one processor and a memory or storage device. In alternative embodiments, the central server is a progressive controller or another gaming machine in the gaming system. In one embodiment, the memory device of the central server stores different game programs and instructions, executable by a gaming device processor, to control the gaming device. Each executable game program represents a different game or type of game which may be played on one or more of the gaming devices in the gaming system. Such different games may include the same or substantially the same game play with different pay tables. In different embodiments, the executable game program is for a primary game, a secondary game or both. In another embodiment, the game program may be executable as a secondary game to be played simultaneous with the play of a primary game (which may be downloaded to or fixed on the gaming device) or vice versa.
In this embodiment, each gaming device at least includes one or more display devices and/or one or more input devices for interaction with a player. A local processor, such as the above-described gaming device processor or a processor of a local server, is operable with the display device(s) and/or the input device(s) of one or more of the gaming devices.
In operation, the central controller is operable to communicate one or more of the stored game programs to at least one local processor. In different embodiments, the stored game programs are communicated or delivered by embedding the communicated game program in a device or a component (e.g., a microchip to be inserted in a gaming device), writing the game program on a disc or other media, downloading or streaming the game program over a dedicated data network, internet or a telephone line. After the stored game programs are communicated from the central server, the local processor executes the communicated program to facilitate play of the communicated program by a player through the display device(s) and/or input device(s) of the gaming device. That is, when a game program is communicated to a local processor, the local processor changes the game or type of game played at the gaming device.
In another embodiment, a plurality of gaming devices at one or more gaming sites may be networked to the central server in a progressive configuration, as known in the art, wherein a portion of each wager to initiate a base or primary game may be allocated to one or more progressive awards. In one embodiment, a progressive gaming system host site computer is coupled to a plurality of the central servers at a variety of mutually remote gaming sites for providing a multi-site linked progressive automated gaming system. In one embodiment, a progressive gaming system host site computer may serve gaming devices distributed throughout a number of properties at different geographical locations including, for example, different locations within a city or different cities within a state.
In one embodiment, the progressive gaming system host site computer is maintained for the overall operation and control of the progressive gaming system. In this embodiment, a progressive gaming system host site computer oversees the entire progressive gaming system and is the master for computing all progressive jackpots. All participating gaming sites report to, and receive information from, the progressive gaming system host site computer. Each central server computer is responsible for all data communication between the gaming device hardware and software and the progressive gaming system host site computer. In one embodiment, an individual gaming machine may trigger a progressive award win. In another embodiment, a central server (or the progressive gaming system host site computer) determines when a progressive award win is triggered. In another embodiment, an individual gaming machine and a central controller (or progressive gaming system host site computer) work in conjunction with each other to determine when a progressive win is triggered, for example through an individual gaming machine meeting a predetermined requirement established by the central controller.
In one embodiment, a progressive award win is triggered based on one or more game play events, such as a symbol-driven trigger. In other embodiments, the progressive award triggering event or qualifying condition may be by exceeding a certain amount of game play (such as number of games, number of credits, or amount of time), or reaching a specified number of points earned during game play. In another embodiment, a gaming device is randomly or apparently randomly selected to provide a player of that gaming device one or more progressive awards. In one such embodiment, the gaming device does not provide any apparent reasons to the player for winning a progressive award, wherein winning the progressive award is not triggered by an event in or based specifically on any of the plays of any primary game. That is, a player is provided a progressive award without any explanation or alternatively with simple explanations. In another embodiment, a player is provided a progressive award at least partially based on a game triggered or symbol triggered event, such as at least partially based on the play of a primary game.
In one embodiment, one or more of the progressive awards are each funded via a side bet or side wager. In this embodiment, a player must place or wager a side bet to be eligible to win the progressive award associated with the side bet. In one embodiment, the player must place the maximum bet and the side bet to be eligible to win one of the progressive awards. In another embodiment, if the player places or wagers the required side bet, the player may wager at any credit amount during the primary game (i.e., the player need not place the maximum bet and the side bet to be eligible to win one of the progressive awards). In one such embodiment, the greater the player's wager (in addition to the placed side bet), the greater the odds or probability that the player will win one of the progressive awards. It should be appreciated that one or more of the progressive awards may each be funded, at least in part, based on the wagers placed on the primary games of the gaming machines in the gaming system, via a gaming establishment or via any suitable manner.
In another embodiment, one or more of the progressive awards are partially funded via a side-bet or side-wager which the player may make (and which may be tracked via a side-bet meter). In one embodiment, one or more of the progressive awards are funded with only side-bets or side-wagers placed. In another embodiment, one or more of the progressive awards are funded based on player's wagers as described above as well as any side-bets or side-wagers placed.
In one alternative embodiment, a minimum wager level is required for a gaming device to qualify to be selected to obtain one of the progressive awards. In one embodiment, this minimum wager level is the maximum wager level for the primary game in the gaming machine. In another embodiment, no minimum wager level is required for a gaming machine to qualify to be selected to obtain one of the progressive awards.
In another embodiment, a plurality of players at a plurality of linked gaming devices in a gaming system participate in a group gaming environment. In one embodiment, a plurality of players at a plurality of linked gaming devices work in conjunction with one another, such as playing together as a team or group, to win one or more awards. In one such embodiment, any award won by the group is shared, either equally or based on any suitable criteria, amongst the different players of the group. In another embodiment, a plurality of players at a plurality of linked gaming devices compete against one another for one or more awards. In one such embodiment, a plurality of players at a plurality of linked gaming devices participate in a gaming tournament for one or more awards. In another embodiment, a plurality of players at a plurality of linked gaming devices play for one or more awards wherein an outcome generated by one gaming device affects the outcomes generated by one or more linked gaming devices.
Referring now to FIG. 3A, one embodiment of the present disclosure operates according to sequence 100. In one embodiment, the gaming system of the present disclosure includes a central server or controller configured to communicate with or link to a plurality of gaming machines or gaming devices. Another embodiment of the present disclosure provides a gaming system having a plurality of linked gaming devices where one of the gaming devices functions as the central server or controller. Each of the gaming devices includes at least one primary or base game operable upon a wager by a player. In some embodiments, each gaming device has one or a plurality of different primary games. In various embodiments, the primary games of each gaming device or a plurality of the gaming devices are the same games or different games. The gaming system further includes at least one secondary team game. In one such embodiment, the secondary team game is associated with a plurality of positions, including at least one winning position and at least one non-winning position.
More specifically, as indicated by block 102, the gaming devices of the gaming system enable players to place wagers on plays of the primary games. In one embodiment, players playing the gaming devices in the gaming system have the opportunity to participate in the secondary team game, as indicated by block 104. In one such embodiment, for a player to participate in the secondary team game, the player must register for team play. In various embodiments, the player may self-register at his or her gaming device, at the customer service desk, at the player club desk, at a kiosk, or in any other suitable manner. In various embodiments, a gaming establishment employee may register one or more players for team play at the customer service desk, at the player club desk, at a kiosk, or in any other suitable manner. In these embodiments, once a player registers for team play, that player may be assigned ID information for security purposes. For example, the player may be assigned a user name and a PIN. Alternatively, the player may be required to swipe his or her player tracking card. Once logged in, the player can check status and other information related to team play.
In one embodiment, players must achieve one or more designated qualifying conditions to participate in the secondary team game. It should be appreciated that any suitable qualifier or qualification or combination of qualifications may be employed to determine a player's eligibility for team play. In one such embodiment, a method or characteristic of a player's game play or gaming activity qualifies the player for team play. In one such embodiment, the amount a player wagers determines whether the player is qualified to participate in the secondary team game. The wager qualification amount may be measured in any suitable manner.
In one embodiment, the wager qualification amount is determined by the amount a player wagers (i.e., a player's coin-in) on a single gaming device during uninterrupted game play. In another embodiment, the wager qualification amount is determined by the amount the player wagers at any gaming machine of the gaming system in an allotted time period, such as 24 hours. In another embodiment, the wager qualification amount is determined by the amount wagered on particular gaming devices or at particular gaming establishments. In another embodiment, the team play qualifier is based on the average wager per spin of the reels or play of the game.
In one embodiment, the amount a player wins determines whether the player qualifies to participate in the secondary team game. The qualification win amount may be measured in any suitable manner. In one such embodiment, the qualification win amount is determined by the amount a player wins on a single gaming device during game play. In another embodiment, the qualification win amount is determined by the amount the player wins in a designated time period, such as 24 hours. In another embodiment, the qualification win amount is determined by the amount the player wins in a certain type of game for a certain amount of time, such as the amount in slot games over a week.
In one embodiment, the amount of jackpot awards won by a player or winning a particular jackpot award determines whether the player qualifies to participate in the secondary team game. In one embodiment, winning a designated jackpot qualifies the player to participate in the secondary team game. In another embodiment, winning a certain amount from one or more jackpots qualifies the player to participate in the secondary team game. It should be appreciated that a jackpot qualifier may be determined in any suitable manner.
In one embodiment, the total amount lost by a player over a certain time period determines whether the player qualifies to participate in the secondary team game. In one embodiment, losing a designated amount qualifies the player for team play. In another type of tournament, losing a certain number of spins in a row qualifies the player for team play. This provides players with an incentive to continue playing after hitting a period of bad luck.
In various embodiments, certain game events qualify the player to participate in the secondary team game. In one embodiment, achieving a certain game score qualifies the player for team play. In another embodiment, playing a game for a certain amount of time qualifies the player for team play. In one embodiment, the gaming system enables the player to participate in the secondary team game as a bonus award. In another embodiment, a player may win entry into the secondary team game as an award in a primary or bonus game. It should be appreciated that the gaming system may determine qualification for the secondary team game based on any element or combinations of elements in any game.
In one embodiment, the qualifying condition for team play is determined based on one or more characteristics from a player tracking system or account. For example, all players of a certain rank or level may qualify for team play. In another embodiment, all new members to a player tracking system or gaming establishment receive an automatic entry into the secondary team game. In another embodiment, on a player's birthday, the gaming system enables the player to participate in the secondary team game. In another embodiment, on a player's anniversary in the player system, the gaming system enables the player to participate in the secondary team game. In one embodiment, a player tracking system includes point intervals and each time a player reaches a point interval, the player can participate the secondary team game.
In certain embodiments, the player is not required to pay an entry fee to participate in team play. In other embodiments, players must pay an entry fee to participate in the secondary team game. In one embodiment, the gaming system requires each player to pay a certain amount of money or credits to enter the secondary team game. It should be appreciated that the entry fee may be any suitable form of payment. In one embodiment, the gaming system requires the player to pay a certain amount of promotional credits which are gaming establishment funded wagering credits to enter the secondary team game. In another embodiment, the gaming system requires the player to pay a certain amount of coupons, which are redeemable and offered to the general public to enter the secondary team game. For example, in the hotel affiliated with the gaming establishment, players receive coupons or tickets to enter the secondary team game. In one such embodiment, players enter the coupons or tickets into their respective gaming devices to play the team game. In another embodiment, the gaming system requires the player to pay a certain amount of gift certificates to enter the secondary team game. In another embodiment, the gaming system requires the player to pay a certain amount in vouchers to enter the secondary team game. In another embodiment, instead of paying a fee, a player may use player tracking points to enter a secondary team game. In one embodiment, player tracking points are they only way to enter a secondary team game. It should be appreciated that the player may pay the entry fee for the secondary team game at one of the gaming machines directly, for example, by using a credit card.
It should be appreciated that the gaming system can implement any buy in or entry fee for the secondary team game in any suitable manner. It should also be appreciated that in one embodiment, some players must pay an entry fee but other players do not. In one embodiment, the amount of the secondary team game entry fee is based on the player's rank in a player tracking system. For example, a player of a platinum rank in a player tracking system does not have to pay an entry fee and a player of a gold rank must use 50 player points to enroll in the tournament.
In one embodiment, the fee is automatically deducted from the player's account once the player registers for the secondary team game. In one embodiment, this automated buy in is an option that a player may select when registering for the secondary team game.
The qualifications and entry fees of the secondary team game may be based any suitable elements and may be configured in any suitable manner.
It should be appreciated that the gaming system may require players to meet one or more designated qualifying conditions to join or switch into certain teams in the secondary game. Any suitable qualification or combination of qualifications may be employed to determine a player's eligibility to join certain teams. For example, in one embodiment, a player's eligibility to join certain teams of the secondary game is based on a wager amount placed by the player.
Referring again to FIG. 3A, as indicated by block 106, the gaming system enables each player participating in the secondary team game to join one of a plurality of teams associated with the secondary team game. Each of the teams associated with the secondary game includes or is capable of including a plurality of players at any given time. Players can join a team in a number of different ways. In one embodiment, a player can initially choose a team upon that player registering and/or qualifying for team play. In one such embodiment, the player's gaming device prompts the player to choose a team that the player wants to join. In one embodiment, the each team's current position or standing in the secondary team game is displayed to the player when the player is making the choice of which team to join. Thus, the gaming system enables a player to strategically choose which team the player wants to join based on the team's standing in the secondary game. In another embodiment, the player cannot see where each of the teams stands in the secondary team game when joining a team. In different embodiments, players may be invited to join a team or assigned to a default team upon choosing and/or qualifying to participate in team play.
In one embodiment of the present disclosure, the gaming system enables players to manage their team membership and compete in the secondary team game without having to be in the casino or gaming establishment. In one such embodiment, an Internet component is associated with the secondary team game. In one such embodiment, the gaming system enables players to manage their team membership and compete in the secondary team game by visiting a website. In such embodiments, the gaming system enables players to join teams or switch teams even if they are not in the casino. In one embodiment, the website may offer additional features to the player including, but not limited to, gaming, advertisements, shopping or any other desired feature. In certain embodiments, there may be participation requirements associated with using the website to participate in team play. For example, to remain an active member of the team, a player may be required to log in every so often, view a designated number of ads, make a designated number of purchases, or meet any another suitable requirement.
Referring again to FIG. 3A, as the players play the primary games of the gaming devices, the gaming system monitors at least one factor of each player's gaming activity to determine a score or rank for that player, as indicated by block 108. In one embodiment, the factors which may be monitored include: (1) a total amount of money wagered by the players on the team (i.e., coin in totals); (2) time; (3) player status; (4) events that occur during primary game play, such as but not limited to symbol combinations generated during game play, a designated number of wins obtained during game play, a designated number of losses obtained during game play, exceeding a certain amount of game play (e.g., number of games, number of credits, amount of time), and reaching a specified number of points earned during game play; (5) any other suitable factor; and (6) any combination of these. In various embodiments, the gaming system determines player scores based on various aspects of each player's game play, such that a player is not penalized for wagering in low denominations or wagering less frequently than other players.
As indicated by block 110, for each of the teams, the gaming system determines a cumulative score or rank based on the player scores or ranks for each player on that team. Each team's cumulative score or rank is periodically determined or sampled. In one embodiment, a time period is set for the cumulative score to be determined. The game operator has the ability to define the time period in any manner they choose. In various embodiments, the time period is determined randomly or is set to certain predetermined intervals. For example, in one embodiment, the cumulative score for each team is determined in one-hour time intervals. When the time period is met, the cumulative score for each team is determined.
After the gaming system determines the cumulative scores or ranks for the teams in the secondary game, the gaming system uses the cumulative score or rank for each team to determine how that team progresses in the secondary team game. More specifically, as indicated by block 112 of FIG. 3A, the gaming system associates a position of the secondary team game with each team based on the determined cumulative score for that team. If any of the teams are associated with a winning position, the gaming system awards prizes to one or more players on each team associated with one of the winning positions, as indicated by block 114.
Referring now to FIG. 3B, one embodiment of the present disclosure operates according to sequence 200. In one embodiment, the secondary game is associated with a community, group or team display device. The community, group or team display device includes a plurality of positions or locations wherein at least one of the positions or locations is associated with an award. In one such embodiment, the secondary team game is associated with a game board having a plurality of positions which include at least one winning position and at least one non-winning position. The winning positions are each associated with at least one prize.
As indicated by block 202, the gaming system operates with the gaming devices to enable the players to make wagers on plays of the primary games. The gaming system enables the players at the gaming devices to participate in the secondary team game, as indicated by block 204. For those players who wish to participate in the secondary team game, the gaming system enables the players to join one of a plurality of teams associated with the secondary team game, as indicated by block 206.
As indicated by block 208, the gaming system displays a game board having a plurality of positions to the players. Each team is represented by a marker on the game board. The game board monitors and displays each team's progress in the secondary team game. It should be appreciated that, in one embodiment, the secondary team game and any information relating to the secondary team game, such as the game board, is displayed to each player on his or her individual gaming device. In other embodiments, instead of or in addition to displaying the secondary team game on the individual gaming devices, the gaming system is associated with a shared display configured to display information relating to the secondary team game, as will be discussed below.
As the players play the primary games of the gaming devices, the gaming system monitors at least one factor of each player's gaming activity to determine a score for that player, as indicated by block 210. The gaming system determines a move value for each team based on the player scores for each player of that team, as indicated by block 212.
As indicated by block 214, the gaming system causes each team's marker to move a certain number of spaces or positions on the game board based on the move value determined for that team. For each team whose marker moves to a winning position on the game board, the gaming system provides one or more players on that team with a prize associated with the winning position on which the team's marker landed, as indicated by block 216. In one alternative embodiment, rather than requiring a team's marker to land directly on one of the winning positions of the game board, prizes become available to the members of a team when that team's marker passes a winning position.
It should be appreciated that, in such embodiments, the secondary team game may include any suitable type of game where markers representing different teams move to or accumulate positions on a game board. For example, the secondary team game could include: (a) a treasure map game or geographical map game, where teams accumulate or move to various points on the map; (b) a bingo game, where teams accumulate positions on a bingo card; (c) a lottery game, where teams accumulate symbols or numbers on a lottery card; (d) a racing game, where teams progress along a track; (e) a game in which teams advance along one or more paths; (f) a wheel game, where teams accumulate sections or indicators associated with the wheel; and (g) any other suitable type of game. In other embodiments, the secondary team game may include any other suitable type of game and is not limited to games which include game boards.
In one embodiment of the present disclosure, the gaming system enables players to change their team membership at any suitable or designated time during the secondary team game. In this manner, the gaming system enables players to use strategy to try to align themselves with the team they feel has the best chance of winning the prize they want. However, the change of teams does not guarantee a chance of winning, as other players' decisions can affect each individual player's strategy. Since the players may not know the factors being monitored to determine the players' scores, they can only guess where each team's marker will move next. For example, if too many players join a team thereby causing the total coin-in to increase for that team, the cumulative score for that particular team may suddenly and dramatically increase the next time it is sampled by the gaming system. This could cause the team's marker to overshoot or otherwise miss a winning position.
To estimate where a team's marker will move next, players formulate guesses based on how many people they think are on the team and how they believe the cumulative scores are being determined. Based on this estimation, a player joins the team that he feels will land on a prize or land on the prize he wants.
In one embodiment, when a team's marker lands on one of the winning positions, the individual members of that team must claim their prizes. The game operator determines how many prizes are available for each winning position. The number of prizes available may be less than or equal to the number of members on the team. In one embodiment, the prizes that are available are queued and transferred to winning positions to replace outgoing prizes in a first in-first out manner. Thus, players have a degree of uncertainty as to which positions are associated with which prizes.
In one embodiment, the players on a winning team claim prizes on a first-come, first serve basis. In another embodiment, a player's status determines when that player can claim prize or how many prizes are available to that player. For example, if the team's marker lands on a winning position, platinum players may be given the ability to claim the prize first while bronze players may have to wait 30 seconds before making a claim. Alternatively, if the team's marker lands on a winning position and fifteen prizes are available, seven may be available to platinum members, five may be available to gold players and three may be available to bronze players. In one embodiment, a player's gaming activity must sustain a predetermined level for that player to claim a prize.
In one embodiment, the gaming system pays out prizes to the player directly at the gaming device. In one example embodiment, instead of having to leave the gaming machine to redeem a prize, the gaming device and gaming system may credit the player's account for the win. Alternatively, gaming device and gaming system may provide the player a ticket to redeem the prize at a later point in time.
In one embodiment, each player who is on a winning team receives an award or prize. In one such embodiment, each player is provided with a minimum or default win amount. Any other prizes or awards associated with the winning position on which the team lands are provided to one or more players on the winning team in addition to the default win amount.
In one embodiment, points are given to each player who is a member of a prize-winning team. These points may be awarded to players who do not receive a prize or may be awarded to all team members. These points may have any number of applications, such as a running tournament (i.e., the player who accumulates the most points in a certain time period wins), player club points, cash-in value, or any other desired feature. In one embodiment, players who are controlling and tracking their progress from the Internet are awarded points only and are not eligible to claim prizes.
One embodiment of the present disclosure allows the player to interact with a service window. In one embodiment, players may check their team standing, performance, and any available and/or upcoming prizes in the service window on participating gaming devices or at kiosks. In one embodiment, players can claim any available prizes through the player service window. In one embodiment, players participating in team play will be notified by the service window if their team has landed on a winning position. The player is then able to make a claim for a prize immediately. If the player is successful, they must visit a prize kiosk to claim the prize. If the prize is a cash prize, points, game play or other suitable prize, the prize may be downloaded to the game for use or delivered directly to the player's account.
FIGS. 4A, 4B, 4C, 4D, 4E, 4F, and 4G illustrate one example of the secondary team game of the present disclosure which includes five teams—Teams A, B, C, D, and E—each represented by a team marker on a game board. Each of the teams is associated with a path on the game board. Each team's marker moves along its path during the secondary team game.
FIG. 4A illustrates the display device 16 of a first player 84 playing at one of the gaming devices in the gaming system. The display device 16 includes a primary game display 60 which includes a plurality of reels 54 associated with a plurality of paylines 52 a, 52 b, and 52 c. The display device 16 also includes a spin reels button 82 and an award meter 86. The award meter 86 shows the number zero, indicating that the player 84 has not yet won an award in the primary game. The display device 16 further includes a message box 80 for providing information regarding game play.
In addition to the primary game display 60, the display device 16 provides a separate display window 70 for displaying information relating to the secondary team game. More specifically, the display window 70 displays the game board 72 associated with the secondary team game for tracking the progress of each team during the secondary team game. The game board 72 includes a plurality of positions 74. Some of the positions are in Prize Zones 76 a, 76 b, and 76 c. The positions located in the Prize Zones 76 a, 76 b, and 76 c are associated with prizes or awards. If a team's marker lands on a position in one of the Prize Zones 76 a, 76 b, and 76 c, one or more of the players on that team become eligible to claim the prize associated with that position.
The game board 72 displays the prizes that are currently active and available for winning in the secondary game. For example, the positions in Prize Zone 1 76 a are currently associated with a prize of $50. The positions in Prize Zone 2 76 b are associated with a free buffet. The positions in Prize Zone 3 76 c are associated with a mobile telephone prize. The other positions on the game board (i.e., the prizes not located in one of the Prize Zones 76 a, 76 b, and 76 c) are not associated with prizes. In one embodiment, as the prizes are awarded to players on winning teams, new prizes appear on the game board 72 and become available. In one such embodiment, the game board 72 displays the prizes that will be available next in one or more of the Prize Zones 76 a, 76 b, and 76 c. As seen in FIG. 4A, the top of display window 70 indicates that a tool set will be the next available prize.
When the player sits down to play at the gaming device, or upon any other suitable triggering event, the gaming device enables the player to participate in the secondary team game. In FIG. 4A, the gaming device displays a message in the message box 80 asking the player if he wishes to participate in team play. The gaming device prompts the player to choose a team to join from the available teams in the secondary team game—Team A, Team B, Team C, Team D, or Team E.
As illustrated in FIG. 4B, the player selected team C, and gaming device displays a message in the message box 80 indicating that the player has elected to join team C. Information about the player's team membership, the number of players on team C, and the number of team C members who are currently playing is displayed to the player at the top of display area 70. The gaming device prompts the player 84 to begin making wagers on plays of the primary game. It should be appreciated that other players playing at the gaming devices of the gaming system are also playing their respective primary games. Some of these players may be on the same team as the player (i.e., team C), and some of the players may be on different teams.
As the players play the primary games of the gaming device, the gaming system monitors at least one factor of each player's gaming activity over a designated period of time. For example, each hour, the gaming system monitors the total amount wagered by a player. The gaming system combines the total amount wagered by the player with the total amounts wagered by each of the other team C players in that hour to determine a cumulative team value for team C. Each team's movement on the game board occurs in increments determined based on the cumulative team value determined for that team. That is, the team marker representing each team moves a designated number of positions on the game board based on the cumulative team value. For example, the gaming system may require the members of a team to collectively wager $1000 to move that team's marker one position on the game board. The gaming device evaluates the teams gaming activity each hour. The gaming device determines that, in the one hour time period, the members of the team have wagered a total of $2000. Thus, the team's marker will move two positions on the game board. It should be appreciated that, in different embodiments, the gaming system may monitor and determine the cumulative team values at random times, upon designated triggering events, at predetermined time intervals, or in any other suitable manner, as desired by the gaming system operator. It should also be appreciated that, once a team's cumulative team value is determined, the number of positions that the team's marker will move on the game board may be randomly determined, predetermined, or determined in any other suitable manner.
FIG. 4C illustrates the display device at a later point in the player's gaming session. As indicated by the award meter 86, the player has won a total of 50 credits through playing the primary game. In addition, team C's marker has moved onto one of the positions in Prize Zone 3 76 c. The positions in Prize Zone 3 76 c are associated with a mobile telephone prize. The gaming device displays a message in the message box 80 congratulating the player and prompting the player to press the claim prize input or button 90 to claim the mobile telephone. As indicated at the top of display window 70, the next prize that will enter Prize Zone 3 76 c is a tool set. Since Team C has won the mobile telephone prize, the tool set prize will take the place of the mobile telephone prize in Prize Zone 3 76 c. Thus, the players on the next team to land in a position located in with Prize Zone 3 76 c, will have the chance to win the tool set.
In FIG. 4C, the gaming device further notifies the player in the message box 80 that the player can switch teams at any time. The player's team, team C, has just landed on a prize winning position. Therefore, it may take a long time for team C's marker to move to another winning position. Accordingly, the gaming device is reminding the player that the player can use strategy to join another team that is closer to winning a prize.
As seen in FIG. 4D, the player has switched teams by activating the switch teams input or button 88. The gaming device displays a message in the message box 80, indicating that the player elected to switch from team C to team D. In certain embodiments, the player can choose the specific team he wants to join. In other embodiments, the player can choose to switch off of his current team, but the gaming system randomly assigns the player to a new team. The game board 72 shows that team D's marker is very close to landing on one of the positions in Prize Zone 1 76 a, which is associated with a prize of $50. At the top of display window 70, information regarding the player's new team membership, the number of players on team D, and the number of those players currently playing is displayed to the player. Team D includes 100 players, of which 650 are currently playing.
In FIG. 4E, the player continues to play and win awards in the primary game, as indicated by the award meter 86, which now shows the number 75. The game board 72 shows that the marker for team D has advanced to a position beyond Prize Zone 1 76 a. That is, the team D marker overshot the prize-winning position in Prize Zone 1 76 a. This may have been caused by the large number of players on team D who are currently playing on the gaming devices. Accordingly, the gaming device displays a message in the message box 80 informing the player that team D's marker just missed Prize Zone 1 76 a. The player can either stay on team D and go for the next prize in Prize Zone 2 76 b (i.e., the free buffet), or the player can switch teams again to try to join a team that is closer to landing on a prize-winning position.
In FIG. 4F, the player has switched teams for a second time by activating the switch teams button 88. The gaming device displays a message in the message box 80, indicating that the player elected to switch from team D to team E. The game board 72 shows that team E's marker is very close to landing on one of the positions in Prize Zone 1 76 a, which is still associated with a prize of $50 since no other team has landed on Prize Zone 1 76 a. At the top of display window 70, information regarding the player's new team membership, the number of players on team E, and the number of those players currently playing is displayed to the player. Team E includes 750 players, of which 250 are currently playing.
As seen in FIG. 4G, the player continues to play and win awards in the primary game, as indicated by the award meter 86, which now shows the number 100. In addition, the game board 72 shows that the marker for team E has moved along its path and landed on the position in Prize Zone 1 76 a. Accordingly, the gaming device displays a message in the message box 80 prompting the player to press the claim prize input or button 90 to claim the $50 prize associated with Prize Zone 1 76 a.
It should be appreciated that, just because team E was very close to winning the prize in Prize Zone 1 76 a when the player joined team E, there was no guarantee that team E's marker would actually land on the winning position in Prize Zone 176 a. If team E's marker had overshot Prize Zone 1 76 a, the player could have stayed on team E in hopes of team E's marker landing on the position associated with Prize Zone 2 76 b. If Team E's marker were to overshoot both Prize Zones 1 and 2, the player could still win the prize(s) associated with Prize Zone 3 76 c two times in a row.
The example of FIGS. 4A, 4B, 4C, 4D, 4E, 4F, and 4G demonstrates how a player can play the primary game of his or her gaming device while simultaneously participating in team play. As the player plays the primary game, the player can see information relating to a secondary team game on his or her individual gaming device.
It should be appreciated that in other embodiments, instead of or in addition to displaying information about the secondary team game on individual gaming devices, the gaming system is associated with a shared display configured to display information relating to the secondary team game, such as a game board and the team markers moving on the game board. In one such embodiment, the shared display is connected to or is adjacent to a plurality or all of the gaming devices of the gaming system. In one embodiment, the gaming devices are positioned and spaced apart substantially equally about the shared display.
As illustrated in FIG. 5, a plurality of gaming devices 10 a, 10 b, and 10 c are associated with a common or shared display 224 configured to display information relating to the secondary team game. Each of the gaming devices 10 a, 10 b, and 10 c includes a primary game 220 a, 220 b, and 220 c operable upon a wager by a player. In different embodiments, one or more of the primary games 220 a, 220 b, and 220 c may be the same games or different games. As seen in FIG. 5, gaming devices 10 a and 10 b each include a primary game of slot, while gaming device 10 c includes a card game. In this example, each of the players playing at the gaming devices 10 a, 10 b, and 10 c can see the game board of the secondary team game on the shared display 224. The player playing at gaming device 10 a is a member of team A, the player playing at gaming device 10 b is a member of team B, and the player playing at gaming device 10 c is a member of team C. The gaming devices 10 a, 10 b, and 10 c provide and display information to the individual players regarding their teams' progress and standing in the secondary team game. For example, gaming device 10 c displays a message indicating that Team C has landed on a prize-winning position on the game board.
In another embodiment, if the team marker lands on certain designated spaces, the members of the team associated with the team marker are provided awards. In one such embodiment, these designated spaces are specific to the team marker. For example, if a first team marker lands on a designated space associated with the first team, the members of that team are provided an award. In this example, if a second team marker lands on the designated space associated with the first team, the members of the second team are not provided an award.
In another embodiment, one or more positions on the board are associated with advances, wherein if a team marker lands on a position associated with an advance, the team marker is advanced a designated number of positions. In another embodiment, one or more positions on the board are associated with set-backs, wherein if a team marker lands on a position associated with a set-back, the team marker moves back a designated number of positions. In these embodiments, the designated number of positions the team marker is advanced or set-back is predetermined, randomly determined, determined based on one or more player statuses (such as determined through a player tracking system), determined based on a generated symbol or symbol combination, determined based on a random determination by the central controller, determined based on a random determination at the gaming machine, determined based on one or more side wagers placed, determined based on the player's primary game wager, determined based on time (such as the time of day), determined based on an amount of coin-in accumulated in one or more pools or determined based on any other suitable method or criteria.
In another embodiment, one or more positions on the board are switch positions, wherein if a team marker lands on such a position, the team marker switches position with another team marker on the board. For example, if a team in third-place lands on a switch-to-first-place position, the team marker switches position with the marker in first place. In different embodiments, if a first team marker lands on a switch position, which other team marker that first team marker switches positions with is predetermined, randomly determined, determined based on one or more player statuses (such as determined through a player tracking system), determined based on a generated symbol or symbol combination, determined based on a random determination by the central controller, determined based on a random determination at the gaming machine, determined based on one or more side wagers placed, determined based on the player's primary game wager, determined based on time (such as the time of day), determined based on an amount of coin-in accumulated in one or more pools or determined based on any other suitable method or criteria.
(v) for each team with a winning team rank, provide at least one player on said team with an award associated with said winning team rank.
2. The gaming system of claim 1, wherein the at least one processor is programmed to display the secondary team game in associated with a secondary team game board.
3. The gaming system of claim 1, wherein the at least one processor is programmed to enable each of the players to switch teams at a designated time before said play of the secondary team game ends.
4. The gaming system of claim 1, wherein the team gaming activity parameter includes: (i) a total amount wagered by the players of said team; (ii) a total number of plays of the primary games won by the players of said team; (iii) the total number of plays of the primary games lost by the players of said team; or (iv) a total number of plays of the primary games played by the players of said team.
5. The gaming system of claim 1, wherein the at least one processor is programmed to determine the team rank for each team based on said at least one team gaming activity parameter determined in a designated time period.
6. The gaming system of claim 1, wherein the at least one processor is programmed to enable each of the players to change teams a plurality of times during said play of the secondary team game.
7. The gaming device of claim 1, wherein each of said teams includes a plurality of players.
(g) for each team which is associated with said at least one winning position, provide at least one of the players of said team with an award associated with said at least one winning position.
9. The gaming system of claim 8, wherein said at least one processor is programmed to enable each of the players to change teams.
10. The gaming system of claim 9, wherein said at least one processor is programmed to enable each of the players to change teams at any designated time before said play of the secondary game ends.
11. The gaming system of claim 9, wherein said at least one processor is programmed to enable each of the players to change teams a plurality of times.
12. The gaming device of claim 8, wherein said at least one monitored factor includes one of: (i) an amount wagered by the player; (ii) a number of plays of the primary game won by the player; (iii) a number of plays of the primary game lost by the player; and (iv) a number of plays of the primary game played by the player.
13. The gaming device of claim 8, wherein the at least one processor is programmed to monitor said at least one factor of each player's gaming activity in a designated time period.
14. The gaming system of claim 8, wherein said plurality of positions include positions on a game board associated with the secondary game.
15. The gaming system of claim 14, wherein each of the teams of the secondary game is represented by a marker configured to traverse said game board.
16. The gaming system of claim 15, wherein said at least one processor is operable to cause the marker representing each team to move to the position on the game board with which said team is associated.
17. The gaming system of claim 8, wherein each of said teams includes a plurality of players.
(iii) if said team's marker moves to said at least one winning position on the game board, provide at least one of players on said team with an award associated with said at least one winning position.
19. The gaming device of claim 18, wherein said at least one monitored factor includes one of: (i) an amount wagered by the player; (ii) a number of plays of the primary game won by the player; (iii) a number of plays of the primary game lost by the player; and (iv) a number of plays of the primary game played by the player.
20. The gaming device of claim 18, wherein the at least one processor is programmed to monitor said at least one factor of each player's gaming activity in a designated time period.
21. The gaming system of claim 18, wherein said at least one processor is programmed to enable each of the players to change teams.
22. The gaming system of claim 21, wherein said at least one processor is programmed to enable each of the players to change teams at any designated time before said play of the secondary team game ends.
23. The gaming system of claim 21, wherein said at least one processor is programmed to enable each of the players to change teams a plurality of times.
24. The gaming system of claim 18, wherein each of said teams includes a plurality of players. | 2019-04-23T07:31:52Z | https://patents.google.com/patent/US20090124320A1/en |
I am excited to bring to life the many facets of our Social Studies program from 6th Grade Ancient Civilization, 7th Grade American History 1 and 8th Grade American History 2. We will continue to foster a love of learning and pursue a greater understanding of how societies began and continue to exist. Our 5th and 6th Grade World Languages program will coincide with the Social Studies curriculum in an effort to enhance the students understanding of regional languages from the past to the present.
UPDATED 4/15/19 (All recent homework is at the bottom of each grade list).
SS 6- Monday: 6th Grade Social Studies: Read Pp. 20-21. Answer 1-9 on Pg. 21 Due tomorrow.
SS 6- Tuesday: Read Pp. 21-22 Answer # 15-17 on Pg. 22 and 1-7 on Pg. 23 Due Thursday.
SS 6- Thursday: Complete Key Terms Pg. 28. Read Pg. 28-34. Answer #1B, 2A, 3A, 4AB. We will discuss Ice Man Friday and have Chapter 2 Section 1 Quiz on Monday.
SS 6- Friday: Review Study Ch.2 Section 1 for quiz Monday. We may have a test on Ch. 1 and Ch. 2 on Friday. Be safe and have a great weekend!
SS 6 Monday 9/17: Do Key Terms Pg. 36, Read Pp. 36-39 Answer # 1,2,3. Complete Section 2 Review Sheet for Thursday. Test Unit 1 Tue 9/25.
SS 6 Friday 9/21: HW Complete Section 3 Key Terms Pg. 40. Read Pg. 40-43. Answer 1AB, 2AB and #3 on pg. 43. START STUDY HERE: TONIGHT, Read Chapter 1 with your notes and put question marks where you need help understanding. Review your quizzes and notes from Chapter 1 and answer the Chapter 1 key terms and summary in the Unit 1 Study Guide I gave you. SATURDAY: Read Chapter 2. Review notes, write a question mark in your notebooks for something you don’t understand (ask Monday). Answer the Chapter 2 key terms and summary in the the Unit 1 Study Guide I gave you. Review Section 1-3 Study guides you completed. . SUNDAY after Mass, Study Section 3 Pg. 40-43 for quiz Monday. After Quiz 3, we will discuss questions you have and review the chapters. Test on Unit 1 is Tuesday 9/25.
SS 6- Wednesday 9/26: Review Timeline Pg 50-51. Do ALL Key Terms Pg. 54. Read Pp. 54-57. Answer 1ABC and 2ABC. Quiz Friday or Monday.
SS 6- Tuesday 10/2. Complete Section Review sheet and study for Quiz 1 tomorrow.
SS 6- Thursday 10/4 for TUESDAY 10/9- Review homework. Review Quiz Answer questions. Answer # 1ABC , 2 ABC and #3. WEEKEND Study Section 2 for Quiz on Tuesday.
SS 6- Tuesday 10/8: Study for Quiz on Chapter 3 Section 2 tomorrow. Complete homework if not already finished for credit.
SS 6 Wednesday 10/10: Quiz. Homework. Read Pp.65-69. Finish Section 3 Review Sheets. Answer #1ABC, 2AB, 3 AB. We will do #4 in class Thursday.
SS 6 Thursday 10/11: Complete #4 Pg. 69 and Read the Epic of Gilgamesh. Answer # 1 and #2.
SS 6 Friday 10/12:Read Pp. 65-69. Each student is assigned a sub-section. They are to read their subsection, write in any form they choose i.e. bullet points, a drawing etc. what they THINK are the three most important points of that subsection and then write a question to ask the class. They then need to read the entire Section 3 again, Pp. 65-69 to prepare to answer questions in class. Quiz on this section is Tuesday 10/16.
SS 6 Monday 10/15: Study for Quiz on Section 3 tomorrow.
SS 6 Tuesday 10/16: Section 3 Quiz. Complete Section review sheets and Read Pp. 72-77. Complete ALL Key Terms Pg. 72. Answer 1AB, 2AB and 3AB. We will do #4 in class tomorrow. Bring your Bible to class.
SS 6 Thursday 10/18: Finish #4 Pg. 77. Intro Bible. Complete Social Studies Skills 1-3 and Read Pp. 72-77 again. Complete assigned subsection homework (Pick 3 most important points in your assigned subsection and then create a question to ask the class).
SS 6 Friday 10/19: Finish Chapter Review Pg. 79 1-12.
SS 6 Monday 10/22: Study for Quiz Section 4 Tomorrow.
SS 6 Wednesday 10/24: Quiz Section 4. Do Ch. 3 Test Practice Pg. 81.. Read timeline Pp. 82-83. Read Pp. 85 and Do 1-4. Complete the Section 1 Review Sheet handout and read Pp. 86-89.
SS 6 Thursday 10/25: For Monday. Read Pp. 86-89. Do all Key Terms Pg. 86. Answer #1ABC, 2ABC, 3AB and #4. Take notes on your reading. I will check them. Come to class with any questions so we can clarify the information.
SS 6 Monday 10/29: Subsection assignment. Read each Section and write down 3-5 most important points and 1 question for class. Example. The Gift of the Nile: Location and Physical Features. 3-5 points and 1 question. The Floods of the Nile 3-5 points and 1 question, Civilzation Develops Along the Nile 3-5 and 1. Kings Unify Egypt. 3-5 and 1. We will review this Wednesday and have a quiz Thursday or Friday.
SS 6 Tuesday 10/30: Study for quiz Wednesday.
SS 6 Wednesday 10/31: No Homework Happy Halloween!
SS 6 Thursday 11/1: Review Quiz. Read Pp. 90-95. Do ALL Key Terms. Answer 1ABC, 2AB, 3AB. We will do Number 4 in class on Monday AND Complete subsection assignments for us to discuss on Monday. This is to build excellent note taking skills.
SS 6 Friday 11/2: RACING!
SS 6 Monday 11/5: Subsection assignments. Find no less than 5 important items in each subsection and create a question for the class. Plan on a quiz Wednesday.
SS 6 Tuesday 11/6: Study for Quiz.
SS 6 Wednesday 11/7: Quiz. Complete Subsection 3 Handout you received after the quiz.
SS 6 Thursday 11/8: Read Pp. 96-100. Do all Key Terms. Answer 1AB, 2AB and 3 AB and #4. Be ready to discuss in class ask questions.
SS 6 Friday 11/9: Complete subsection assignments.
SS 6 Tuesday 11/13: Review Section 3 again and do assignment over.
SS 6 Thursday 11/15: Complete Subsection assignment. We will review tomorrow for quiz Monday.
SS 6 Friday 11/16: Complete Cornell notes sheet to study for quiz Monday. Ask yourself the following for each subsection when you study: Who was involved, what happened, why did it happen, what were the results.
SS 6 Monday 11/19: Quiz. Complete Pg. 101 and answer the 4 questions. Look at Key Ideas in the top right of Pg. 101. This poem was translated from what language? Complete handout.
SS 6 Tuesday 11/20: Read Pp. 102-106. Use your good note taking method to begin notes. Write them like the handout Friday and do the notes for Egyptian Writing, Writing in Ancient Egypt, The Rosetta Stone and Egyptian Texts. We will discuss Monday. When writing ask who, what, why and where for each subsection. Be the S.M.E.!! Happy Thanksgiving!
SS 6 Monday 11/26: Complete Cornell notes on Temples, Tombs and Art, Egyptian Art. Be ready to explain your notes and details of the sections tomorrow 11/27. Be the S.M.E.!
SS 6 Tuesday 11/27: Do ALL Key Terms. Read Pp. 102-106 again. Answer #1ABC, 2ABC, 3. Take the online quiz. We will do # 4 tomorrow in Class.
SS 6 Friday 11/30: Study for Quiz Monday.
SS 6 Monday 12/3: QUIZ. Complete handout. Read Pp 107-113. Do Key Terms and answer 1AB, 2ABC, 3AB and 4AB. Due 12/4. We will answer the rest in class.
SS 6 Tuesday 12/4: CSPS tomorrow no homework.
SS 6 Thursday 12/6: Continue Cornell notes for Pp. 110 and 111. We will discuss tomorrow 12/7. Plan on another quiz Tuesday 12/11.
SS 6 Friday 12/7: Review the image on Pg. 112 and finish the notes on Pg. 113. Review notes for class. We will review them on Monday. BE THE S.M.E!! Study for Quiz Tuesday 12/11.
SS 6 Tuesday 12/11: Study for Quiz on Kush Thursday. We will then begin to prepare for our next Test.
SS 6 Thursday 12/13: QUIZ. Complete Study guide questions. Test next Tue. or Wed.
SS 6 Friday 12/14: Complete Chapter Review Sheet. Study for Test Tuesday.
SS 6 Monday 12/17: Review for Test. Complete in class #1-7 on Pg. 115 and 8-15 on Pg. 116. Test tomorrow.
SS 6 Tuesday 12/18: TEST Homework: Prepare you hearts for the coming of Christ and enjoy your time with your family this week.
Tuesday 12/18- Friday 12/21. Spend time with your family and be truly thankful for those who love you.
SS 6-Thursday 1/3/18: Read pp. 120-123. Answer #1 and #4 on page 123. Complete Key Terms on page 124. This is meant to shake off the cobwebs from break. We will continue our Section 3 introduction similarities and differences and begin our section review tomorrow. Due Fri. 1/4.
SS 6 Friday 1/4/18: Read Pp. 124-129. Answer 1ABC, 2ABC, 3AB. Complete the online quiz. Due Monday 1/7/19. We will check this homework and the homework due last Friday. We will also review our test.
SS 6 Monday 1/7/19: Complete Cornell subsection notes from class. Due Tuesday 1/8/19. We will review this information tomorrow. Come to class with questions so we can clarify our understanding. Again write good notes. Let’s hone this skill the rest of this year.
SS 6 Tuesday 1/8/19: Ancient India Worksheet due Thursday 1/9. Makeup work due for those absent.
SS 6 Thursday 1/10/19: Study for quiz tomorrow Friday 1/11/19.
SS 6 Friday 1/11/19: Quiz. Read Pp. 130-135. Do Key Terms. Answer 1AB, 2AB, 3AB and 4AB.
SS 6 Tuesday 1/15/19: Read Pp. 136-141. Do Key Terms. Answer #2B, 3AB. We will discuss Thursday. Due 1/17/19.
READ Carefully. SNOW DAY homework included. SS 6 Thursday 1/17/19: Read Pp. 160-165. Do Key Terms (There are two of them). Answer #1AB and 2 ABC. We will discuss tomorrow. Due 1/18/19. If we have a SNOW DAY tomorrow 1/18, the assignment above AND #3AB and #4. READ #5 ONLY (do not write). Will be due Tuesday. We will discuss Tuesday and plan on a quiz Thursday.
SS 6 Tuesday 1/22/19: Complete Ancient China Review Sheets Due Thursday 1/24 Quiz Thursday 1/24.
SS 6 Thursday 1/24/19: Read Pp. 166-171. Complete all Key Terms. Answer 1ABC, 2AB, 3ABC. Due Friday 1/25. We will do #4 for homework over the weekend with notes.
SS 6 Friday 1/25/19 due Monday 1/28/19: Complete assigned Cornell notes sections. Focus on the correct format and spelling. Also, write down any new words you come across. We will discuss on Monday.
SS 6 Monday 1/28/19: No Homework. Remember your sections. We will discuss tomorrow.
SS 6 Tuesday 1/29/19: Zhou China Homework sheet Due Wednesday 1/30/19.
SS 6 Friday 2/1/19: Study for Quiz Monday.
SS 6 Monday 2/4/19: QUIZ on Zhou Dynasty. Read Pp. 172-176. Do Key Terms on Pg. 172. Answer #1ABC, 2ABC AND #4. Complete Cornell Notes. We will review tomorrow.
SS 6 Tuesday 2/5/19: Section Review Sheet Qin Dynasty.
SS 6 Wednesday 2/6/19: #3 on page. 176.
SS 6 Thursday 2/7/19: Study for QUIZ tomorrow.
SS 6 Posted 2/11: Friday’s homework for 2/8 was Read Pp. 178-183 Do Key Terms Answer 1ABC, 2AB, 3 and #5.
SS 6 2/12/19: Han Dynasty Cornell Notes. Due Wednesday 2/13.
SS 6 2/19/19: Han Dynasty Quiz. Read Pp. 186-189. Do ALL Key Terms Pg. 186. Answer 1ABC, 2AB, 3AB (B uses generalizations. Make certain your generalizations are accurate based on facts and not “Hasty” and #5. ( I will ask if you have read your homework on this page).
SS 6 2/22/19: Subsections and the Silk Road. Details and questions for classmates. Quiz Tuesday or Wednesday.
SS 6 2/25/19: Review Notes. We will complete review in the first half of class and plan a quiz the second half.
SS 6 2/26 and 27/19: Chapter 6 Review Chapter Review questions on Pp. 193, 194 and the Standardized Test Practice on Page. 195.
SS 6 3/4/19: Chapter 6 Review Sheet Due Tuesday 3/5. Answer to study. Be the SME!!
SS 6 3/5/19: Study your quizzes and review sheets. We will discuss sections tomorrow for a planned test Thursday.
SS 6 3/6/19: Complete your section review questions and submit to me in email for homework. We will have our Test Tuesday. This assignment is a challenge. It is intended for you to think like the teacher would think. Do your best to ask good questions.
SS 6 3/12/19: Ancient China Test HW Read Timeline Pp. 198-199. Read Pp. 202-207. Do ALL Key Terms on page 202. Answer 1AB, 2AB, 3 and 4AB. We will discuss tomorrow.
SS 6 3/14/19: Early Hebrews. Complete assigned Cornell notes. Due Friday 3/15. If you are absent, pick a section and subsection. List three to five important details and create a question to ask classmates. We will review our test Friday and this information for a quiz Monday or Tuesday.
SS 6 Monday 3/18/19: Complete #5 and #6 from section and review notes. Quiz Wed.
SS 6 Tuesday 3/19/19: Review Section Sheet for Quiz Wed.
SS 6 Thursday 3/21/19: Read Pp. 208-213 Do ALL Key Terms. Answer 1AB, 2AB, 3AB, 4 and #5.
SS 6 Friday 3/22/19: Complete Cornell Notes assignment and be ready to ask questions to your classmates. Be the SME!
SS 6 Friday 3/29/19: Quiz. Read Pp. 214-219 Judaism over the Centuries. Do ALL Key Terms Pg. 214. Answer 1AB, 2AB and #3. Find out the the meaning of the following Yiddish expressions: chutzpah, futz, mazel tov, mensch, nosh, oy, schlemiel, schmoozing and schlep.
SS 6 Monday 4/1/19: Look up at the stars and our beautiful creation. Spend time with your family. Good work 6th Grade. No other homework this evening.
SS 6 Tuesday 4/2/19: Cornell note assignments. Write down three or more important points and create two questions on each of your subsections. Be the SME.
SS 6 Thursday 4/4/19: Study for Quiz tomorrow.
SS 6 Friday 4/5/19: Read Pp. 220 and 221. Answer #1 and #2 on Pg. 220. AND Answer 1-10, 11ABC, 12ABC on Pg. 221 DUE MONDAY 4/8.
SS 6 Monday 4/8/19: Continue Chapter Review #13,14,15,16,17,18, Review Section 1 and Section 2 Notes.
SS 6 Tuesday 4/9/19: Continue # 19,21,22,23 and Test Practice Page, 223. Review of Section 3 and 4.
SS 6 Thursday 4/11/19: Study for Test tomorrow.
SS 6 Monday 4/15/19: Do Key Terms Pg. 228. Answer 1ABC, 2AB, 3AB, 4 and 5 on page 233.
SS 7 – Monday: Study for Quiz tomorrow over the following: Vocabulary Pg. 16 and understand Key terms. Read Pp. 16-19 Do Reading Skill pg. 16 to help your notes. Answer questions 1AB, 2AB and #3 to help study. Complete Progress Monitoring online from pg. 19.
SS 7 Tuesday: Complete ALL Vocabulary words on Pg. 22. Read Pp 22-27 Answer # 1AB, 2AB, 4, 5, 6 and complete Progress Monitor. Quiz on Section 4 Friday.
SS 7 Wednesday: Study ICHTHUS for Quiz Thur. We then review Section 4. Quiz on Section 4 Friday.
SS 7 Thursday: Receive Chromebooks. Study for ICHTHUS quiz tomorrow.
SS 7 Friday: Review Section 4 for Quiz 4 Monday 9/17. Chapter 1 Test Monday 9/24.
SS 7 Friday 9/21: Study review sheets as we discussed in Class. TEST 1 is TUESDAY 9/25.
SS 7 Tuesday 9/25: Read Pg. 32 Look at Timeline. Do Vocabulary Builder on Pg. 36. Read Pp. 36-43. Answer: 1AB, 2AB, 3 and complete Progress Monitor online. We will discuss tomorrow and review homework..
SS 7 Wednesday 9/27: Read Pp. 32-33 Look at Timeline. Read Pp. 36-43 Do ALL Vocabulary Builder on Pg. 36. Answer 1AB, 2AB, #3 and Progress monitor online. Come to class with questions.
SS 7 Thursday 9/28. Study for Quiz 1 Tomorrow.
SS 7 Monday 10/1: Review Chapter 2 Section 1 Review Sheet for Quiz 1 tomorrow.
SS 7 Tuesday 10/2: Quiz on Sect. 1. HW Begin Section 2 Review Sheet. Complete for HW and ALL Vocabulary Builder on page 44.
SS 7 Wednesday. Review Quiz. Review Section 2 Review Sheet and review chapter. Complete Section 2 homework questions in class and study for Quiz Thur.
SS 7 Thursday for WEEKEND. Complete Section 3 Review Sheet. Read Pp 49-52. You were assigned a section. 1. Find the three most important points of that section and explain them as any of the following: A timeline, or a comic strip, tradtional notes with bullet points etc. You pick how you want to write the most important points. 2. Each of you create a question about the section to ask your other students Tuesday. Please ask if you have any questions. For the absent student, study for the quiz you were to have Thursday and then do the assignment above on the subsection Northern Voyages on Pg. 51 (Write 3 points you think are most important and create a question from your subsection for the class).
SS 7 Tuesday 10/9: Review the information above and complete for credit. We will finish our review of material tomorrow. Quiz Thursday.
SS 7 Thursday 10/11: Section 3 Quiz. Preview Section 4. Complete Section Review sheet begun in class and answer #1AB, 2AB, 4 and #5 and Progress Monitoring. We will do #6 in class tomorrow.
SS 7 Friday 10/12: Review Quiz and homework. Do subsection work assigned to each student. Write down 3 most important points and have a question ready to ask the class Monday. Study for Section 4 quiz Tuesday.
SS 7 Tuesday 10/16: Section 4 Quiz. Complete Chapter 2 Review # 1-9. Due tomorrow. We will continue the review of the chapter in class to prepare for a chapter test Friday or Monday.
SS 7 Thursday 10/18: Complete your assigned part of the Ch. 2 Study Guide and read Ch. 2 Section 1 Pp. 36-41.
SS 7 Friday 10/19: Read Chapter 2 Section 2 . Review notes and go over your Chapter Review Sheet we completed in class.
SS 7 Sunday 10/21: Read Chapter 2 Section 4 and notes after Mass. Review notes and enjoy the afternoon. After dinner, review Chapter 2 timeline Pg. 32 -33 and study the Chapter 2 Review Sheet for TEST 2 Tuesday..
SS 7 Monday 10/22: Complete Chapter review sheet and study for TEST tomorrow.
SS 7 Wednesday 10/24: Test Chapter 2. Begin Chapter 3 Colonies Take Root. Do ALL Vocabulary Builder Pg. 66. Read Pp. 66-70 Answer 1AB, 2AB, 3, 4 and 5.
SS 7 Thursday 10/25: Begin Chapter 3 Colonies Take Root. Complete your assigned subsection, no less than 5 important points and one question for the class. (If you are absent, pick one of the following sections England Seeks Colonies, Founding Jamestown Prospers, The Plymouth Colony.
SS 7 Monday 10/29: Complete Colonies Take Root homework packet. Review section 1 for discussion tomorrow. Quiz Wednesday.
SS 7 Tuesday 10/30: Study for quiz Wednesday.
SS 7 Wednesday 10/31: Happy Halloween No Homework.
SS 7 Thursday 11/1: Jamestown movie. DUE MONDAY. Read Pp. 71-76. Do ALL Vocab builder. Answer 1AB, 2AB, #3. We will do #5 in class on Monday. AND Subsection assignments this time 5 important points from the subsections and 1 question. This is to develop excellent note taking skills.
SS 7 Monday 11/5: Re-read Section 2 Pp. 71-76. We will discuss tomorrow to ready ourselves for the quiz Wednesday.
SS 7 Wednesday 11/7: Quiz. Read Section 3 and do all Vocabulary. Answer 1AB, 2AB, 3, 4 and 5. Complete progress monitor online.
SS 7 Tuesday 11/13: Complete study guide. Review section for discussion . Quiz Friday.
SS 7 Wednesday 11/14: Complete Subsection sheet #3. DO NOT COMPLETE #4.
SS 7 Thursday 11/15: Study section Middle Colonies.
SS 7 Friday 11/16: Complete Cornell notes sheet to study for quiz Monday. Ask yourself the following for each subsection when you study: Who was involved, what happened, why did it happen, what were the results.
SS 7 Monday 11/19: Quiz. Complete handout Read Pp. 82 and 83. Write a paragraph per the Analyze box on pg. 83. State at least two sentences for each region. Use this as a notes summary for the Northern and Middle Colonies but also an introduction to the Southern Colonies. Answer: Why was slavery established in the Southern Colonies?
SS 7 Tuesday 11/27: Begin your notes using the Cornell method. Use the handout from the Middle Colonies as an example for your work. Begin on page 84 Geography of the Southern Colonies and do them neatly. Stop at Colonies in the Carolinas and Georgia Who, why and what are the subsections talking about? Remember, be the S.M.E. We will discuss Due 11/28.
SS 7 Wednesday 11/28: Complete Cornell notes from Colonies in the Carolinas and Georgia and complete all subsections through The Backcountry on Pg. 89. Do Self Test online on pg. 89. Due 11/29.
SS 7 Thursday 11/29: LHS service work.
SS 7 Friday 11/30: Review for Quiz Monday.
SS 7 Monday 12/3: Quiz. Complete Handout. Read Pp. 90-93. Complete all Vocabulary Builder Pg. 90 and answer #1AB, 2AB, 3AB and #4 and #5. Have questions ready for tomorrow.
SS 7 Tuesday 12/4: Begin Cornell notes on Pg. 90 in class and complete all through Pg. 93 for homework. We will discuss details tomorrow. Prepare for a quiz on Thursday/Friday.
SS 7 Thursday 12/6: Complete notes Challenge and Study for Quiz tomorrow. BE THE S.M.E!
SS 7 Friday 12/7: Quiz. Read Pp. 94 and 95. Complete #1-12 on Pg. 96. Number 11 and 12 are writing assignments. This is review for an upcoming test. Take this time to answer the questions in an effort to get a head start on studying. I am planning to have your next Test Thursday over the Chapter.
SS 7 Tuesday 12/11: Complete 13-16 on page 96 and ALL of Pg. 97. Do Self Test online and worksheet assignment if I gave it to you.
SS 7 Monday 12/17: TEST. Homework: Prepare your hearts for Christ. Spend time with your family. They are the greatest gifts of all.
Tuesday 12/18- Friday 12/21. Class lessons. No Homework.
Wednesday 12/19: Spend time with your family and be truly thankful for those who love you.
SS 7 Thursday 1/3/19: Think of the movie we began to watch today. We will discuss tomorrow and complete the film. This will act as an introduction to the following section in Chapter 4.
SS 7 Friday 1/4/19: Read Pp. 102-106. Answer #1AB, 2AB, 3 4, 5, 6 and #7. Do the self test online and arrive to class Monday with Questions. Plan on a quiz Wednesday.
SS 7 Monday 1/7/19: Complete assigned Cornell Notes and be ready to teach classmates on subsections.
SS 7 Tuesday 1/8/19: English Bill of Rights worksheet due Wed. 1/9/18.
SS 7 Wednesday 1/9/19: Section Review Sheet due Friday 1/11/19.
SS 7 Friday 1/11/19: Quiz. Read Pp. 113-117 Do Vocab Builder. Answer 1AB, 2AB, 4,5 and 6.
SS 7 Tuesday 1/15/19: Cornell Subsection assignments.
SS 7 Wednesday 1/16/19: Complete History Review sheet. Due Friday 1/18/19. Quiz Tuesday.
SS 7 Tuesday 1/22/19: Complete Review Sheets Focus on Slave codes know details. Quiz tomorrow or Thursday.
SS 7 Wednesday 1/23/19: READ CAREFULLY. Homework due Friday 1/25/19: Read Pp. 118-123 Complete ALL Vocabulary Builder. Write down new words from the text so we can learn them. Example; Compulsory (Pg. 118). Answer the following on page 123: 1AB, 2AB, 3 and 4. We will discuss Friday and begin our notes.
SS 7 Friday 1/25/19: Complete assigned Cornell notes. If you were absent. I sent a details explanation to your parents. Due Monday 1/27/19. We will try to answer the focus question from the board on Monday. Quiz Tuesday or Wednesday.
SS 7 Read about Benjamin Franklin Pp. 124 -125. Answer the Checkpoint question at the bottom of the page and the Analyze question in Red on the right of the page. Write the letter from Analyze Literature at the bottom of page 125. Due 1/29/19.
SS 7 1/29/19: Quiz Monday. Review the sections and ask yourself Who? What? When? Why? Where? and How? If you can answer all for each subsection, you are ready. If not, review again.
SS 7 2/4/19: Quiz. Complete the Venn Diagram Compare and Contrast skill on page 126. Read Pg. 127 as a summary. Understand each section and the Key Concepts on pg. 127. Answer 1-11 and #13 on page 128. Complete Self Test on page 129 #1,2,3 and 4. TEST Friday.
SS 7 2/5/19: Section Review Sheet for Test study .
SS 7 2/7/19: Study for Test tomorrow.
SS 7 UPDATED 2/12/19: Read Timeline Pp. 136-137. Rd. Pp. 140-144 Do All Vocab Builder. Answer 1AB, 2AB, 3, and 4.
SS 7 2/13/19: Cornell Notes for entire Section 5 important points and 1 question from each subsection.
SS 7 2/15/19: Section 1 Study Guide. Use to study for the quiz Tuesday.
SS 7 2/19/19: Quiz. Read Pp. 145-149. Do ALL Vocabulary Builder. Answer Checkpoint questions on page 146, 147 and 149. Answer #1,2,3, 4,5 and 6. *Answer Number 7 for one Bonus point. We will discuss in class tomorrow.
SS 7 2/22/19: Science Squid Dissect. Homework: You will get 1 bonus point toward your next test or quiz. Look at the picture on page 148 and complete the Critical Thinking question from the left of the photo. This is a lesson in logic. Look up the word sensationalism. We will discuss in class Monday.
SS 7 2/25/19: Complete Cornell Notes. We will discuss in class tomorrow. Quiz Wednesday.
SS 7 2/27/19: Quiz. Read Pp. 150-153 Do ALL Vocabulary Builder. Answer 1AB, 2AB, 3AB, 4, 5, 6, 7 and 8. Due Friday 3/1/19. Quiz Monday Begin your studies with the homework. Read and do the work intentionally for retention.
SS 7 3/4/19: Study for Quiz. Quiz Review Sheet.
SS 7 3/5/19: Quiz. Read Pg. 154 and 155. Write letter, be creative. Read Pp. 156-161. Do ALL Vocab Builder and answer: 1AB, 2AB, 3,4,5 and 6. Do self test online. Check your work. Quiz Monday.
SS 7 3/5/19: Student J.O. Study your review sheet you will complete for a quiz tomorrow. ALL OTHER STUDENTS Read Pp. 154-155. Write a letter per the bottom right of page 155. READ Pp. 156-161. Do ALL Vocabulary Builder. ANSWER 1AB, 2AB, 3,4,5 and 6. Complete the Self Test online and tell me how you did in class Tuesday. Also, CORNELL NOTES for the section. Lastly, look up Sybil… whom I wrote on the board and you all confirmed. Be able to explain briefly who she was in reference to the American Revolution.
SS 7 3/12/19: Complete Section 4 Review sheet. We will discuss this sheet and the section for review tomorrow. Quiz Thursday during CSPS.
SS 7 3/13/19: Study for Quiz on Section 4 tomorrow.
SS 7 3/14/19: Quiz Begin Chapter Study. Read Pp. 162 and learn the skill. This follows how we do our notes. Answer 1-4 on Pg. 162. Read Pp. 163. Read over a few times to understand the details of each section and Key Concepts. Go to Pg. 164. Answer 1-4 AND 5AB, 6AB, 7ABC, 8ABC and 9AB. We will discuss tomorrow and continue our Chapter review Friday for a test next week.
SS 7 3/15/19: Complete the rest of the Chapter Test Review on Pp. 164 and 165. 8ABC, 9AB, 10,11,13,14 and Self Test 1-3 on Pg. 165.
SS 7 3/18/19: Complete Chapter Review Sheet 1. Test Friday.
SS 7 3/19/19: Continue Review of Chapter. Finish Test Review Sheet for homework. Study for Test Friday.
SS 7 3/20/19: Final Review for Test Friday in class.
3/22/19: Test Homework Read Pp. 166-167 Timeline. Read Pg. 168 and Answer #1-4. Read Pp. 170-173. Do All Vocabulary Builder. Anwer 1AB, 2AB, 4, 5 and 6. We will do #3 and #7 in class Monday. Be ready to discuss.
3/26/19: Section review sheet AND Chronology of events sheet.
SS 7 Wednesday 3/27/19: Complete Common Sense sheet. Study for quiz Friday.
SS 7 Friday 3/29/19: Quiz. Read Pp. 174-178 Write in notebooks ALL bubbled notations in margins (more like parallelograms). Answer Critical Thinking question at the top of Page 174.
SS 7 Monday 4/1/19: Read Pp. 179-184. Do ALL Vocab Builder. Answer 1AB, 2AB, 4,5,6,7.
SS 7 Tuesday 4/2/19: Cornell Notes for assigned subsections and questions. Be the SME. Quiz Friday.
SS 7 Thursday 4/4/19: Study for Quiz Friday.
SS 7 Friday 4/5/19: Quiz. Read Pp. 186-190 Do ALL vocab Builder Answer 1AB, 2AB, 3,4,5 AND Answer Checkpoint Questions on Pp. 187,188, 189and 190. Quiz WED.
SS 7 Monday 4/8/19: Complete assigned Cornell Notes and review section reading for discussion tomorrow.
SS 7 Wednesday 4/10/19: Quiz. Read Pp. 191-195 ( Map and images as well) Do ALL Vocab Builder AND Answer 1AB, 2AB, 3,4,5 and 6.
SS 7 Monday 4/15/19: Finish one of the sections for Cornell Notes you did not complete over the weekend. We will discuss and review tomorrow.
SS 7 Tuesday 4/16/19: Review Sheets for Section double homework grade.
SS 8 – Monday: Quiz 2 on Section 2 on Monday. Monday Homework due Tuesday: Complete Section 3 Vocabulary Pg. 494, Read Pp. 494-498. Answer 1AB, 2AB, and 3AB. Complete Progress Monitoring on page 498. Quiz 3 on Wednesday.
SS 8 – Monday: Complete Vocabulary Builder Pg. 494. Read Pp. 494-498. Answer #1AB, 2AB, 3AB and Progress Monitoring.
SS 8 – Tuesday: Review Section 3 for Quiz 3 Wednesday 9/12.
SS 8-Monday 9/17: Rd. Pg. 505. Do #1-6 and #8 on Pg. 506 AND #1-3 on Pg 507.
SS 8 Tuesday 9/25: Ask about GLORY. Also, we will discuss a free question from the test. When reviewing, I was thinking of Lincoln in his early political career and gave guidance as such. The correct answer was in reference to his reaction after Dredd Scott when he debated Mr. Douglas. We will discuss tomorrow.
SS 8 Wednesday 9/26 and Friday 9/28. Read Pp. 508-509 Review Timeline. Read Pp. 512-517 Complete ALL Vocabulary Builder. Answer Critical Thinking Pg. 515. Answer 1AB, 2AB, 3, 4, 5. Movie Friday: We will check homework and notes from Monday and review for Quiz 1 Tuesday.
SS 8 Monday 10/1: Review Section 1 We will complere Section Review sheet and finish Civil War intro. intro movie. Quiz Wednesday.
SS 8 Tuesday 10/2: Complete Section Review Sheet.
SS 8 Wednesday 10/3 for Tuesday 10/8 Quiz 1 (TH), Section Review Handout Section 1 , Read Section 2, Complete Section Review Handout Section 2, Quiz 2 (TH), Battle of Bull Run Lesson. All due Tuesday. I am planning a trip to Manassas on Tuesday 10/16. Will advise details next week.
SS 8 Friday 10/12: Read Pp. 524-527. Do ALL Vocabulary Builder Pg. 524. Answer 1AB, 2AB, 3 and 4. Do Progress Monitor online. Arrive Monday with any questions.
SS 8 Monday 10/15: Review HW in class, try to finish GLORY. Makup Webquest due.
Tuesday 10/16: Field Trip to Manassas Battlefield.
Wednesday 10/17: Review Webquest in Class. Review Manassas questions. Finish GLORY Begin assignment we discussed. You each were assigned subsections, write down the three most important parts of your section in any form and create a question to ask the class Thursday.
SS 8 Thursday 10/18: Review Section 4 assignment and review for quiz Tomorrow.
SS 8 Friday 10/19: Quiz on Section 4. Read Pg. 528-532 Do ALL Vocabulary Builder Answer 1AB, 2AB, 3 and 4. We will review our previous quizzes and discuss the section Monday.
SS 8 Monday 10/22: Review Section 4 for Quiz.
SS 8 Wednesday 10/24: Quiz Section 4 Homework for MONDAY 10/29: Complete RRG. Read Pp. 533-537. Go over RRG and add new answers. You were assigned sections in class to read. Note 3 or more important points and create a question to ask the class. Read Section 5 again. Answer ALL questions #1-6 on page 537 and complete Progress Monitor online. If there is a battle or campaign you are most interested in for us to dig deeper, let me know Tuesday. We have limited time and there is so much information. Lets make certain to cover those things we want to delve into together.
SS 8 Tuesday 10/30: Review Quiz 4. Review all homework. Watch decisive battles and Sherman’s march. Begin to dissect the details and prepare for a quiz Wednesday.
SS 8 Thursday 11/1: Due Monday 11/5 Read Pg. 538 Answer 1, 2 and 3. Read P. 539 and review the Sections. Do you understand the summary information? Do you have any questions? Read the Key Concepts at the bottom of the page. Chapter Review. Answer #1-4, 5AB, 6AB, 7ABC, 8AB, 9AB and #10 and number 12. Be Creative! Use things you have learned in the films and in your reading.
SS 8 Friday 11/2: Racing!
SS 8 Monday 11/5: Complete homework sheets. Study Chapter 15 for Test Wednesday. We will review our homework and go over the chapter. Come to class tomorrow with questions.
SS 8 Friday 11/8: Finish test interrupted by precautionary egress. Assign Japan History lesson. Read assigned section. Pick one martyr and write at least three new things you learned of that martyr or martyrs. Do you see your own faith differently after reading about how dedicated the Japanese were to Christ. We will discuss Tuesday.
SS 8 Tuesday 11/13: Read Pg. 342 Timeline. Read Pg. 544. Answer #1-3. Complete Vocabulary Builder on Pg. 546 and read Pp. 546-549. Complete the Progress monitor online. Answer #1AB and #2AB.
SS 8 Wednesday 11/14: Complete worksheet, Answer #6, Complete questions missed. Re-read section. Come prepared to discuss Friday.
SS 8 Friday 11/16: Complete Cornell notes sheet to study for quiz Monday. Ask yourself the following for each subsection when you study: Who was involved, what happened, why did it happen, what were the results.
SS 8 Monday 11/19: Quiz. Read Pp. 550-551. Complete the Analyze section at the bottom right of pg. 551. Complete Handout.
SS 8 Tuesday 11/20: Read Pp. 552-557. Do Vocabulary Builder Pg. 552.Pg. 557 Answer 1AB, 2AB, 3, 4, 5 and #6. Begin Cornell notes from A Growing Conflict on page 552 and STOP at Radical Reconstruction on Pg. 554. For each subsection ask the questions; Who, why , what and where? Be the S.M.E. We will discuss Monday. Happy Thanksgiving!
SS 8 Tuesday 11/27: Complete Cornell notes for Pp. 554 Radical Reconstruction to the end of Pg. 557. Be prepared to discuss in class tomorrow.
SS 8 Thursday 11/29: Review notes for quiz Monday and be ready to ask question and test each other.
SS 8 Friday 11/30: Review section for Quiz Monday. Study notes answer who, what , when, where, why for each subsection.
SS 8 Monday 12/3: Finish Worksheet. Read Pp. 558-563. Answer 1AB, 2AB, 3,4,5 and 6. Due 12/4 Quiz Friday or Monday.
SS 8 Tuesday 12/4: Begin Cornell Notes Pg. 558-560.
SS 8 Wednesday 12/5: Reconstruction Movie. Continue Cornell Notes and finish all for Friday. We will review Friday and challenge.
SS 8 Friday 12/7: Review Cornell notes for section and challenge. Quiz Monday.
SS 8 Tuesday 12/11: Quiz. Do Pg. 564. Read Pg. 565. Answer #1-7 on Pg. 566. We will plan on a Test Friday or Monday.
SS 8 Wednesday 12/12: Complete #8-10 on pg. 566 and complete ALL of Pg. 567.
Friday 12/14: Complete Review Sheet If you did not answer on the sheet and checked them off, you must know it for the test. I will take off extra points if not. Study for Test Monday.
Tuesday 12/18- Friday 12/21. Homework: Spend time with your family and be truly thankful for those who love you.
Friday 1/4/19: Read Pp. 578-581 Do ALL Vocabulary Builder and answer 1AB and 2 AB. on page 581. Read this section and be the SME. Be ready to discuss Monday.
Monday 1/7/19: Read 578-581 again. Complete handout.
Tuesday 1/8/19: Do Cornell notes for assigned subsections. Prepare for quiz Friday.
Friday 1/11/19: Quiz. Read Page 584-589. Do Vocab Builder. Look at map on page 587. Be ready to discuss Monday. Answer 1AB and 2AB. Focus on: Dawes Act and Sand Creek Massacre. We will discuss Monday. Quiz on Wednesday.
Tuesday 1/15/19: Complete Subsection assignments we will review for quiz Thursday.
Wednesday 1/16/19: Complete section review sheet. Due Friday. Quiz Tuesday.
Tuesday 1/22/19: Complete Review sheets. Quiz Friday. Know the Dawes Act!
Wednesday 1/23/19: Study for Quiz Friday. Know my subsection, the Dawes Act.
Friday 1/25/19: Quiz. Read Pp. 595-599. Complete sheet as you read. Do ALL Vocabulary on page 595. Answer 1AB, 2AB(B has two parts), 3,4,5,6,7 and 8. Arrive to class with any questions and ready to discuss.
Monday 1/28/19: Complete Subsection assignments and be ready for questions from your classmates tomorrow.
Friday 2/1/19: Read and complete questions 1-3 on page 600. Read Section 4 on page 601 and Facts About Cowhands and Farmers on page 601. Study section 4 Pp. 595-599 for quiz Monday. We will then take a Test Friday 2/8.
Monday 2/4/19: Class Assembly Study for Quiz tomorrow.
Wednesday 2/6/19: Chapter Review Sheet.
Friday 2/8/19: Study for Test Monday.
Wednesday 2/6/19: Complete Chapter review sheet.
Tuesday 2/12/19: Read Pp. 608-613. Do ALL Vocabulary Builder. Answer 1AB, 2AB, 3,4,5 and 6. Plan on Quiz Friday or Monday.
Tuesday 2/19/19: Quiz. Read Pp. 614-619. Do ALL Vocab Builder. Answer 1AB, 2AB, 4 and 5. We will discuss this work tomorrow.
Friday 2/22/19: Subsection Cornell note assignments. Study your notes. Monday we will get the other sections from your classmates and have a battle on Tuesday. Quiz Wednesday.
Tuesday 2/26/19: Battle Notes. Know your stuff!
SS 8 Wednesday 2/27/19: Quiz. Read Pp. 620-624. Do All Vocabulary Builder. Do Checkpoint questions Pg. 621, 622 and 623. Answer 1AB, 2AB, 3, 4, 5, 6 and #7. Due Friday 3/1. WE will begin our notes in class Friday and plan on a quiz Monday.
SS 8 Monday 3/4/19: Study for Quiz. Complete Quiz Review sheet.
SS 8 Tuesday 3/5/19: For those who will make up a quiz tomorrow. This homework is due Friday. Read pp. 625-629. Do ALL Vocab. Builder. Answer ALL Checkpoint questions in the section. Answer 1AB, 2AB, 3-Have fun with this one, 4,5 and 6. Due Wednesday.
SS 8 Wednesday 3/6/19: Complete Cornell Notes for the section.
SS 8 Tuesday 3/12/19: Review notes and section in depth. Read Pp. 630-631 Complete Review Sheet and Self Test Quiz tomorrow.
SS 8 Wednesday 3/13/19 Quiz and Surprise. Read Pp. 798-799 Timeline. Read Pg. 800 Answer # 1 and 2 on page 800. Read Pp. 802-807. Do ALL Checkpoint Questions. Answer 1AB, 2AB, 3,4,5,6 and 7. Due Friday.
SS 8 Monday 3/18/19: REVIEW NOTES and questions Quiz Wednesday.
SS 8 Tuesday 3/19/19: Review Notes and HW for Quiz Tomorrow.
SS 8 Tuesday 3/26/19: Complete Section review sheet AND Pearl Harbor sheet.
SS 8 Friday 3/29/19: Read Dauntless Pp. 814-815. Be ready to discuss Monday. READ Pp. 816-820. Do ALL Vocab Builder. Answer 1AB, 2AB(B is a very good question. take some time to think and answer this question). 3, 4 #5 in class Monday. Review sheet Monday Quiz Tue/Wed.
SS 8 Monday 4/1/19: Webquest. We will discuss Dauntless tomorrow as I forgot to do so today.
SS 8 Tuesday 4/2/19: Finish worksheet. Quiz Fri.
SS 8 Friday 4/5/19: Read Pp. 821-827. Do ALL Vocab Builder. Answer 3 Checkpoint questions in sections and 1AB, 2AB, 3,4,5,6 and 7.
SS 8 Monday 4/8/19: Complete assigned Cornell Notes and review section for discussion tomorrow.
SS 8 Tuesday 4/9/19: Study for Quiz Tomorrow.
SS 8 Wednesday 4/10/19: Complete Learn the Skill and Practice the Skill on Pg. 828. Complete The two homework sheets. We will discuss Faulty Reasoning on Friday.
SS 8 Friday 4/12/19: Read Pg. 829 and 830. Complete 1-10 on page 830.
SS 8 Monday 4/15/19: Pg. 830-831. Complete 11-13 and Test Yourself 1-3. AND Document question 1 and Document question 2 on page 831.
SS 8 Tuesday 4/16/19: Homework sheets for Chapter.
WL 5 Latin 1. Anima Christi. Vestment prayers in the Orthodox Church explained.
WL 6 We will tour ski resorts in Hakkaido and take the train from Sapporo to Tokyo taking in the scenery and food along the way.
IMPORTANT: Parents, this week is a short week. I have an assignment I have given for each student over the break.
The assignment is for them to pick 3 of the 14 Spritual/Cardinal Works of Mercy and complete them. They will need the signature of parents or family member. Brothers and sisters do not count.
The premise is for them to pay attention to who we say we are and act. We are called to action not works. Acta Non Verba.
I ask you to consider taking the challenge and I too will follow suit. Please pray for me as I pray for you.
Have a safe and blessed Easter season. Laudate Dominum! Omnes gentes, Alleluia! | 2019-04-24T14:16:11Z | https://lintonhall.edu/parents/teacher-pages/mr-jeffrey-linton/ |
Even if we could stomach the inordinate amounts of pink, lace, and so forth, Marin was adamant that her brother and I NOT be anywhere in sight. All day long she wanted us to go birding and kept asking when we’d be leaving. We didn’t have a license to go birding–we were given orders.
I had decided on traveling about an hour south to look for Long-eared Owls near Morton. Just as we were about to be exiled from the princess fairy-world, a fantastic bird sighting by Bill Marengo came in on the listserv, a Cinnamon Teal in New Germany, a town an hour away to the southeast. This is a bird I needed for my state list, and after lingering regrets of not chasing the one last year in Stewart a MILE from my AUNT AND UNCLE’s HOUSE, it was an easy decision to switch from owl mode to cool, western duck mode. Also, Minnesota only gets maybe one or two Cinnamon Teal a year, so another chance this close to home was not one to pass up!
Halfway to New Germany a devastating report came in that the Cinnamon Teal had flown off and wasn’t relocated. However, we had nothing better to do and were halfway to the site already–we might as well look around in the area. After all, treasure hunting is always more fun when you know you there’s actually treasure in the area.
We started with ground zero at the large wetland southwest of New Germany and were pleasantly surprised to see a couple of cars lined up by the original location. Scopes were out. Things were looking good. Hopping out and visiting with the other birders quickly revealed that the duck was back!
Birders are so great at these random, road-side, birding flash-mobs that bewilder the rural passers-by; we were instantly invited to view the Cinnamon through scopes trained on it. Renowned county-lister, Denny Martin, quickly set up his apparatus to accommodate the much shorter Evan.
Such a good bird the Cinnamon Teal is and so great it was to see one again. This duck was one of the very first life birds we nabbed within an hour of deboarding a plane in Arizona last year.
I couldn’t do much about the distance or light in this situation, but beggars can’t be choosers. At least you can see what all the hype was about.
As we watched and chatted with the Martins (the people not the birds), some Eagles (the birds not the people) flew over. I normally don’t even look- the height of the birds combined with my lack of long-range optics and poor ID skills means I am highly unlikely to ever pick out a Golden Eagle. Denny Martin quickly trained his scope-still set at Evan’s level-on one bird. With the tenacity of a county-lister and lots of years of experience, he stayed on that Eagle for a long time until he got the clincher field marks he was looking for – a small head and golden nape as it turned into the sun. Golden Eagle! It was a county bird for the Martins, a second state bird in as many minutes for me, and a life bird for Evan.
After the Golden Eagle we all went back to visiting and enjoying the Cinnamon Teal as more birders kept responding to the call. Cars kept stacking up behind us the longer we stayed. They’d get their tick and leave. New cars would replace them. Really new cars. Really awesome cars. Really puts my mini-van-to-shame cars.
This sighting at a birding-rave may be the rarest thing I’ve seen yet. Just how special is a Cinnamon Teal in Minnesota? It’s drive-your-Porsche-on-gravel special.
The birds are conspiring against me. After the trip Up North, I was all set to be a responsible, non-birding adult who takes care of all those non-birding chores, duties, etc, and who generally uses his time wisely before jet-setting for Arizona in a couple weeks for…more bird gluttony. The birds have had other plans–they’ve been in my face.
For starters, FOYs are increasing exponentially. My year list doubled in the last couple weeks.
Some we are catching on arrival.
Cackling Goose is a solid FOY, not to be taken-for-granted.
Some we are catching on departure.
2015 was dangerously close to being Lapland Longspurless. Tragedy averted.
Then there is the time-consuming documentation of good birds, FOY or otherwise, that comes along with responsible birding.
March 16th! The time is approaching when a MN Shrike cannot be safely identified by the calendar alone. Despite his proclivities for our recent warmer temps, this guy’s barred breast gave him away as a Northern.
Of course, when an MOU-official county first-record shows up in the home county, you simply must go after it.
The race to see a rare bird is all the more urgent when an invasive, destructive species like the Mute Swan will be shot on sight by the DNR or USFWS.
Even if it chooses an uninspiring place to land.
Even if it is an unambitious slug that hangs out ALL day in one spot and might be a sick bird.
An escapee? Doubtful-no leg bands seen when standing or clipped wings seen when flapping.
Then there are birds you simply have to take time to look at, unless of course, no one read you E.B. White’s classic, The Trumpet of the Swan, when you were a kid.
This Trumpeter Swan descendant of Louis is purported to play the trumpet line in the opening credits of Homeland.
Finally, there are birds that you cannot ignore even if you never venture out–yard birds. Last week I stayed home one day to take care of a sick Evan. Upon pulling in the driveway after going out to pick up soda crackers, 7-Up, and so on, Evan told me he thought he saw a Bald Eagle overhead. Not a rare sighting at our house, as it happens 2-3 times annually, but it was definitely a noteworthy sighting that caused me to get out of the car and look up. It was no hum-drum Eagle. I nearly felt the breath knocked out of me when I saw it cruise directly over the house under 100 feet up–a new yard bird and rare one at that, a dark morph Rough-legged Hawk! Normally I always have the camera with me in the vehicle. Instead, I raced into the house and got back in time for one shot to document this color-morph of an uncommon bird that is exciting anywhere, but all the more exciting because it graced our yard with its shadow.
This was only my fourth county RLHA and my second-ever dark morph.
After a successful hunt for a Gyrfalcon lifer and a Boreal Chickadee photo on Sunday, I was primed for a day of different birding objectives when I woke up at the in-laws’ house in the Northwoods Monday morning. I was expecting magic–I was going to the Sax-Zim Bog. Part of that excitement was that, when given the choice between the Bog or hanging out with Grandma for the morning, Evan chose the Bog. Based on recent knowledge I had, I knew this could be a special day of lifering and just downright fun birdwatching for him. Doing something science-based eased the parental guilt of pulling him out of school on this day, especially since science (and other subjects) get pushed to the margins in this era of standardized testing where math and reading reign supreme. Forget the guilt, I felt like I was doing something good.
Getting him up that morning was tough, but the promise of McDonald’s breakfast and the morning’s main objective-seeing Sharp-tailed Grouse do their courtship dance on a lek-was enough to get him going. We left the house under an amazing starry sky (truly, there is no better place to see the night sky) to try to get to the lek around first light. However, the breakfast errand and my negligence in not planning extra time to get all the way to Meadowlands in the southwest corner of the Bog caused a delay in my plans. Needless to say, I was haulin’ down Co. Rd. 7.
Still, I brake for Great Gray Owls. Coffee is a great way to start the day, but these are even better way to get the day off on the right foot.
Note the distinct white “mustache” which is visible even in the diminished light of dawn and dusk.
I’d love to tell you how I spotted this thing, but you deserve the truth: I saw hazard lights in the dim morning light. That usually means one thing in the Bog. Immediately I looked in the vicinity of the stopped car and saw the giant silhouette. Brakes were slammed. A sleeping child was woken. Game on! I was NOT expecting to see a Great Gray this trip. They have been very sporadically seen since early January. Many out-of-state visitors dipped on this species this winter. Interestingly I had seen a report of a Great Gray on Co. Rd. 7 the previous evening, so I was keeping my eyes peeled. I’d like to think I would have spotted it on my own. But really, who cares? These things are just fun to see–well worth delaying our Sharp-tailed Grouse plans even more.
Call me crazy, but I prefer to watch Great Gray Owls on gray overcast days and in gloomy light. There’s just something fitting about it that adds to the mystique of this bird.
Despite this good fortune, I was confounded. How much time could I devote to watching this owl? I had to get to the lek if I wanted to see Sharp-tailed Grouse. Why does birding always have to be so stressful and full of decisions?! Mr. Owl, or I should say Mr. Crow helped me out. After 15 minutes or so of owl-watching, an American Crow flew in out of nowhere right at the Great Gray. It was awesome to watch the owl’s defense posture, spreading out his wing and ducking his head. But he didn’t want to be bothered any more, so he departed for the deep, gray recesses of the Tamarack bog behind him. Evan was using my camera at the time to get good looks at the owl, so I wasn’t able to capture this. I will offer up a short video for your viewing pleasure, though.
Next stop was the lek just north and east of the intersection of Co. Rd. 29 and Racek Rd. We got there around 8:15. Birding friend Clinton Nienhaus had told me that he had observed the grouse dancing around 7:30 last week, which was 8:30 this week thanks to Daylight Savings Time. So we were still on time. I found the small group of eight Sharp-tailed Grouse over a quarter mile east of the white house. They were little brown dots in a field of snow, very far from even the camera’s view. We were able to view them a little closer from Racek Rd.
And they were doing their courtship dances! It was an incredible thing to watch even from a distance.
This was a life bird for Evan. It wasn’t even a state bird for me; I had seen a group of 12 or so about 18 years ago pecking grit off MN Hwy. 73 near Sturgeon. So for me it was fun to see this bird as a birder and add it to my state eBird list. Evan and I really enjoyed watching these grouse. We sat together, him on my lap, watching the dances on the camera’s LCD out the driver’s side window. We were quite content to just hang out and see what they’d do. Under the weight of a freshly minted 8-year-old I was reminded of how quickly time passes and how kids don’t stay little long. Sharing this moment with Evan and watching these birds is one I won’t forget.
The previous weekend my friend Steve Gardner saw these same Grouse on the same day Clinton saw them dancing on the lek. However, Steve saw them at a later time in the morning as they were running around the yard of the white house where many people have been seeing them come to the bird feeders. Piecing these two observations together, I knew that eventually the Grouse would head for the white house after their courtship dances. Sure enough, around 8:45, the theatrics were over and protagonist and antagonist Grouse alike hung up their theatrical costumes, slapped backs like old friends, congratulated each other on another great performance, and headed to the bar…er, bird feeders.
Evan and I hopped onto Co. Rd. 29 for better views. The lek is to the left of the garage and behind the row of pines about a quarter mile.
It was a gray day, but we were still able to photo crush some Sharptails. ‘Sharptails’ is a throw-back term to when I hunted them long ago in Montana. It’s just what people called them, and I have trouble letting go of that nickname for the cumbersome official name.
I didn’t get many shots because something spooked the Grouse back to the lek area. Looking at this last picture I took, I’m guessing a raptor of some sort was cruising overhead.
Like the Great Gray, these Sharptails made it easy for us to move on to something new in the Bog. Next stop was the Admiral Road feeding station; Evan needed a Boreal Chickadee lifer, and I wanted more photos as well as a lifer Black-backed Woodpecker that had been hanging out just south of the feeders.
By the time we got to Admiral Road, the overcast sky was gone, and it was a glorious blue-sky day. There were a couple of cars of birders at the feeders. We watched for the Boreal Chickadees for awhile but weren’t seeing them. So I got out and walked the road looking and listening for the Black-backed. An Ohio birder approached me asking what I was looking for, and I learned that he hadn’t seen the Chickadees after a half hour wait. Yikes. Maybe Evan won’t get that lifer today. Just as we were going to give up, though, the Boreals stormed the feeders! Mr. Ohio and Evan lifered at the same time. Evan was about 10 feet away from the feeders and didn’t need me to point out his new bird. So stunning in the now gorgeous light!
Time to move on again. As much as I’d like a Black-backed Woodpecker, I was more anxious to get a Hawk Owl for the winter. I can probably get the resident Black-backed Woodpecker in the summer. On the way to Hellwig Creek (mile marker 29) on Hwy. 53, we bumped into a Northern Shrike and three Black-billed Magpies. How is that you can walk up to these things in a parking lot in Colorado and club them if you choose, and yet I can never get one to stay still for a photo in northern Minnesota?
Evan and I were now racing the clock as we went south of the Bog toward Canyon on Hwy. 53 in search of the Hellwig Hawk Owl. Grandma was bringing Marin southbound after a morning of tea parties, nail-paintings, etc to meet us so the kids and I could leave the area before noon to get back home in time for Evan’s piano lesson. Hawk Owls are quite conspicuous when present, often perching on top of Spruce trees. I just could not locate it. Maybe it had gone north already. Nuts! I really wanted to see this owl again. This was one of my main birding goals for the trip.
Evan and I headed north again to meet up with Grandma and Marin, only we were stopped in our tracks by a Timber Wolf crossing the road! It stopped broadside just 30 feet from the car, but I couldn’t get the camera out in time. Instead I got a running shot as it went down the snowmobile trail.
After rendezvousing with Grandma and Marin at the Anchor Lake Rest Area, the kids and I were now headed south. I would be going by mile marker 29 one last time. It was my last hope for Hawk Owl. I texted JG Bennett and Clinton Nienhaus to get more info on which side of the highway it had been seen. JG shot back right away that it was the west side. At least I now had somewhere to focus. As we went by Hellwig Creek, I scanned every Spruce top. Nothing. Then, there! A glob in an Aspen tree of all places was moving! It was Hellwig, the Hawk Owl!! Do you see him? And do you see all those perfect Spruce tops he’s NOT sitting on?
This was my first time photographing a Northern Hawk Owl with a blue sky background. Now if only I could get the classic shot on top of a Spruce with a blue sky!
This Hawk Owl didn’t care about anything, especially that I was underneath photographing him. Didn’t bother him one bit. In fact, he went about his business of becoming the cleanest Hawk Owl in the land. These things remind me of cats.
And then the uh, you know.
Hawk Owls, like many owls, are birds of many faces and poses.
And finally the classic look is its namesake, a bird that looks like an owl but perches like a hawk.
Here’s another short video that captures some of the essence of this awesome owl.
So there you have it. Two lifers for Evan (Boreal Chickadee and Sharp-tailed Grouse), four birding objectives of mine met (lifer Gyrfalcon, photograph of Boreal Chickadee, eBird record of Sharp-tailed Grouse, and year bird Northern Hawk Owl), and sprinkle in a bonus Great Gray Owl and other cool northern birds for taste–I’d say it was a successful end-of-winter field trip up north. And we were home around the time that Evan would have gotten done with school for the day.The northern gulls, sea ducks, and Black-backed Woodpecker will have to wait for another winter trip. For now, though I must tie up some loose ends and prepare for a lifer-fest in Arizona in a couple weeks.
Just as with beer, cheese, and processed meats, occasionally one must step foot in next-door Wisconsin for the finer things in life, and birds are no exception. Last spring their state-record Garganey just over the border drove Minnesota and Wisconsin birders wild. This winter a slightly less cool bird-which by no means diminishes its status!-showed up in the twin-port city of Superior, Wisconsin. This large bird, figuratively and literally speaking, that chose to take up winter residence on the Wisconsin side of the Blatnik Bridge also had Minnesota birders worked up into a frenzy. Yes, we are talking about the Gyrfalcon, a falcon so superior in size and awesomeness to its lesser brethren that seasoned northern birders drop the “falcon” altogether when uttering its name. Gyr (pronounced “jeer”-trust me, I heard it spoken by the state’s top birder) was first caught by raptor bander, Dave Evans, in Superior and word slowly got out that this arctic predator was in town. Better yet is that it had taken up residence at the Peavey grain elevators on Connors Point where it spends much time loafing and enjoying spectacular views of Lake Superior when not feeding on pigeons in the harbor.
I, too, had Gyr fever. I had many false-starts and set-backs for getting up north the past month, but I finally made it happen. It took much planning, namely sending the kids home with Grandma and Grandpa after a double birthday celebration, sending Melissa home to a quiet house, and sending myself solo to Duluth/Superior and beyond. It was win-win-win. Though with some atrocious dog diarhhea episodes at home while 3/4 of us were away, that conclusion may have to be settled far from now by the bird-blogging historians.
But, anyhow, I felt free as a bird as I drove north, much like this Rough-legged Hawk I saw along the way.
Duluth birder, JG Bennett, knew I was coming and graciously agreed to help me locate Gyr – not necessarily an easy task as many birders have dipped on seeing it. In exchange I’ll be helping him find his Blue Grosbeak lifer this summer–I think I’m getting the better end of this deal. JG called me when I was about an hour from Duluth to tell me that the Gyr was present. Nice guy that he is, he babysat the thing for over an hour until I showed up. Considering the distance from the viewing area and the massive gridiron structure, I was glad he did.
Even in this next photo you can get a sense of the size of the Gyr (look for the bump near the top right).
At times like this I’m thankful for the zoom capabilities of my camera. Quality leaves a lot to be desired, but, hey, no one’s getting killer shots or even great views of this raptor.
Some fun history on Gyr is that this same individual was caught and banded in 2003 in the Duluth/Superior area. At the time it was a third-year bird. It ended up returning every winter for four years and then did not return until this year! Given when it was banded, the age of this male Gyrfalcon is estimated to be 14 years 8 months–the oldest Gyrfalcon on record!
I spent about a half hour or so with the bird who never, ever moved off his perch, even when pigeons flew right by his head. By seeing the main target right away, my time was then free to fritter away as I pleased. I had northern gulls to pick up (Glaucous, Iceland, Great Black-backed), but the Duluth shipping canal was froze over, so there went any hopes for gulls or sea ducks. Instead I decided to try to track down one of three Northern Hawk Owls in the Duluth area as it had been over a year since I had seen this cool bird. The strong winds were keeping the owls hidden though. I couldn’t find a single one. Duluth birds in general were giving me the snub, including this Pine Grosbeak.
I had one last hope for the Hawk Owl (“Northern” is a bit superfluous and is often dropped by northern birders). One had been hanging out just south of the Sax-Zim Bog near Canyon. Specifically this bird could be reliably found right at mile marker 29 at Hellwig Creek. I decided that the Duluth Hawk Owls were a lost cause, so I might as well try for Hellwig and then use up my remaining daylight hours in the Bog. Hellwig was also a no-show, so it was on to the Bog for me.
I have several unfinished birding projects of sorts for the Sax-Zim Bog–a lifer or two, better photo ops of some, officially getting another on my state eBird list, and so on. Anyhow, one of my top goals was to get a good photo of a Boreal Chickadee, so I made a bee-line to the Admiral Road feeding station. There were the usual suspects around. Gregarious Gray Jays are always up for a photo-shoot.
Common Redpolls were everywhere. A couple looked whiter and plumper than the rest. I’m thinking this one looks good for Hoary based on the small, conical bill and faint streaking on the flanks. It had the overall frosty appearance of a Hoary.
The Boreal Chickadees can be quite finicky. Often birders will have to wait up to a half hour or more for just a flash appearance. That was my experience last year. This year was a different story as two of them were coming out from the Spruce bog constantly in the last hour of daylight to feed on their favorite winter food–peanut butter smeared on branches. Visitors to Sax-Zim are encouraged to slather up some branches with the creamy stuff (and donate their fair share of PB) at the Admiral Road feeders when they visit. It’s crazy, but it works.
This Boreal Chickadee momentarily, and perhaps regretfully, chose suet over PB.
Admittedly I’m a bit smitten with this bird. I’ve never really been able to answer the question of “What’s your favorite bird?”, but this one has to be right up there. I may be a bit biased, but this, in my opinion, is the best Chickadee. Perhaps that’s because it leads a secretive life in the deep, mysterious Spruce bogs alongside Great Gray Owls and Spruce Grouse and is rarely seen or perhaps because it is so visually stunning.
I’m finally at peace with the Boreal Chickadee as I got the photo I wanted–even if it does have a little peanut butter in it.
After hanging out with the Boreal Chickadees, who, by the way, are just as tame as their Black-capped cousins, I headed to Grandma and Grandpa’s to spend the night with the kids and prepare for the next day of birding which is arguably the best day I’ve ever had in the Sax-Zim Bog. Stay tuned…there will be videos!
Things have been pretty bleak on the prairie lately as far as birds go (or as far as anything goes, actually). The Snowy Owls packed their bags and left long ago. Birds of the field have been in short supply or absent altogether. Adding insult to this injury is that it has been extremely cold these past few weeks as temps have been well below zero. Hoth is looking like a pretty good vacation destination these days both for its scenery and temps.
So what’s a birder to do? Look at waterfowl, of course! Wait, what? Isn’t it a frozen wasteland here? Birders know a lot of crazy, cool stuff about local, natural phenomena that the vast majority of area residents know nothing about. One such phenomenon is knowing where open water exists in the county during the winter months. When I got into birding a couple years ago, I was blown away to find out that several species of waterfowl have been recorded on past Willmar Christmas Bird Counts. Heck, I was blown away to find out we had open water. I mean, every bit of water is seemingly, or should be, in a solid state, right?
“Let’s drive our truck on the lake by the open water,” they said. “It’ll be fun,” they said.
The further I went down this rabbit hole of birding, the more secrets I’ve learned. One of those secrets is that small numbers of Trumpeter Swans overwinter in the Spicer/New London area. I was reminded of this when local birder, Coralie Jacobson, posted on Facebook that she saw a bunch of swans on the outflow of Green Lake at the northeast corner.
I’ve seen plenty of Trumpeters in the county, but seeing them in February is something I had never done and needed to document for eBird. It was certainly the cure for the winter birding blues. A couple weeks ago I drove up to Green Lake and was not disappointed. In all, I counted 19 Trumpeter Swans. These DINCs (Double-Income No Cygnets) were enjoying quite the love fest, being all exclusive from the other swans.
When not necking and acting like that adorable couple that makes people cringe, they were striking contortionist poses and looking awfully dapper in their crisp black and whites.
Meanwhile at the other end of the Trumpeter relationship spectrum and at the other end of the outflow, this harried set of parents was leading the distracted life of a zone defense against three rambunctious teen-age cygnets. A date night might be in order.
It turns out that the outflow of Green Lake is not the only open water around these parts in the winter. The Crow River right in downtown New London also stays open just beneath the dam at the Mill Pond and along Central Avenue. In late November 2014, Coralie Jacobson found herself an incredible lifer on this little stretch of river in town–an American Black Duck associating with about two dozen Mallards. This species has been something of a nemesis bird for me, and it’s a remarkable bird for our area. Occasionally one or two will be seen by somebody during spring migration or in the late fall if there is open water around. I have frozen my fingers and face scanning through thousands of Canada Geese and Mallards on Foot Lake trying to pick one out that Steve had found in late 2013. Another time I was minutes late for getting to a location of a sighting. And this particular duck that Coralie found? I think I made a half dozen trips to New London looking for this bird, hoping to finally add it to my county list and record a new Kandiyohi species for eBird. Joel found it no problem. Counters for the CBC found it no problem. I had lots of problems finding it. I had so many failed attempts and it was getting deeper and deeper into winter that I had completely given up on it, settling for licking my Black Duck wound along with the still open, festering wound of missing a county Long-tailed Duck by an hour last fall.
Last week after I dropped Evan off at school on Monday, I went for a drive-about in the northern part of the county-a land I haven’t explored much. The Black Duck was far from my mind since it was last seen two months ago. This solo venture was birding desperation, plain and simple. I didn’t even know what I was really after. A 2015 county Northern Shrike? Pileated Woodpecker year bird maybe? Perhaps a Snowy Owl even though I’ve used up all my SNOW luck for a decade? It felt hopeless and was even less interesting than it sounded. I decided to turn it into an eBird expedition, making notes of birds numbers/species/locations. It was something to do, something productive anyhow.
My travels brought me by New London, so I thought I’d swing by the Crow River on Central Avenue to see if there were any Mallards to document. I noticed that there were about 30 Mallards or so. Interesting. The ducks were located at a bend in the river that was not easily seen from the dam or from Central Avenue. After some maneuvering I finally got into a position with the morning sun at my back where I could see the ducks. The conclusion of my quick scan was Mallards-every one of them, but truthfully I wasn’t even thinking that the Black Duck was a remote possibility. It had to be gone.
Anyhow, I decided I would glass the Mallards and try my best to get a careful count of males/females for eBird since it was a manageable number. Most ducks were facing upstream with their heads constantly under water foraging for food. It’s kind of hard to count ducks that look like rocks.
As I moved my binoculars from one bird to the next, one duck lifted its submerged head. I saw a black cap and an olive green bill, and I literally laughed out loud. There it was. Finally. Had I not eBirded, I may have been long gone not knowing the Black Duck was right under my nose. It felt SOOO good to finally see this bird here at home. It was an A+ bird for a dull winter day–even better than if I’d found a Snowy Owl. The icing on the cake was finding an overwintering Belted Kingfisher, an eBird rarity that I was unfortunately not able to photograph.
In my early birding days I had anxieties about differentiating an American Black Duck from hen Mallards. How silly.
Ever wonder why they call it a Black Duck?
Wintefowling is tremendous fun but is not for the faint of heart, those with poor circulation or the beardless. That said, it seems that winter’s last hurrah is waning and that warm temps are on the way. Pretty soon there’ll be open water aplenty and waterfowl galore. The truth is I’m going to miss these quiet winter waterfowling days when the few, the proud ducks are concentrated in tight spots. Only the cool ones come in the winter.
By God, that eBird list for Plateau State, Nigeria is just gonna have to wait!
All birds, at least in the mind of a birder, are not created equal. There are birds we never get tired of seeing, often because of their rarity or beauty or both. Yet others we outright scorn and dub as “junk birds” because of how exceedingly common and drab they are. Then there are those gorgeous, out-of-reach birds we only dare to dream of seeing before our birding days are done, like the Garganey. I already had that particular dream come true, but on February 20th I witnessed something far greater. Admittedly this post has little connection to birding beyond the title and this intro, but one thing I’ve never explicitly told you readers is that one of my primary purposes in writing blog posts or writing the annual humorous Christmas letter is to capture and preserve snippets of my family’s history. Pictures of the kids, quotes of things they say, and stories of the things we do together are often included for our own remembrance as much as they are for entertainment/readership value. It is in that vein that I’m blogging today–because I want us to look back on a monumental day in our lives and remember–remember the pain and the joy. So read on if you like or stop; it does not matter to me. I will say, though, that most birders I know like being surprised by really cool phenomena, whether or not feathers are involved.
When my alarm went off announcing the beginning of another work day, I quickly woke and checked my phone for any birding updates that may have trickled in during the night. After all, a Gyrfalcon and Harlequin Ducks had been in play and as of the previous evening, I was contemplating a fast trip north after work. What I saw on my phone, though, horrified me–a missed call from my mom at 4:50 AM. Immediately I thought something must have happened with Dad. With quicker heartbeats, Melissa and I nervously listened to the voicemail. My mom was indeed distraught and sobbing, but it was not about my dad. Mom told us how our brother-in-law, Bayo (pronounced “Bio”), who is a missionary in Nigeria, had been very sick recently and that he had been taken to the hospital where doctors concluded he either had cerebral malaria or meningitis. I didn’t know much about those diseases, but I knew enough to know that most people don’t come back from their rapid, deteriorating effects. Melissa and I said a quick prayer, but in my mind Bayo was already dead. Adrenaline, fear, sadness, and morning grogginess were creating a toxic mix in my mind. Selfish thoughts and fears of having to travel to a country that is often plagued with religious violence and terrorism were my instant companions. I had to clear my head before I called mom back. I showered, let the dogs out, and got in the first sips of coffee. Then I called my mom in Arizona, but there wasn’t much to say on either end, just mutual sadness.
I felt it was over for Bayo. I didn’t think praying would do any good. Yet because she asked me, I prayed–angrily and full of doubt. At this point I wasn’t concerned with what would happen to their ministry, and I knew Mary Beth would eventually be okay; I was mostly upset that my nephews and niece were about to lose their dad. Never mind my own feelings of loss. But along with hundreds of people from every corner of the globe who knew about Bayo’s ordeal through social media, I prayed.
The rest of the morning was a blur. I’m sure I wasn’t much more than an overpaid babysitter in the classroom. I wasn’t thinking of a recovery–far from it. I was trying to remember where my safety deposit box key was so I could retrieve my passport. I was trying to figure out how I could possibly make a trip work. My mind was a mess. One minute I felt like dumping this silly birding and blogging hobby completely; the next I was debating how acceptable or not it would be to look at birds if I did end up in Africa.
It was strange to not be able to talk with Melissa who was at the other end of the building, also keeping up the charade of teaching on this day. We exchanged short, sad emails, but that was it. We did see each other during the morning’s Snow Week activity, but not a word was uttered about it even though we both knew what thought prevailed on each other’s minds.
At 12:15 I got a text update from mom: “He has viral encephalitis. He needs a miracle.” Dear God, it really is over, I thought.
Mary Beth later said the doctors believed that was the right diagnosis but that they didn’t have the medicine for that disease, possibly in all of Nigeria. She recalled one doctor saying, “We have cast our bread upon the water. We have given him an anti-viral medication, an anti-bacterial medication, and even an anti-fungal medication.” In other words, they had done all they could do.
It was now a waiting game. I went through my afternoon in a continued fog, struggling to get through my day as I waited for that final update. Around 2:00 I called my mom, and she informed me that they were working to get Bayo medically-evacuated to South Africa or Kenya. Wait, what was going on? Wasn’t it hopeless just a couple hours ago? I heard nothing further, so I called mom again around 4:00 on my way home from work. She told me that she and my dad had now made the decision to travel to Nigeria. Still there wasn’t much news about Bayo. That final update wasn’t coming.
Little did we know at the time just how symbolic the quiet restaurant and gentle snowfall outside really were (I even remarked about the snowfall being peaceful-something it rarely is on the wind-swept prairie and something I never say). On our way home I got another text from Mary Beth that Bayo’s breathing, pulse, and temp were stabilizing! His temp had dropped from 104 to 98.6! The doctor was shocked.
Unlike the confusion and chaos of the beginning of the day, the night was now calm and quiet and was going out with a whimper. The negative updates and negative outlooks had disappeared; hope was winning! Bayo continued to stabilize, and by the next day he was alert and talking, and his personality was coming through! His kids got to see him, and he recognized all of them. There appeared to be no brain damage or loss of cognitive function, later proved by a completely normal EEG. Bayo was eventually still evacuated to Nairobi, Kenya where he continued to improve greatly each day while the doctors tried to determine the cause of his ailment and monitor his rapid, seemingly complete recovery. Bayo is alive! I still can hardly believe it. We witnessed a miracle, and Mary Beth (and all of us) attribute it to the power of prayer.
So, I don’t know if or when I’ll ever see African birds, and I couldn’t be happier. Meanwhile, though, I’ll be studying. The good folks at Princeton University Press are sending out a review copy of A Guide to the Birds of Western Africa. Stay tuned for that as well as some great birding that’s happened since my last post. | 2019-04-23T00:03:23Z | http://www.aboywhocriedheron.com/2015/03/ |
Your Smartphone: What's it Saying to Cyber-Criminals?
01:02 - Smart insulin: a diabetes game changer?
Smart insulin: a diabetes game changer?
Matthew - The idea was to try to make insulin a little bit more autonomous, if the insulin molecule itself could remain in the body but not be functional unless it was needed. So, if blood glucose levels go up as a result of a meal, then the insulin could turn on and become active versus the patient having to kind of know when their blood glucose level was high and inject themselves.
Kat - Describe to me a bit more about this particular insulin. What does it look like and how does it work?
Matthew - So, the vision for the insulin or at least how we anticipate it to work is that the small molecule that we've attached to the insulin protein itself would enable the insulin to become sequestered within the body and be inactive.
Kat - So, it would hide away when it's not needed?
Matthew - Right. So yeah, it would remain sequestered and hide until it was needed.
Kat - And then what happens when someone say, has a dinner and their blood glucose starts to go up?
Matthew - The general idea we tried to simulate in a mouse was a meal. So, we inject glucose to simulate a meal and then the insulin in theory will turn on and will become active and ready. And then will result in a reduction of blood glucose levels, the way insulin is supposed to normally work in a healthy functioning pancreas.
Kat - So explain a little bit more about how does the glucose actually make this clever insulin come out of hiding? How does that work?
Matthew - So, the mechanism is not entirely clear to us.
Kat - Even though you built it?
Matthew - Even though we built it, yes. So, we had an envisioned mechanism in mind which was that it would bind to a protein that is in very high concentration in the blood which would make it inactive. And then in the presence of glucose, it would reduce the binding of this protein and then it would become more active. We weren't able to verify that mechanism in situ in a test tube but that doesn't necessarily mean the mechanism isn't working that way when it's in the body when you get into the complex physiologic environment of the body, a lot can change.
Kat - But I guess the key thing and for anyone who's listening who is affected by type 1 diabetes is going to be: Does it work? And how soon is it going to be here?
Matthew - Right. So, does it work? It works in mice. Some of our studies demonstrate that it works as well as a healthy pancreas which is really the ultimate gold standard for glucose control. That's the way a healthy person would control their glucose. So, it works in mice. As far as moving forward, we're currently in negotiations with some pharmaceutical companies and some other people that might have interest in helping us to advance this clinically. And hopefully, that's a process that can begin in the coming months and years before we'll actually know for sure if it's working well in the human setting.
Kat - Assuming that all goes well in the further tests and eventually taking it into humans does go well, how do you envisage it working? Would someone say, take it once a week?
Matthew - So, the idea I think would be that a person would maybe take this once a day. I think it would kind of serve to provide a basal level of insulin in the body that could become activated to help with some of the glycaemic control issues that diabetics often experience.
Graihagh - Nick's love affair with stringed instruments began 10 years ago after a trip to Istanbul. What you can hear is Nick playing the lute. It's similar to a guitar except it has a mere 26 strings and the body is shaped a bit like half an egg. It wasn't until Nick was leafing through a friend's sheet music collection that his background in science and music really came to head.
Nick - I happened to see a renaissance song book that a friend of mine had lying around. On it, I saw a picture of something that looked like a violin that an angel was holding and it didn't have an F-hole on it. I thought, "Hmm, this is interesting." It had more of a C-shaped hole. I thought, could there have been an evolution?
Graihagh - It turns out there was, from a C-shaped hole to an F-shaped hole. F-holes are these slim cousins either side of the bridge in the strings that reveal the innards of the violin. The thing is, the violin complete with F-holes was first designed in 1555 by Andrea Amati. After the Amati family's reign of violin making, there was the Stradivari family and then the Guarneri family. All three families carved out these F-shaped holes. All three families were from the Italian town of Cremona and all three family's designs of violin are still revered to this day. However, by the 1750s, this Cremonese dynasty of violin makers died and with them, their trade secrets.
Nick - For us now, to go back and understand what their methods and approaches were is a bit of a mystery for violin makers as well as scientists. And so, what we're trying to do in our analysis is go back and look at the physical remains and see how they changed.
Graihagh - Everyone wants to recreate the sounds of these famous Cremonese violins, but it's pretty hard. Each violin has its own distinct sound even when building like for like because of the handmade nature of the trade.
Juliet - I'm Juliet Barker. I've been a violin maker for 60 years and I've been teaching violin making to amateurs for 50 years now. I actually play the violo.
Graihagh - So talk me through how you might go about making a violin. I'm sure there are many, many steps involved.
Juliet - Well, there's also many, many ways of doing it. The best job of all of course is choosing the wood and you look at all the pretty maple for the back, the ribs and the scroll. And then you look for a nice piece of spruce to make the front. So, you have to shape a couple of blocks, bend a couple of ribs, and then you've got your outline fixed. And then you can get onto the carving. For us, the things that matter is the choice of material to begin with and then getting the right curves on the outside, the arching, and thickness in the wood, correct for that piece of wood and every piece of wood of course is different. And they're the things that will make the instrument sound good or not.
Nick - One of the fascinating things that we found is that the F-hole length increased from the Amati time period to the Guarneri time period.
Graihagh - And how did that affect their sound?
Nick - Well, what it's going to do is it's going to make instruments with a longer F-holes, more powerful in that low frequency register. What we found going across the Cremonese period, it was about 60% increase in power. And some of the other design changes that we found that led to increasing power was also an increase in the back plate thickness.
Graihagh - This would make sense. Amati violins are usually chosen to play in smaller venues, are quieter less powerful whereas Garneri's violins with their bigger F-holes are known for very powerful and are used in huge concert halls. But why does increasing the size of the F-hole increase its power?
Nick - If you consider what happens on a windy day near a tall building, the wind comes and the skyscraper is obstructing the flow. Well, that air has to escape somewhere. It goes around the skyscraper. So, if you're standing near the base of the skyscraper, you're going to feel it's very, very windy at the perimeter. If you walk some meters away from the perimeter, away from a building, you can find it's a lot less windy and that's essentially what we found. So, if you maximise the perimeter length and minimise the void area, you're actually more efficient acoustically. So, the circle is going to be the least efficient, has the most wide area and the smallest perimeter. And something like the F-hole that turns out has very, very high perimeter and very little wide area so it's extremely efficient.
Graihagh - Does that mean we can now build these sort of optimal violins that are super powerful?
Nick - Well, I wouldn't say that. what we do know for sure is that at these frequencies, we're very confident that these are the effects that are important. How everything plays together and how the coupled evolution with the other frequencies and the other ranges, we can't answer those questions yet. But that's the way science works. It works one piece at a time. and the nice thing about this is that the physical data that we've uncovered from the Cremonese instruments is consistent with basic physics. So, what this has enabled us to do is eliminate a lot of trial and error and guess work, and repetition when you have a physical principle guiding you.
Kat - Music to my ears. That's Graihagh Jackson speaking with MIT's Nick Makris and violin maker, Juliet Barker.
Chris - Indeed it must be Kat because you're a string player, but of harps so slightly different technology there.
Kat - Yeah, I am. Interestingly, yes. I think my sound board of my harp is also made of spruce and I had to take it to be repaired once: it's fascinating going to a harp workshop.
Chris - I'm lucky enough about 10 years ago almost to interview a gentleman from Texas A&M University called Joseph Nagyvary. He was interested in this same question of why these violins from this part of Italy and this segment of history all sounded so good. He had luckily managed to get hold of some bits of wood from some of the Stradivari and Guarneri violins when people send them in for restoration, you get little fragments of wood.
He did some analysis and his conclusion was that the wood had been chemically brutalised by boiling in various copper and iron salts and things because you could still see the chemical fingerprint of that having happened. And they suggested that this had in turn affected the acoustic properties of the wood. Others have suggested that the wood got brutalised in that way merely as a form of kind of insect control because furniture from that period is riddled with woodworm but these violins never are. So, one wonders if that might be part of it too.
Scientists have found the best evidence yet that the centre of our galaxy contains significant amounts of dark matter.
Chamkaur - We can look at galaxies sort of outside of our own and measure, in particular, the velocity of stars on the very edges of those galaxies. And you can see those stars on the edges are just whizzing around far too fast, if they were being held in just by the gravity of all the other stars in there. And that's telling us that there's this extra mass, there's this extra gravity coming from this dark matter that's all around that galaxy. And that's all well and good, sort of, looking out at other galaxies but it would be quite nice to know what the distribution or how much dark matter there is in our own galaxy. And that's really important if we're going to try and detect it here on Earth. It would be quite nice to know just how much there is, is there any in our galaxy, and just, is there any sort of around our local neighbourhood. And this paper is telling us that yes, there is.
Kat - So, by looking at how stars and things like that in our own galaxy are moving, they can infer that, "Oh, there must be this much push from the dark matter here, there must be this much dark matter here."
Chamkaur - That's right. More of a pull really. They're kind of saying this is all being held together to allow these stars and other gas clouds to be whizzing around at the speeds that they're moving around at. They must be being held on by a lot of sort of force, a lot of strength there, and that must be dark matter. They've got a really strong sort of statistical significance here and stating that there is dark matter here in our own galaxy.
Kat - That's still pretty big. Is there dark matter on Earth? Could there be dark matter here in this office?
Chamkaur - Yes. As the Earth is sort of going around the sun and as the sun is moving around the centre of the galaxy, we'd be feeling, experiencing a sort of dark matter wind coming at us. And so, this dark matter wooshes through the Earth all the time and for every sort of pint of volume, any pint glass you hold up, there's roughly one dark matter particle in there, we think. And it's moving through at about 220 km a second. So, it's whizzing through all the time. There's millions of these things going through your body all the time. It's just a case of, do any of them interact, do they scatter, do they sort of bounce off regular atoms? If they do, great because then we've got a chance to actually find them with terrestrial detectors that we put underground.
Kat - Now we know roughly I guess how much dark matter we think is in our galaxy, what next? What's the significance of this finding?
Chamkaur - What this paper has allowed us to do is really increase our sort of statistics in mapping how much dark matter on average there is in our own Milky Way and extending out to where we are right now. And it's giving us a good handle, some nice evidence, some confidence for when we do go and search for dark matter. It's really telling us that, "Look, it's okay. There is stuff here." We would expect to see this stuff. If it interacts away, we think it does. And if we can start to do this with more and more precision with greater accuracy, we might start to figure out the distribution of dark matter also. We might be sitting in a pocket where there's a lot of dark matter or there's not much dark matter. And that really impacts our chances for finding the stuff.
Kerstin - I'm a PhD student at the Cavendish Laboratory. That's the department of physics of the University of Cambridge. That is actually where Watson and Crick discovered the structure of the DNA about 60 years ago. Actually in my lab, we're also working with DNA.
Chris - And so, it's entirely relevant that your 3-minute piece is going to be on how we read the sequence of DNA.
Kerstin - Yes. I believe as a scientist that it's my duty to make people aware of a technology which I believe will have a big impact on our lives in the very near future. We as scientists, we can only deliver tools but we have to decide as a society on how we want to use them. This is why I believe information is the key and I want to make people aware of what is the state of the art of DNA sequencing.
Kerstin - DNA is the molecule that stores the information of life, a molecule that can copy itself. Surely, the greatest invention of nature and actually, the reason we're all here today. Volumes of history are written in the ancient alphabet of A and T, C and G, stories of the present and past that we're just starting to decipher. And that is where DNA sequencing comes in. DNA sequencing means decoding the information of life, reading the 3 billion letters of the human genome. That is a lot of information. The Naked Scientists would have to broadcast continuously day and night for a hundred thousand years before they will have broadcasted 3 billion podcasts.
So why do we even bother? We scientists believe that by sequencing DNA, we can give the right drug to the right patient. We can help to cure a disease before we even suffer from the symptoms. That is why we started the human genome project.
It took 150 scientists 13 years and $3 billion to decode one single human genome. That was back in 2003. Sequencing for everyone? Certainly not. But what if we could do it in under 10 minutes using a small device like this one, like this USB stick for under a thousand dollar? Well, this might be possible using a technique called nanopore sequencing which is pioneered by our collaborators, Oxford Nanopore. Actually, the "thousand-dollar genome" became the catchphrase for the sequencing industry. It was last year that Illumina, the sequencing giant, announced that they can actually sequence a genome for less than 1,000 dollar.
You may believe that computers have developed that unprecedented speed, but that's nothing compared to DNA sequencing. Computing power has doubled every 2 years, but the speed and the cost of DNA sequencing has dropped by a factor of 100,000 in just a decade. To me, that is overwhelming but there's not much time to be overwhelmed because we are facing a new reality. Do we want to predict our future with DNA sequences? Do we want to accept that we are fat because we have the couch potato gene? DNA stands for, Do Not Abuse, Do Not Alter, or Dignity Needs Awareness.
Let's be aware of what is out there. Let's be aware that DNA sequencing is at our fingertips and it has the power to change our lives in a good and in a bad way. This is why I would like to invite everyone to contribute to achieve sensible guidelines for our future.
More than seven million people worldwide are living with Parkinson's Disease.
Simon - Parkinson's disease is a neurodegenerative condition. That means that you're losing cells in the brain. One of the issues with the disease is diagnoses. The only definitive diagnosis comes at the post-mortem stage. When we look at the brains of individuals at that stage, 10% to 15% get rediagnosed with something else. That's quite a sizeable part of the affected population.
Chris - Is that a problem for those people because their treatment might not be optimal?
Chris - Given that the post-mortem stage is probably a bit late for the majority of cases, you would like to bring that diagnostic forward?
Simon - Exactly and the way we want to do that is look for biomarkers. These are chemicals that the body is producing that we can use to differentiate between two populations of people. We are looking at blood, we are looking at urine samples, we're looking at cerebrospinal fluid. These are all very invasive approaches though. So, using a breath test is much more simplified.
Chris - For real, you're able to literally take a sample of breath and this would tell you what's going on in someone's brain?
Simon - So, this is a question that often pops up. How is it there's something in the brain could be coming out of your breath? Two of the main pathways for excretion of waste or unnecessary material on the body, the respiratory system and the gastrointestinal system, both of them are connected with the mouth and what we breath out will include everything from coffee and what you had for breakfast, to other metabolic processes going on in the body. We have about 1500 people with Parkinson's disease on our books; we have clinical data for most of these people going back 15 to 18 years. And we're going to take all the clinical data, lining it up alongside the chemicals that are coming out of the breath test and see if we can start to put people into subpopulations with the condition.
Chris - You take the person, their diagnosis, and their breath chemicals, looking for chemicals that keep behaving like a repeat offender. This person with this diagnosis has this level of this, more often than someone who doesn't have that diagnosis. So, you see that pattern and then you can say, right, on the basis of just now sampling a person at random from the population, if they've got that particular chemical composition in their breath, they may well be developing or actually have Parkinson's.
Simon - Exactly. We also hope to use this technology to track the disease over time. So, some of the chemicals that might be present in very early stage Parkinson's might change towards later stages. There's a lot of exciting potential for this work.
Chris - How likely do you think it'll be that you'll get a breath test for Parkinson's?
Simon - A lot of the preliminary data coming from our collaborators in Israel, they've done animal pilot studies where they can differentiate between different models of Parkinson's disease. And now, they have the clinical data, which has just been published this month where they can differentiate between people with Parkinson's disease and people without. So, we are reasonably confident.
24:35 - Is your phone leaking personal data?
Most of us know we need antivirus software on our PCs, but what about our phones? Why do we need to protect them and how do we do it?
This week we're going to be looking more closely at the trusty devices we now carry with us everywhere and seem to use for almost everything; and that's our mobile phones.
Today's smartphones are capable of doing so much more than the mobile phones of a few years ago and, as a result, we're spending more and more time on them - logging what we've eaten that day, looking up where our next meeting is or uploading a snap to Facebook.
Lorrie - Our data is constantly at risk whenever we're using our mobile phone whether the wi-fi is on or not actually. At the very least, your telephone company is tracking you and perhaps others as well. Certainly, turning your wi-fi on, turning your Bluetooth on is going to put you at additional risk. Even when you're using your desktop or laptop computer and you're surfing the web, you're also being tracked as far as what websites you are visiting.
Kat - What kind of personal data might be at risk from our phones?
Lorrie - Well, it depends what you do with your phone, but there's your address book, your email, your location, if you're doing online banking. All of this data is potentially at risk.
Kat - And I guess then if someone got hold of it, they could do pretty bad things with it.
Lorrie - Yeah. Especially if you leave your phone without any sort of a password or pin, then anybody picking up your phone can basically act as you.
Kat - Pretty scary stuff. But what do the general public think are the risks? I mean obviously, a lot of people seem to be fairly oblivious that their phone is leaking data around them.
Lorrie - Yeah. I think most people are fairly oblivious and are unaware of the risk.
Kat - You've done some nice research with children, about how children view this because obviously, more and more kids are getting smartphones and going online with tablets and these kind of things?
Lorrie - Yeah. We have a project called Privacy Illustrated where we have gone into schools with magic markers and paper and asked kids to draw pictures of privacy and what privacy means to them. We've also done it with adults. But the children's drawings have been particularly interesting. We find with the youngest children, they're not yet thinking about technology. They're thinking about being able to go to their room or to the bathroom and close the door. But then as they get older, then we start seeing images of kids using smartphones and computers and some concern about privacy when they go online. A big thing with kids is, as they start using text messages, this becomes an extremely private form of conversation for them.
Kat - I assume not wanting their parents or anyone else seeing what they're saying.
Kat - Why do you think the public does seem quite oblivious about the risks of data leaking out of our smartphones?
Lorrie - Well, because it's a leak that we don't see. There is no tell-tale drip, drip, drip that you see and so, people don't know what's happening.
Kat - Should they be concerned? You know, I'm just walking down the street with my phone. How at risk am I as an individual of someone getting hold of my data and doing something bad with it? Can we be overly paranoid about this?
Lorrie - Well, there's a lot of different types of risks and there are some of them that may never impact you until they do. I mean, one type of risk is somebody actually stealing your identity, being able to break into your bank accounts, things like that, and that's a very tangible risk that people can understand. But there are also risks associated with just having things that you wanted only your friends to see or hear being made public. That actually can be devastating to people depending on what that information is and if it is passed on to their employers or their parents or their spouse, there's definitely information that can get out that can be really harmful to people.
Kat - Do you have a Smartphone and are you very careful about what you put on it?
Lorrie - I do have a Smartphone and I do try to be careful with it. I never post anything that would be upsetting to me if I saw it on the front page of a newspaper.
Kat - Are you going to post that you've been on the Naked Scientists?
Lorrie - Yeah. I think that's probably okay.
You've probably heard the phrase "there's an app for that" - be it Facebook, Angry Birds, Google Maps, WhatsApp... there are thousands of apps available online. You download them to your phone or tablet computer and your every need can be catered for at the swipe of a screen... And it's big business. Each of us uses - on average - 25-30 of these phone applications. So it's no wonder we tend to just hit 'accept' when an app asks for permission to use our device's camera, have access our contacts, or even look at our location.
But why does a game app need to know this information? And what exactly are these apps doing with this unrestricted access? Could some of them be recording private conversations, or logging where we go for coffee every Tuesday morning to sell the data to third parties? It sounds scary, but it's real: several app developers have already been fined in America for doing just this.
Jason - There's lots of different kinds of data that these Smartphone apps can store. So for example, they might gathering your phone's unique ID, might be getting your current location, or they might be trying to get access to your contact list.
Chris - The big question is, well, why do they need that information?
Jason - Well, in some of these cases, the apps are trying to use these kinds of data sources in new ways. So for example, we've seen apps that are games that are using your location data to create location base kinds of game. But other times, they're using it for advertising purposes or they're also trying to bootstrap their social network by getting your entire contact list, and then spamming your friends to see if they're interested in joining as well.
Chris - But this is illegal, isn't it?
Chris - When you install this software on your phone because your phone is often quite a powerful computer at the end of the day, isn't it? can it leave a sort of vestige of itself there even if you get rid of it so that there is always a danger that it's done something to your phone that means someone somewhere could still nonetheless have access to the information even though the app is no longer there?
Jason - Yes, that's right. Whenever you use a lot of these free apps, they're primarily funded by advertising. And so, what happens is that these advertisers are trying to collect a lot of data about you. So, even if you remove a specific app, you might still be using other apps or using the same kinds of advertising services.
Chris - So, you are motivated to setup your website to try to point the finger at some of the worst offenders and also highlight some good practice?
Jason - That's right. and so, what we did is we downloaded about a million different android Smartphone apps and we started analysing them to try to understand what the behaviours were. So for example, right now, you can easily tell that an app is using location data but you can't tell why it's using that data. So what we did is we try to infer the purpose. So for example, is it using location data for social networking, advertising or analytics? And then for the second part of the work, we also used a whole bunch of these crowd sourcing techniques. You can imagine this being a very large scale kind of survey where we're asking a lot of people how they felt about these kinds of behaviours. So for example, people are very unhappy about contact lists being used for advertising but are mostly okay with contact list being used for social networking.
Chris - Can you give us some physical examples of the kinds of apps that you think behave appropriately and perhaps some examples of ones that have been downright malicious?
Jason - So, one app that has a very surprising kind of behaviour but is sort of fun, there's this dictionary app where you can actually look up what other words that people around you are looking up. And just sort of as a funny joke, one time, I was in Washington DC and I was showing some other people this app and the word that was being shown nearby was 'corruption'.
Chris - Don't do that in Westminster either. You might catch one or two MPs on that one. I was looking at an example because I saw this newsflash come around and excuse the pun on 'flash' but it was about this flashlight app. Because I've downloaded this myself. You can turn the flash on your camera phone into a steady light source that you can use as a sort of torch in the night. There's evidence that some of those are being used to do things like turn on the microphone in your phone when you don't want to so that people can eavesdrop on your conversations even though the phone isn't making a phone call.
Jason - That's right. There are some really unusual kinds of behaviours. So, we've seen some flashlight apps that requests internet access. They're trying to get your phone's unique ID and they're also trying to get your current location. Now, the reason that they're trying to do this again is mostly for advertising purposes. So right now, this trade-off that's, "You can download me for free, but we, the developers need to make revenue off of it. and so, we're going to try to show you ads. But to show you better ads, we're going to try to get more data about you" so for example again, your location data and your unique phone ID.
Chris - Sounds pretty scary doesn't it? Looking at the trajectory of this, where does your research suggest the next threat is coming from or where are we going to be in the future because more and more, these phones and these devices are becoming a dominant part of our lives?
Jason - Yes. I think in the near future, our Smartphones probably will know almost everything about us. I think in many ways, this will actually be a good thing because our Smart phones will be able to help us with healthcare, transportation and sustainability. But these same technologies might also offer a lot of kinds of privacy problems as well.
35:13 - Got your WiFi turned on? Error!
Got your WiFi turned on? Error!
Graihagh - I'm whizzing down on a train to London for work. I've got my coffee and a long list of emails to attend to but my phone signal is a bit patchy. What to do? Well, wi-fi would of course be a perfect solution and sure enough, if I go into my phone's settings, there are loads of networks to connect to. Normally, I wouldn't hesitate to click connect, but today, I'm having second thoughts. Why? Well, it could be that I'm broadcasting information about myself to the world. I've come to Finsbury Park in North London to meet Glenn Wilkinson, the designer of some software called Snoopy. Snoopy can gather sensitive information from Smartphones simply by using their wi-fi signal. So hit me. What is the unvarnished truth? If I've got my wi-fi on now on my phone, what can you really tell about me?
Glenn - There's all types of different things we can tell from your mobile phone. Now essentially, the way wi-fi works is that if you've got wi-fi on, your phone is constantly looking for every wireless network you've ever connected to. It's looking for Starbucks, it's looking for LAX wi-fi, it's looking for McDonalds free wi-fi, it's looking for your home wi-fi or work wi-fi, and it's quite easy to detect those messages. There's two useful bits of information in that message - one, the name of the network your phone is looking for; and two, a unique serial number that identifies your phone in particular. It's called the MAC address. So immediately, I can tell what kind of phone you have and I know what networks you've previously connected to.
Graihagh - Could I think of this as like a unique digital fingerprint?
Graihagh - Of course, you didn't.
Glenn - But immediately quite interesting.
Graihagh - I find this - well, terrifying. I'm going to let you demonstrate this. You've attached Snoopy to a drone. Why have you attached it to a drone?
Glenn - So, Snoopy is inherently mobile. You can run it on certain mobile phones and put it in your pocket and walk around in an area. If you attached that to a drone, we can fly the drone autonomously. So we can plot missions. Say, I want you to canvass this entire neighbourhood of London. It's unfortunately illegal to do this, but I guess criminals won't really care.
Graihagh - I was going to say, let's canvass Finsbury Park, but obviously, we're not allowed to do that. So, why don't we just canvass what we can see and see what sort of data we can pick up. I have to admit, it's pretty cold and there's not many people about. There's a dog walker and a man picking up some litter over there. So, do you think we might be able to pick up where these people are from?
Glenn - Yeah, absolutely. So what we'll do, we'll just hover Snoopy within a safe distance of these people, buzz around the park a bit and just illustrate the data being collected in real time and sent back to my laptop where we can analyse it. So, we've got the drone here.
Graihagh - Okay, so the drone is not very big. It's about 500 grams with 4 propellers. Oh my goodness! It's really fast. How fast can this thing go?
Glenn - So, this one probably on the order of 60 km an hour. So, if we just go hover within 15 meters of those people over there, we'll probably get reading in a few seconds. So, if we see here, we can see the data.
Glenn - So, that's a lot there that's from a coffee shop. So, we met earlier and we detected 254 devices. And now, flying out here, we've got 11. Now, what's interesting is we've seen this one device both inside the coffee shop and around the park here. I'm a bit paranoid because what that indicates is someone is following us.
Graihagh - They could be knowing what you're up to and what your software is capable of. Is that not? That's why they're still here somewhere.
Glenn - Could be someone has been intercepting our emails to each other, they know we're here, and this is a sign that they're watching us.
Glenn - Let's have a look at some of the other ones here. So somebody around us has an unknown device. That probably means it's a fairly new one that's not in our database yet. It's looking for this "SKY BA etc." which is, someone's got a Skybox at home and what we can do is, we can try and figure out where that person lives. And here, excellent, we got a hit. So, if you double-click on that, we get a photograph and a street address. So, Endymion Road, London, it's the postcode and that photograph that we saw is a photograph of their house or of their neighbourhood I guess.
Graihagh - Some beautiful sort of Georgian houses with pillars at the front.
Glenn - So now, we could go and pay them a visit if you wanted to.
Graihagh - Remind me, why have you built this because it seems like a fairly potent and clever, and potentially quite dangerous bit of software and hardware to be putting freely available on the internet?
Glenn - I get a lot of comments about why, "Why are you releasing this? It's dangerous." But the point of doing research like this is to raise awareness. To just show the public, look, how easy this is. Look how broken these standards are. I mean, just as a trivial example, if you go to the mall, you'll notice on the entrance, there's a very small sticker that says, something along the lines of, "Patrons will be monitored via their mobile phones to enhance their shopping experience." That kind of stuff is already being done. The difference is, we have released Snoopy for free to put pressure on the manufacturers to actually think about what they're doing and realise that, "Hey, maybe it's not the best way that we're doing things. Maybe we can enhance our security to protect our customers."
Graihagh - As soon as I got home, I turned my wi-fi back on but in the future, I'll be turning it off when I don't need it. Glenn also suggested I flush my preferred network lists to get rid of the Hooters type wi-fi and I should do this every 6 months.
43:00 - Is your phone wiped after factory reset?
Is your phone wiped after factory reset?
Laurent - Well, more and more phones are actually being sold online and the market is actually booming. We expect I think, more than a hundred million phones being traded by 2018. So, we thought it would be a good idea to figure out whether data was still available after you wipe it.
Chris - Are the majority of them sold as wiped?
Laurent - Most of them were wiped, yes.
Chris - When someone defines their phone as wiped, does that mean they've sort of gone into the settings because there's a button you can select on the phone that says "reset to factory" isn't it? That resets it to how the phone apparently was when it came out of the box. Is that actually what happens?
Laurent - Most people actually use this setting on the phone. And that's what the vendors suggest you to do before you sell your phones. It doesn't always delete the data and why this data is not properly deleted, you first have to understand how the data is stored on your phones. So, phones basically store the data the same way a library would store books. So essentially, you have books on your shelf and every time you want to access a book, you have to look up its location in a search index table. Now, some phones, when they wipe the data, they will actually delete both this index table and remove the books from the shelves. But some phones will actually only remove the index table. So, it appears to you as if your data has vanished, but if you look directly at the shelf, the data is still present.
Chris - The books are all still standing there. So, if you just wander along the shelves, you could potentially retrieve a book?
Chris - And is that what you did with your project?
Laurent - Yes, exactly. We looked at the shelves directly and looked at the data rather than relying on the index table. Well, we found actually quite a lot of data. So, on some phones, we were not able to recover data but on some other phones, it was possible. This depends on versions and models.
Chris - What's sorts of juicy things were coming up?
Laurent - Yeah. So pictures basically. There are dozens or even thousands of pictures on the phones. So, you'd find selfies, you'd find family pictures, pictures of kids and babies. You might also find conversations either these could be emails, chats or text messages. You'd be able to find out which websites people have visited and which apps they have installed. And also, their contact list.
Chris - So, it's all potentially quite sensitive stuff?
Laurent - Yeah, exactly. Well, more importantly, you can also recover passwords. For example, passwords from third party apps that you install on your phone or password that is used by the phone in order to backup your data online.
Chris - Because people tend to use the same password many times in many places, it's possible also that could be a bigger breach than just for that thing that's on the phone. Is this something that happens on all kinds of mobile devices or are some more vulnerable to this?
Laurent - The market is sort of split between the Apple phone and the android smartphones.
Chris - It's about 50/50, isn't it?
Laurent - Yeah. I haven't personally looked into the IOS devices so I can't really comment on that.
Chris - This is Apple?
Laurent - Yeah, Apple. I haven't heard reports of data being recovered from those phones.
Chris - But what about android?
Laurent - It's more on a case to case basis. There isn't really a magic version that is vulnerable and another one that isn't. There are versions sold about 2 or 3 years ago that are more vulnerable and these are often the ones that people are actually selling online.
Chris - So, what can someone do about this? If you're someone who's about to flog an old phone or give it away to your kids or something, what can you do to make sure you're not a victim of something like this happening?
Chris - Basically, just fill up your phone with stuff and it's a bit like shoving new stuff onto the shelves of your library. It's going to push out all the old stuff so the fingerprint of it being there is gone. So, even though you're giving some data away, it's still stuff you don't care about because it's just random rubbish?
Laurent - Exactly. So, as I said, this is not fully reliable but this will help. Another way you can do this is also by trying to record a really large video until some of the memory is full.
What can we do to defend ourselves against cyber-criminals exploiting smartphones to steal our personal data?
Let's come back to some practical advice. Carnegie-Mellon scientists Lorrie Cranor and Jason Hong. Lorrie, let's begin with you. So, what good advice could you give our listeners on how they can better protect themselves, if they're not wiping phones? What else could they be doing to make sure that they're not falling victim to these sorts of threats?
Lorrie - Well, I think the first thing is that they should setup a password or pin on their phone so that to protect themselves from somebody finding their phone and being able to access their information. So, I think that's important. And then I think they should also be careful about what apps they download and realise that most of the free apps, the part of the reason they're free is because they are essentially spying on you and trying to send you targeted advertising.
Chris - Basically, just don't download them in the first place.
Lorrie - You don't download them, unless you know what you're doing.
Chris - Jason, any sort of thoughts that you could add to the equation?
Jason - Well, in the short term, one of the thing you can also do is put your phone into airplane mode before you play some of these games. That way, it won't get your location data and also, won't use internet access. But in a long term, we're definitely going to need a lot more support for app developers and for regulators to make sure that they can help ensure our privacy.
Chris - Does this mean that people basically have to vote with their thumb, tell manufacturers and writers that you're not happy to have your data being exploited in this way and they'll get the message?
Jason - That's basically right. We need as a society to figure out what's the right balance between these app developers making revenue while also protecting our privacy.
50:51 - Are smartphones changing our brains?
Using our thumbs to control our smartphones is changing the activity in our brains.
Arko - If you take the brain of a London taxi driver, regions associated with memory are on average, bigger than the general population even when compared to bus drivers who navigate on more constrained routes. Our brains are very flexible and can allocate their resources depending on our experiences. This can be very specific. For instance, concert violinists who grew up playing the instrument have higher activity in the part of the brain linked to the little finger of the non-bowing hand but not of the bowing hand.
Danielle - Estimates suggests that more than a third of world's population will own a smartphone by 2017. What is in store for this growing smartphone community? Are we also changing our brains like the taxi drivers or violinists?
Arko - We recently found that the part of the brain that receives information from the thumb generates more electrical activity in people who use touchscreen phones compared to old fashioned phone users. We think this brain difference reflects the heavy reliance on the thumb in the more modern users.
Danielle - Hold the phone! How soon before our smartphones have an impact on our brain and is it permanent?
Arko - These changes seem to occur rather quickly, immediately falling a period of say, intense texting. The brain area that receives information from the thumb becomes more active. So, do not think these brain changes are permanent. In fact, we believe that the brain is continuously updated according to how we use our thumbs. This activity is likely to tail off after a period of non-use. Possibly taking a few weeks to revert back to normal. But we don't fully understand this as yet.
Danielle - It's good to know your brain does go back to normal after a phone detox, but is this change something we need to be worried about in the first place?
Arko - Every time you thumb through your phone, you do change your brain a little. But it is too early to say if this is something to be concerned about. We have a lot to learn about how the ever-changing brain impacts our behaviour in general.
Danielle - So, our interactions with our smartphones are shaping the way our brains work and respond. With always increasing possibilities of new technology, it looks like our brain will be changing for as long as our futures last. But we still have a lot to understand about how and why this is happening.
Arko - In fact, smartphones offer a beautiful opportunity to understand how our brains are shaped by our daily lives as the day to day behaviour is seamlessly stored into the phone logs.
Johannes - Why is it that I want to urinate more frequently in colder weather?
Next Are smartphones changing our brains? | 2019-04-25T04:13:35Z | https://www.thenakedscientists.com/podcasts/naked-scientists-podcast/your-smartphone-whats-it-saying-cyber-criminals |
On 30 September 2000, Charles Enderlin, the Jerusalem-based head of the Middle East Bureau of the French television station France 2, presented sixty seconds of footage of what he described as the killing of a twelve-year-old Palestinian boy named Muhammad al-Dura targeted by Israeli soldiers. Enderlin claimed that he had additional film material of the boy’s “death throes” that was too shocking to be shown.
The selectively presented photo material, accompanied by the accusation of deliberate murder of a defenseless Palestinian boy, led to mass demonstrations against Israel and the Jews in the Western world. It also contributed to riots by Arabs in Israel in October 2000. It furthermore opened the door to the mainstreaming of comparison of Israelis to Nazis.
In France 2’s original showing of the material, Enderlin did indeed cut twelve seconds where the boy, after he was alleged to have died from his stomach wounds, was neither clutching his stomach nor crouched up in a fetal position. Instead he was lying flat out, free hand over his eyes, lifting up his elbow, looking out and then slowly putting his arm down.
The Muhammad al-Dura affair took a dramatic turn in May 2008 when a French appeals court found that Philippe Karsenty was innocent of having defamed Enderlin. Karsenty had claimed that the images shown by France 2 of the killing of al-Dura were staged. CRIF, the umbrella organization of the French Jewish community, has since called upon President Nicolas Sarkozy to launch an investigation into the television broadcast of the alleged Israeli shooting of Muhammad al-Dura. France 2 has recently agreed to such an investigation.
Prof. Richard Landes is a medievalist and teaches in the history department of Boston University. In recent years he has also developed a website Second Draft, which, among other things, deals with Palestinian media manipulations. Landes says that it contains the only complete archive of evidence in the al-Dura affair. He also blogs at The Augean Stables, where he analyzes the pervasive dysfunctions of the mainstream media, especially in their treatment of the Arab-Israeli and Islam-West conflicts. In this framework he has been following the al-Dura affair for many years.
“On 30 September 2000, Enderlin was in Ramallah where he listened to Marwan Barghouti, then head of Fatah’s armed branch the Tanzim, announce the outbreak of the Second Intifada. Enderlin received a phone call from Abu Rahma saying that terrible things had happened, and that he was sending the rushes (the raw footage filmed by the cameraman before editing) by satellite to Enderlin.
“Enderlin looked at the pictures, and believed Abu Rahma’s story that he had filmed a father and his murdered twelve-year-old son who had taken refuge behind a barrel when firing started that day between Palestinians and Israelis. The Abu Rahma version was that near the Netzarim Junction in Gaza Israeli soldiers had shot at these two people for forty-five minutes, injuring the father eight to twelve times and the son three times. One bullet hit the boy in the stomach, after which he lay bleeding to death for twenty minutes while the Israelis continued shooting. They did not allow an ambulance to approach, but fired on it and killed the driver. Finally a second ambulance came and took the father and son away. By this time the boy was dead. So far, Abu Rahma’s story.
“None of his footage supports any of the additional details. There are no scenes of the ambulance being fired on, none of the evacuation of either the boy or the father or the dead ambulance driver, no sign or footage of heavy Israeli fire for forty minutes.
“The ambulance driver testified that the boy’s guts had spilled out on the ground. He said that he scooped them up, put them in the ambulance, and drove to the Shifa Hospital in Gaza. According to news reports, the boy was buried on the same evening; there was no autopsy.
“After Enderlin watched the footage, he presented on the evening of 30 September on France 2 a report that included only fifty-five seconds of footage from a supposedly forty-five-minute-long incident of shooting. Abu Rahma had had a front-row view for taking pictures of this incident. He had been sheltered by a white van opposite the boy and had ample opportunity to film the incident extensively. He could have filmed the whole forty-five minutes; instead we have sixty seconds, broken up into five separate ‘takes’ of eight to twelve seconds each. Of the sixty seconds of Abu Rahma’s film of the event that he had, Enderlin cut the last twelve seconds in which the boy raised his arm and seemed to be looking at the camera.
“That day Enderlin also did something else, quite unusual in the world of TV news, and even more so for a man whose nickname is ‘Scoop.’ He handed out free copies of the last three minutes of Abu Rahma’s rushes to many other news stations in Jerusalem. Thus ‘shared,’ his scoop was reinforced by parallel coverage shown around the world many times. It provoked global outrage.
“In Israel riots broke out in October 2000 among Israeli Arabs. In 2003 a commission of inquiry headed by Chief Justice Theodor Orr found that a number of Israeli Arabs cited this footage as the provoking factor for the disturbances.
“A Belgian Jewish acquaintance told me that his rabbi was attacked on the way to synagogue the next day. He didn’t know what had happened, as it was the Rosh Hashanah (Jewish New Year) holiday and he had not watched TV. We also know that Osama Bin Laden was already in touch with Hamas before this happened. He put the footage of Mohammad al-Dura-with a poem denouncing cowardly Arab leaders for not taking vengeance-in a key place in his recruitment video for global jihad.
Landes says that Enderlin reported that the father and son had been “the target of fire from the Israeli position,” a careful phrasing that subtly confirmed Abu Rahma’s more explicit claim that they killed the boy “in cold blood.” In the same statement under oath, Abu Rahma claimed he had taken twenty of the forty-five minutes of shooting, but later claimed to the German filmmaker Esther Schapira that he only sent about six minutes to Enderlin.
“The actual footage Enderlin got from Abu Rahma-not twenty minutes, not six minutes, but sixty seconds-is quite poor in quality and made up of fragmentary takes that do not really cohere. To make his narrative work Enderlin cut the final footage. In constructing his voiceover narrative, Enderlin declared the boy dead about halfway through (take 4). But in the final ‘take,’ the last twelve seconds, the boy is neither clutching his wounded stomach nor crouched up in a fetal position as one might expect. Instead he is lying flat out, free hand over his eyes, lifting up his elbow, looking out and then slowly putting his arm down. There is no indication of death or even imminent death.
Landes interprets Enderlin’s giving away his “scoop” for free differently. “I have not been able to verify that Abu Rahma went first to CNN with the story and they turned it down (clearly implying that it seemed too suspect to use). It would, however, make sense for Abu Rahma to go first to CNN, which has many more viewers worldwide than France 2. I think everybody who takes a look at the material, without being prejudiced, will conclude that this was not convincing footage. So, if CNN actually saw the rushes it’s perfectly believable that they would not want to broadcast this material.
“As the alleged killing of Mohammad al-Dura took place on the Jewish New Year, it took Israel two days to react in an orderly way. Certainly, Enderlin was quick to act. He called the IDF (Israel Defense Forces) spokesman-of which office he was formerly a member, and so trusted by his colleagues there-and told them he had footage of the IDF killing a boy. ‘I recommend you not try and deny it,’ he told the soldier on the other end of the line. ‘Better to apologize and hope it blows over.’ Meanwhile the worldwide outrage built up. The Israeli army, following Enderlin’s advice, first said it might be responsible for the boy’s killing and, if so, apologized. The press interpreted this as meaning the Israelis were responsible. And when Israeli spokesmen asked why Palestinian children were present at such scenes of violence, they were denounced for blaming the victim.
“Shortly thereafter, Nahum Shahaf, a physicist, contacted Major-General Yom-Tov Samia, head of the IDF Southern Command. Shahaf had worked as a physicist with the army’s optical intelligence unit. He was among the leading developers of pilotless light aircraft and video instrumentation. Shahaf had also investigated the damage done in Israel by the Iraqi missiles in 1991, as well as, upon the request of Yitzhak Rabin’s daughter, the circumstances surrounding his assassination.
“It took several weeks before Shahaf’s investigation got under way. Samia had given instructions to level the area a few days after the event because there was firing at the Israeli army position near Netzarim from various places. The scene of the incident was thus entirely compromised. Shahaf then set up similar conditions in the Negev desert for his ballistic tests.
“Shahaf had a collaborator, an engineer who was convinced that the Palestinians intentionally killed the child. This seemed, at the time, a grotesque accusation, certainly in the weeks before there was so much evidence that the Palestinians regularly sacrifice their children for the cause. In an interview with Bob Simon of Sixty Minutes, the collaborator expressed this view before the end of the investigation, which caused a double scandal of unprofessional and politically incorrect behavior. The collaborator was fired but Shahaf was now in a difficult position.
“When Shahaf came out with his conclusion that the killing of Muhammad al-Dura was staged, it aroused great hostility. On the one hand, he blamed the supposed victim; on the other, he suggested something most people cannot imagine: that the entire press corps could be fooled. He was like the child who said the emperor was naked: ‘What? You know more than all the emperor’s courtiers (i.e., the mainstream media)?’ Haaretz in particular among the Israeli media attacked him ferociously in an editorial and an article by Anat Cygielman, calling his investigation an embarrassment and humiliation to Israel.
Landes observes: “Simon didn’t even tell what the conclusion of Shahaf’s investigation was. The ballistic tests had proved that the three bullets shown in the filmed sequence by Abu Rahma came from the Palestinian side and not from the Israelis. The bullets kicked up dust in a way that could not come from a 30-degree angle of a bullet shot against the wall behind the barrel. Furthermore, given the protection provided by the barrel, it would have been nearly impossible for the Israelis to have hit either father or son once, much less over a dozen times. Worse, the Palestinians were firing at the Israelis from behind the father and son.
“Whatever problems there were with the investigation, and there were some, the fundamental conclusions on the provenance of the identifiable bullets and the impossibility of Israeli shots hitting the two, remain solid. The implications are deeply disturbing to any impartial observer: there is no good reason for Palestinians to be firing from a circular mound of dirt called the ‘pita,’ the source of the gunfire according to Samia’s report, at the barrel, when the Israelis are 90 degrees in another direction; and it is exceptionally reckless of them to fire from behind the father and son.
“Interestingly enough, Enderlin drew a map for me of Netzarim Junction in which he placed the Israeli position on the wrong side of the street-actually in the place where the Palestinian ‘pita’ was. For someone who claims he went back to the junction shortly after the events, this is an extraordinary ‘mistake’, especially since the major point of Samia’s report is that the supposedly Israeli bullets could not have come from the Israelis. It’s as if he read the report on the direction of the bullets and then relocated the Israeli position to accord with it.
“Meanwhile, Shahaf thought he was going to tell the world that Abu Rahma’s film was a fake, and this would be as great a news story as the original. Instead he was treated as the child who said the emperor was naked, and was told to shut up.
“Some journalists, however, came to visit Shahaf and published studies based on his work. Schapira did a documentary for ARD, a major German TV station, which was first shown in May 2002. James Fallows published a major investigative article in Atlantic Monthly in June 2003. Both of them stuck to the minimalist position instead of asking what-if the Israelis didn’t kill him-had actually happened. Schapira now acknowledges that at the time she was under heavy pressure, including threats to her life, against even publishing the minimalist thesis.
“It was Fallows’s article that renewed my interest in the al-Dura affair. As a medievalist, I was already familiar with the blood-libel motif. It didn’t seem to me that the Israelis would fire for forty-five minutes at a father and son behind a barrel, nor that, if they had, it would take that long to kill the boy. But until I read Fallows, I assumed that the boy was caught in crossfire and that the ‘blood-libel’ dimension came primarily from the accusation of deliberate murder. I had no idea the whole thing might be fake. Fallows, of course, did not make so radical a claim, but he allows Shahaf to speak, and the evidence seemed fairly clear to me…if Shahaf’s descriptions were accurate.
“When Schapira produced her movie on the al-Dura affair in 2002, she came to the conclusion that there were significant hints-though no proof-that al-Dura was shot by the Palestinians, as well as significant evidence that the event had been staged, whether or not he was shot.
“In particular, all the Palestinian sources, from the hospital doctors to the police investigators-‘We don’t do an investigation when we know who did it, and in this case, it’s clearly the Israelis’-to the cameraman Abu Rahma came across as dubious. Abu Rahma told Schapira on camera that ‘we’ (the Palestinians) have the bullets that killed the child. She then asked him what kind of bullets they were. Abu Rahma replied that she would have to ask the Palestinian general who was in charge of the investigation.
“Enderlin told Schapira that he trusted Abu Rahma one hundred percent. He repeated that he is a professional photojournalist of the highest standard. Abu Rahma informed Schapira that he had sent six minutes of rushes of the actual shooting incident to Enderlin. If Enderlin had six minutes of footage of the actual incident-that is, of the son and father behind the barrel under heavy fire, or the son lying bleeding to death on the ground-he would certainly have used them to back up his story and give it credibility. But he has never shown them, not to me or anyone else who got to view the rushes, not even to the court. One presumes this is because they never existed.
Landes explains: “After reading Fallows in June 2003 and meeting in Paris with Poller and Huber in July, I finally got to Israel in October and met with Shahaf. After several long sessions with him analyzing the footage (he was working with two hours of raw footage from another Palestinian cameraman there that day), I learned how to ‘read’ the ‘rushes’ from Netzarim Junction for indications that scenes were staged rather than real: the telltale signs of no indication of real injury (no blood, breaking the fall with outstretched hands), of the brutal evacuations (no stretchers, no individual manhandled by the evacuators) that would kill a wounded person, the complete lack of fear of Israeli guns, the ‘action’ taking place beyond the range of Israeli guns.
“Then a common acquaintance-Elie Barnavi, who was the Israeli ambassador to France at the time of the al-Dura affair-introduced me to Enderlin and I got a chance to see Abu Rahma’s rushes from that day and the next. Before this, Enderlin had only shown the tapes to people whom he thought would back him up. I was introduced to him as a professor of medieval history and I think, because I came recommended, he expected me to be on his side.
“On 31 October 2003, I sat down in the France 2 studios in Jerusalem and watched the rushes with Charles Enderlin and his Israeli cameraman, who happened to have been in Ramallah with him on 30 September 2000. That was when the shingles fell from my eyes.
“Much of the footage had a familiar quality: it resembled the footage I had seen in Shahaf’s studio, either boring or staged. At one point a Palestinian adult grabbed his leg as if he’d been shot and limped badly. Here, for the ‘scene’ to work, a half-dozen others should have picked him up and run him past cameras to an ambulance. But only kids gathered around him who were too small to pick him up. The man shooed them away, looked around, realized no one’s coming, and walked away without a limp.
“Walking out of his office that Friday afternoon, I was in a state of shock. ‘Oh my God,’ I thought, ‘they do it all the time…and the Western journalists just use the most believable seconds to run as news. It’s a national industry!’ That’s when the term Pallywood occurred to me: just as Bollywood refers to Bombay Hollywood, Pallywood refers to the national Palestinian film industry that produces staged news footage. It tells a story of how the Israeli Goliath is pummeling the Palestinian David and both the Muslim and the Western media lap it up.
“The main products are scenes of injury and ambulance evacuation, as well as street fighting off-scene. In one well-documented case that Karsenty showed in court, cameramen film a Palestinian shooting not at the Israelis, but into an empty building he had been inside only minutes earlier.
“I’d been a fan of the analogy ‘The internet is to the twenty-first century what the printing press was to the sixteenth only at a much faster pace.' But this was a new wrinkle. Here was a blogosphere that resembled the ‘city of letters' three years into the new century, a ‘city of bytes’ showing its power to crash the old technology’s monopoly on the public sphere precisely where empirical issues were in question.
“That’s when I realized that instead of going, hat in hand, to the mainstream media and asking for their help, I should just make the documentary and present it, and the evidence, at a website. Hence, in September 2005, I launched ‘The Second Draft’, and posted both the archival material necessary to understand it-my footnotes as it were-and a short documentary called Pallywood where I provided the best examples of how Palestinians-street folk, doctors, journalists, cameramen, ambulance drivers-all participate in a collective scam.
“I included an essay on the history of Pallywood whose origins I dated to the First Lebanon War in 1982. There was clearly staged footage there, and a credulous press eager to believe anything (six hundred thousand refugees from southern Lebanon when there weren’t that many people living there) and to compare Israel to the Nazis (news anchors standing outside Beirut comparing it to the Warsaw Ghetto).
“My strategy of using the internet paid off well. Within three months there were fifty thousand downloads of Pallywood from our site. When I attended the launch of the PajamasMedia blog in November 2005, I was amazed to find that many people I met had already seen Pallywood. Most of my university colleagues, however, still don’t know I’ve made documentaries.
Landes also uses the al-Dura case in teaching students. “I have a class on Communication Revolutions and we deal with cyberspace and TV. I tell them that in the al-Dura affair there are five possibilities that have to be investigated. The first is that the Israelis did it on purpose. The second is that the Israelis did it by accident. The third is that the Palestinians did it by accident. The fourth is that the Palestinians did it on purpose. Then I ask them what might be the fifth.
Landes, when analyzing the al-Dura case, also points out that any sensible parent would have put the child in front between him and the barrel, rather than behind him. “There is also the question of why the father never reaches for his son at any point. He changes position between each of the last three takes-that is, after his son has been allegedly hit and is lying at his feet. Yet he never reaches for him.
“I wanted to answer that question, political correctness be damned. There was a strong probability that the incident had been staged. Yet none of the news agencies that got the footage, including the scene Enderlin cut, saw any problem with the story as he told it. This broad consensus of the media, all of whom either explicitly back Enderlin or refuse to report the critique, is so impressive that anybody who tries to break it is called a ‘conspiracy nut.' It appears to be the media’s solidarity that gave Enderlin the confidence to take his case to court.
“Obviously this isn’t a real conspiracy theory. In the al-Dura faking, ten or twenty Palestinians at most are involved and they cannot even agree on a common story. It was barely planned. Yet neither the Israelis nor the Western media were alert. If there had been minimal filters for fakes out there, the al-Dura forgery would have been picked up right away.
Landes analyzes the longer-term impact of the staged al-Dura affair. “It’s hard to think of a single news item that did this much damage, not only to Israel’s image in the world, but to the very fabric of global civil society. It opened the door to the mainstreaming of the comparison of Israelis to Nazis. There had already been some of this before the event, especially during the First Lebanon War, but it was rightly considered a fringe -and sadistic- rhetorical device that responsible people eschewed in the name of fairness.
“Many Europeans saw the al-Dura affair as an opportunity to further reduce Holocaust guilt and loved the story. The rushes were shown many times on many European media. In the United States it was shown less frequently, yet for Time it was one of the ‘events of the year.' Arabic TV stations, of course, showed it most frequently.
“French TV showed it and thought they were pleasing their Muslim populations who would intensify their hatred against Israel. They did not understand that many Muslims saw it as a call for jihad against the West. With these pictures, the French media were feeding potential enemies in their own country.
“Part of the irony here is that it was a Druze unit that manned Netzarim Junction that Rosh Hashanah. So even if Israeli soldiers had killed the boy, they weren’t Jews. But when we deal with the irrational, such details are meaningless. What the immediate and ferocious acceptance of this story shows is the immense appetite for what I call ‘moral Schadenfreude’-the delight that some, especially Europeans and the ‘Left,’ take in dumping on Israel morally. It’s as if they somehow make themselves look bigger by making Israel look smaller. How else can you preen on the world stage as the cutting edge of progressive morality when you’re in bed with Islamists of the most vicious and regressive kind?
“An al-Dura case study also teaches much about how journalism functions. First of all, there is an enormous power of what one might call emotional imagery. Viewers are presented with a picture of a young boy supposedly being killed, which trumps everything. There is no way one can maintain distance from this. It affects people in a way statistics cannot.
“Journalists are supposed to keep their distance. Yet there is, particularly in Europe, a journalistic corps of which part is astoundingly pro-Palestinian. This goes back, at least, to the period of the Lebanese civil war, when one would have expected a liberal press to despise the vicious tactics of the PLO.
“There is often rather aggressive identification with the Palestinians. In Jenin, for example, one of the reporters was outraged and carried on about how the Israelis were massacring Palestinians-itself a reflection of her eagerness to believe whatever her Palestinian sources claimed. Later she was confronted by the pediatrician Dr. David Zangen. He said to her: ‘We are here because the Palestinian terrorists are blowing themselves up among our civilians.’ She answered with a typical trope from the postcolonial paradigm: ‘I’ll give you one word: occupation.’ Zangen replied: ‘Jenin hasn’t been occupied for eight years.' And, one might add, the bombs in the midst of Jewish populations predate the ‘occupation’ by decades.
“These journalists are not reporters. They are advocates for the Palestinian cause. There are two categories. Some, such as a few from The Independent, as well as many journalists from The Guardian-are open advocates of the Palestinian cause. They oppose Israel because they are ashamed of their colonial past, which they now project on the Israelis.
“A second category of journalists comprises those who have been intimidated by Arabs. This is done in various ways. In Lebanon, Iraq, and elsewhere, it goes back more than thirty years. On one level there was outright intimidation, through murdering and kidnapping in particular, but not exclusively those who wrote unfavorably.
“We have also seen threats of violence against journalists of the Italian private network Mediaset when they filmed the lynching of two Israeli soldiers in Ramallah in October 2000. Thereafter Riccardo Cristiano of the Italian state television RAI wrote a letter to a Palestinian paper disclosing that the pictures had been taken by Mediaset rather than RAI, and saying he would never have published them had they been his. The Mediaset journalists then had to flee the country.
“Access intimidation is another method. Basically, Palestinians say that journalists who do not tell the story their way cannot come back to the territories. If one cannot report from the disputed territories that means one cannot be a journalist. Thus one has to accommodate the Palestinians. This leads to ‘access journalism’ in which journalists voluntarily cease to speak of issues that might embarrass their hosts.
“An interesting psychological process takes place. These journalists cannot admit to the public that they have been intimidated. If they did, it would invalidate what they report. They are in a Catch-22 situation. They lose their jobs if they don’t give in to the intimidation. They also lose their jobs if they admit that they have been intimidated.
The French media have traditionally backed up Enderlin and given very little attention to the accusations that the al-Dura story is forged. Landes says, “At the end of 2004, however, three journalists-Luc Rosenzweig, Denis Jeambar, and Daniel Leconte-researched the affair for the French weekly L’Express. Rosenzweig, formerly of Le Monde but now independent, had convinced the editor in chief, Jeambar, to run a story arguing that the al-Dura story was staged: a perfectly legitimate piece that the public deserved to see. But when the editorial board of L’Express heard of this, they revolted. No such argument would grace their pages.
“When Jeambar informed Rosenzweig that he could not publish his article, Rosenzweig challenged him to come with an independent journalist and demand that France 2 show them the rushes. This would be the first time that people, not previously checked out, would view these.
“The three saw the material in October 2004. Both Shahaf and I had spoken with Rosenzweig before and told him what to look for. The L’Express representatives went to France 2 and saw that the footage was full of staging. Indeed, they had an identical experience to mine with Enderlin. When they commented on the pervasive staging, Didier Eppelbaum, Enderlin’s boss, responded, ‘O oui, monsieur, but you know it’s always like that.’ To which one of them allegedly responded, ‘You may know it, but your readers don’t.’ Both Jeambar and Leconte were indignant at what they saw, and gave interviews on the radio recounting their experiences.
“At this point one would have expected Jeambar to run the article in L‘Express. But instead, a number of events triggered a retreat by both Jeambar and Leconte. They wrote an article-which only the ‘right-wing’ Le Figaro would run-denouncing Enderlin’s professional behavior, and for a brief moment gave radio interviews. But they took care to argue that, though the first twenty or more minutes of the tapes were full of staging, this told nothing about the final footage on al-Dura, on which they were not prepared to pass judgment. Indeed, they rapidly dropped the subject entirely.
“Ostensibly they did so because France 2 supplied pictures of father Jamal’s scars, but such reasoning makes no sense. Having scars where he was wrapped in blood-soaked bandages the days after the incident does not offer conclusive proof…certainly not about the fate of Muhammad al-Dura. Indeed, subsequent research has revealed that many if not all of those scars were the result of a Hamas attack on Jamal in the early 1990s, and treated by an Israeli doctor. But behind the shoddy intellectual reasoning-which apparently offended none of the astute French commentators on the scene at the time-lay a sadder tale of peer pressure and intimidation. In fact there was a fascinating interplay of currents that enabled France 2 to contain the problem yet again.
“Karsenty was a Jewish businessman and the day after Enderlin’s notorious news broadcast ran, one of his employees asked him ‘Why did you kill that boy?’ In reaction Karsenty set up a website called Media Ratings. With the help of professors of media study, he developed an objective methodology for analyzing media coverage. He did not want to deal with the intifada exclusively so he covered a broad range of issues. It was quite a Herculean task.
“Then Chabot and Enderlin made a major mistake, perhaps out of overconfidence at having survived the incident with L’Express, perhaps out of an aggressive response to that momentary fright. They sued Karsenty for defamation. They already had three suits against the animators of websites who had carried material they considered defamatory. They chose carefully: not Stéphane Juffa who had produced the film, not Gerard Huber who had written a book on the subject, but people who happened to post material at their websites that France 2 didn’t like, non-experts France 2 wanted to intimidate, not argue with.
“By some kind of serendipity, France 2 and Enderlin’s defamation cases all came up over the course of 2005-2006. Karsenty was found guilty the first time around; Pierre Lurçat, the defendant in the second case, was found innocent on technical grounds for having posted material critical of Enderlin; Charles Gouz, the defendant in the third case, was found innocent on two and guilty on two counts for having posted articles by others that were critical of Enderlin; and Nicolas Ciarapica, a Christian blogger, was found guilty of anti-Semitism (!) because he posted an article by Juffa (a Jew) complaining about Jews like Enderlin.
“Initially, Enderlin’s strategy of suing Karsenty worked. Despite a strong presentation (I was one of the witnesses), and no response from France 2’s lawyers-neither Enderlin nor Chabot deigned to even show up-and despite the recommendation of the Procureur de la République in Karsenty’s favor, the lower court found Karsenty guilty of defamation on 19 October 2006. Karsenty’s lawyers had asked to have the rushes shown in the court, but France 2 refused to release them. The judge did not act on Karsenty’s demand.
“But Karsenty was of a different mettle than the others. Alone of those accused of defamation, he appealed the decision of the lower court. That’s where things began to unravel. Once again neither Enderlin nor Chabot showed up, and that may have annoyed the judge, who demanded that Enderlin show the court Abu Rahma’s rushes. In the appeals court, the judge said she wanted to see the rushes-a surprising decision that electrified those who had been following this story and had not seen them. When the court convened to view the rushes, it was packed. Luc Rosenzweig and I testified that we had seen the footage beforehand, and answered questions about how long it was.
“Enderlin brought in eighteen minutes of film material; he made cuts. I was stunned. People had warned me he might do this. And he did. I assumed that when the footage was over, I’d be able to say, ‘He cut scenes.’ The court took what I thought was a recess. I assumed we’d reconvene, and they’d question me at least on whether I had seen things not in this presentation. I was itching to tell the story of the most outrageous scene of faking that had made the cameraman laugh when he saw it with me for the first time. But court was adjourned, and I later found out that Karsenty and his lawyer decided not to push the issue. What would have got Enderlin charged with contempt of court in the U.S., and should have at least elicited a call for him to produce the rest of the tapes immediately, vanished from the conversation.
“Still, what the court did see seems to have troubled them. One scene has a fellow with-at most-a wrist injury being pulled in different directions by his Pallywood handlers to take him hurriedly to an ambulance. In the end they’re almost choking him. Another farce was that Abu Rahma was interviewing Palestinian radicals in front of the Israeli position, with their backs to it. This, at a time when the Israelis were supposedly killing people right and left.
“When the footage of the last twelve seconds appeared, there was an audible gasp in the court. Enderlin had already declared the child dead, but then Muhammad lifted his arm and looked around. Anyone who sees this scene cold recognizes that there is something wrong with the accompanying story. He’s not dead, he’s not even acting injured from a stomach wound. Yet Enderlin went ahead with his story and has maintained it over the years.
“At a later court session France 2 presented a video to explain the rushes. The main judge did not seem to be impressed with either Enderlin’s or Chabot’s explanations. In the lower court the impression had been that Karsenty was going to win, but the judges decided against him. So Karsenty waited very tensely for the judgment of the appeals court that was given on 21 May 2008.
“The court found Karsenty innocent and wrote a decision that included several fairly sharp rebukes of Enderlin for his unprofessional behavior. It found that, in view of the major international impact of the original story, Karsenty had had every right to express his doubts about the authenticity of France 2’s al-Dura report. I hope it will serve as a major statement about the right to criticize the media in the French Republic. It certainly sets a valuable precedent in the coming years, when a ban on ‘Islamophobia’ is likely to make any criticism of Muslims and their myths illegal.
“While this was a landmark judgment, the media in France and abroad hardly gave it any attention. Two Jewish journalists, Nidra Poller-for PajamasMedia and the Wall Street Journal-and Veronique Chemla-for Guysen News International-attended the court session. The process received some attention in France. Elsewhere in Europe there was hardly any mention of it. In the United States the Wall Street Journal ran an editorial on Enderlin and published an article by Poller. Not even Fox News covered the story.
Landes remarks: “This is a very embarrassing document. It reveals the real attitude of the French mainstream news media: solidarity, contempt for the public, from whom they keep secrets that those in the profession know well. ‘What? Me edit staged tapes to make the news? How dare you!’ The document belongs in the same category as Riccardo Cristiano’s letter to Arafat saying it wasn’t his crew that smuggled out footage of the Ramallah lynch and showed it to the Israelis. ‘We would never do such a thing. We always follow the rules of journalistic procedure when working in Palestine.’ The public had never heard of these rules.
“It was interesting to see the reactions that the Nouvel Observateur got when they published this statement of solidarity. Ninety percent of the comments were negative, condemning Jean Daniel, the editor and probably author of the text, and the rest for corporatism, for not addressing the evidence.
“At that point some key players who had long remained silent, spoke up. Elie Barnavi published an article in the French journal Marianne criticizing Enderlin. The French Jewish intellectual Alain Finkielkraut also came out in defense of Karsenty. Apparently, when their intellectual integrity is actually on the line, some French intellectuals will step up to the plate.
“Daniel responded by saying he was in favor of an investigation, but he didn’t seem to be in a hurry. CRIF, the umbrella organization of French Jewry, also called on President Nicolas Sarkozy to launch an investigation into the television broadcast of the alleged Israeli shooting of Muhammed al-Dura. For a while nothing happened, but now France 2 has agreed to a commission of inquiry that will be headed by Patrick Gaubert, the head of LICRA (Ligue contre le racisme et l’antisémitisme). If this commission is honest and fair, this could well be the way the case actually breaks into public awareness.
Landes comments that it is sad to observe the position of the Israeli government in all this. “The al-Dura affair has caused huge damage to Israel. And yet, from the start till now, the Israeli government has shown enormous reluctance to deal with the issue-indeed, they have often acted against those who did. I was invited to give a talk at a major academic institution about Pallywood-not even about al-Dura-and the chair, who was Jewish, called the local Israeli consulate. ‘Don’t let him speak,’ replied the official at the consulate, ‘Landes is a right-winger [sic] and wants to destroy negotiations [sic].’ This prompted an essay on my part about the role of confronting Pallywood in assuring positive results from negotiations.
“It may well have been at the outset that, since the whole world immediately accepted the Palestinian version and the Palestinians were in an uproar, Israel could not immediately react – after its initial apologies – by claiming it hadn’t killed al-Dura. Stating that in the last months of 2000 would have ruined any possibility of renewing negotiations with the Palestinians, i.e., Taba. Viewed retrospectively, it probably would have been a good idea not to try to negotiate by making still more concessions, including the ‘fact’ that Israel killed al-Dura. In any case, the Israeli government’s reaction was apparently that the al-Dura affair was a terrible issue and it should be ducked as much a possible. That was Barnavi’s first response when I spoke to him in 2003.
Landes summarizes the process, of which the al-Dura affair is the epitome: “The Palestinians stage an incident or, as in the Gaza Beach shelling, take advantage of an accident, so as to blame Israel. Then the media distribute the false Palestinian version. The world responds with outrage, and Israel is on the defensive. In this way Israel lost all the advantages it had gained from making sacrifices during the Oslo process, letting Arafat into the territories, giving up territories to Palestinian rule, giving them autonomy, letting Palestinians control their communications, providing weapons to their police force, and so on. All these major concessions have in retrospect only opened new vulnerabilities that Israel accepted for the sake of a peace that continues to elude it.
“Yet, even after Karsenty’s victory, the spokesman of the Israeli Foreign Ministry basically said in an interview that Karsenty should not have expected the Israeli government to come to his aid. Israel had not asked Karsenty to get involved in this and the court case was not related to Israel. The spokesman added that, if Israel got involved in these things, it would turn the entire media against Israel. From a public relations point of view, this would be very bad.
“Ultimately, such an attitude is similar to that of the Jew in Muslim lands as a dhimmi, a subjected, second-class citizen. Israel is afraid to criticize the mainstream media for fear of disproportionate retaliation. Similarly, the mainstream media do not dare criticize the Palestinians because they may retaliate against them. So we have a cycle of misinformation, well illustrated by the al-Dura affair, in which the Palestinians produce Pallywood, the mainstream media presents it as news, and the Israelis apologize and won’t fight back for fear that things will get worse. The big loser in this cycle is the public.
Amnon Lord, “Who Killed Muhammad Al-Dura? Blood Libel-Model 2000,” Jerusalem Letter/Viewpoints, 482, 15 July 2002.
Anat Cygielman, “Dubious Probe of the Al Dura Case Backfires,” www.pmwatch.org/pmw/manager/features/display_message.asp?mid=55.
See the ballistics expert’s report to the French court of appeals, www.m-r.fr/balistique.pdf.
James Fallows, “Who Shot Muhammad al-Dura?” www.theatlantic.com/doc/200306/fallows.
Richard Landes, “Printing and the 16th Century, Cyberspace and the 21st -Lessons from the Past, Thoughts on the Future,” http://digitalarchive.oclc.org/da/ViewObjectMain.jsp;jsessionid=84ae0c5f82408b96643ae4934010b5a39097e056790f?fileid=0000070504:000006276612&reqid=7.
In the sixteenth and seventeenth centuries an international community of scholars and intellectuals arose, independent of the university world dominated by clergy and parchment, centered around printing presses. It became known as the “city of letters” and it is in these circles that the Enlightenment emerged.
Ze’ev Chafets, Double Vision: How America’s Press Distorts Our View of the Middle East (New York: William Morrow, 1985).
Uri Dan, Blood Libel: The Inside Story of General Ariel Sharon’s History-Making Suit against Time Magazine (New York: Simon & Schuster, 1987).
Raphael Israeli, Poison: Modern Manifestations of a Blood Libel (Lanham, MD: Lexington Books, 2002).
This was the argument of France 2’s lawyers in court, of a documentary by the French TV channel Canal+ (http://tempsreel.nouvelobs.com/videos/index.php?id_video=3766), and of Larry Derfner at the Jerusalem Post (www.theaugeanstables.com/2008/05/29/mos-meets-al-durah-forgery-larry-derfner-weighs-in/).
Manfred Gerstenfeld, interview with Andrei S. Markovits, “European Anti-Americanism and Anti-Semitism: Similarities and Differences,” Post-Holocaust and Anti-Semitism, 16, 1 January 2004.
Nick Cohen, What’s Left (London: Fourth Estate, 2007) (www.amazon.com/Whats-Left-Nick-Cohen/dp/0007229690); Bernard-Henri Lévy, Left in Dark Times: A Stand against the New Barbarism, trans. Benjamin Moser (New York: Random House, 2008).
Tamar Liebes and Anat First, “Framing the Palestinian Israeli Conflict,” in Framing Terrorism: The News Media, the Government and the Public, ed. P. Norris, M. Kern, and M. Just (New York and London: Routledge, 2003), ch. 4.
Donna Rosenthal, Israelis (New York: Simon & Schuster, 2008), 70.
For a link to the interview and translation of the transcript, see www.theaugeanstables.com/2007/09/18/background-on-the-rushes-interview-with-jeambar-and-leconte/.
For the best analysis of these events, see Nidra Poller, “Myth, Fact, and the al-Dura Affair,” Commentary, September 2005, www.commentarymagazine.com/viewarticle.cfm/myth–fact–and-the-al-dura-affair-9935.
On Dieudonné, see www.newyorker.com/reporting/2007/11/19/071119fa_fact_reiss; on his trial, see http://lesogres.org/article.php3?id_article=818; on Morin (who was initially found guilty but then exonerated), see http://www.ldh-toulon.net/spip.php%3farticle1389. On “alter-juifs” who judge themselves (or their fellow Jews) through the eyes of the hostile “other,” see the volume of Controverses dedicated to the topic, edited by Shmuel Trigano (www.lyber-eclat.net/lyber/controverses/sommaire4.html).
For all of these developments, see Menahem Macina’s complete list of articles at Debriefing.org: http://www.theaugeanstables.com/al-durah-affair-the-dossier/debriefingorg/.
The eighteen minutes is available at: http:///www.theaugeanstables.com/al-durah-affair-the-dossier/sign-the-petition/; my two video analyses, Pallywood Strikes Again and Pallywood Strikes Again2: France 2 vs. the Evidence are available at: http://www.seconddraft.org/movies.php.
Amos Harel, The Seventh War (Tel Aviv: Yediot Aharonot, 2005) [Hebrew); for translation of a key passage, see www.seconddraft.org/article.php?id=195&a_tit=seventh+war.
Prof. Richard Landes is a medievalist and teaches in the history department at Boston University. He specializes in the origins of European society around the turn of the first millennium. He obtained his BA from Harvard University and his PhD from Princeton University. He also studied at the Ecole Normale Supérieure in Paris. Prof. Landes has published various books and edited several volumes, including an Encyclopedia of Millennialism and Millennial Movements (Routledge, 2000). He is currently completing a volume on millennialism: Heaven on Earth: The Varieties of the Millennial Experience (Cambridge University Press), whose last chapter will treat global jihad. He blogs at the The Augean Stables, and has made available to the public the dossiers of evidence concerning Pallywood and the al-Dura affair at The Second Draft. | 2019-04-23T05:06:54Z | http://jcpa.org/article/the-muhammad-al-dura-blood-libel-a-case-analysis/ |
The 6th Annual Usability & User Experience conference took place at Bentley College on Wednesday, May 23, 2007.
Summary: Once again, everything is exciting. The advent of social networks, APIs, mashups, RSS, aggregators, and folksonomies promise a world where the information and services we’ve always wanted are delivered right to our browser.
However, delivering on the promise is easier said than done. Moving from a great concept to an exceptional user experience proves to be more of a challenge than many people thought. What works on a small scale is a very different story, when put into production.
As Spiderman’s Uncle Ben pointed out, “With great power comes great responsibility.” Just because we can do all these things doesn’t mean we should do them. In the early 1980’s, the cheap availability of laser printers and digital fonts produced a plethora of documents that more resembled ransom notes than professional publications. We could easily imagine designers going wild with the capabilities of this new technology and not using the restraint necessary to ensure they produce an optimal experience.
In this entertaining and informative presentation, Jared will show examples of the usability challenges we face as the web continues to change and evolve. He’ll discuss the implications of “The Long Tail”, the introduction of a mashup mentality in business environments, and how basic techniques, such as usability testing and field studies, change when social network is at the center of the design.
If youve ever seen Jared speak about usability, you know that hes probably the most effective, knowledgeable communicator on the subject today. What you probably dont know is that he has guided the research agenda and built User Interface Engineering into the largest research organization of its kind in the world. Hes been working in the field of usability and design since 1978, before the term “usability” was ever associated with computers.
Summary: Some user interfaces need to behave differently in response to different variables, such as the user’s permissions, product or license configurations, previous actions, and so forth. For example, MathWorks customers have different options for downloading and installing products based on their choices before and during the download / install process and a variety of business rules. As the number of variables increases, it can become difficult to validate a user interface for all the possible combinations. Simply listing the different combinations quickly becomes cumbersome.
The cards can be randomly selected to validate an arbitrary scenario, or the facilitator can select cards to set up a particular scenario of interest.
Using the cards engages and focuses walkthrough participants, making the walkthrough seem more like a game of chance and less predetermined.
Exploring new card combinations can reveal weaknesses in the design that need to be addressed.
Exhausting the complete set of cards through repeated walkthroughs of different scenarios exercises most of the possible paths through the interface, for more thorough validation.
My presentation will address how to create the cards, other materials needed for a walkthrough, how to facilitate, and how to document the scenarios and findings. This presentation is appropriate for usability professionals, analysts, and others who design multi-step processes driven by complex logic.
Bio: Kirsten Robinson is a senior usability specialist at The MathWorks, responsible for research, design, and evaluation for user interfaces for technical computing software. Before joining The MathWorks, she worked on requirements, information architecture, and design for software, web sites, and web applications. She holds a MS in Human Factors in Information Design from Bentley College and a BA in Cognitive Science from Brown University.
Summary: This presentation briefly compares waterfall v. agile development. It states the importance of customer input throughout the development process. It discusses the challenges of gathering input in short, iterative cycles. It presents parallel tracks for development and design based on a case study by Lynne Miller at Alias (Autodesk). It outlines the way we’re implementing the method at Kronos in an agile world. Lastly it recommends several typical research methods and tools that lend themselves well to an agile environment with co-located teams (paper prototyping and interactive issues matrix) and remote teams (Live Meeting and Morae).
Bio: Ann Marie McCarthy is a Senior Interaction Designer at Kronos responsible for implementing a new look and feel across a suite of sixteen web applications for workforce management. Kronos is an agile development environment. Before joining Kronos, Ann Marie worked independently in visual and interaction design roles for software and web site development. Her clients have included Plimoth Plantation, Family Education Network, Bitstream and Oracle.
Participants will benefit most if they have a basic understanding of usability testing, formative studies, paper prototyping, and qualitative data. Mostly, they just need to know what all those words mean, they don’t need any experience in applying those terms.
This will not be an introduction to formative testing, paper prototyping or paper prototype testing or walkthroughs.
An extensible method that can be applied to other situations (e.g., dealing with brainstorming data).
Summary: The presentation summarizes findings from a new UK study of consumer decision-making in personal finance. While the scope of the subject may seem limited (retail financial products in the UK market) it raises important questions about more general shopping behaviours and the limitations of ‘single-site’ user research as a basis for corporate decision-making.
The Online Shopping Survey (OSS) for Finance is an ethnographic study which examines shopping behaviours and attitudes regarding the purchase of financial products including Mortgages, Loans, Credit Cards, Home and Motor Insurance in the UK. It is a unique view of how shoppers piece together the myriad information resources available online in order to arrive at a purchase decision.
The presentation will give a short summary of the research approach then explore four themes drawing on evidence from the study: Brand Visibility, Information Goals, Establishing Competence, and Channel Fluidity. The presentation will conclude by considering how knowledge from ethnographic market studies paint a much richer picture than can be drawn from mainstream user experience tools such as market research, site-tracking data, and user depth interviews. Despite their complexity and cost, market studies offer a very high return on investment to participating corporations.
Bio: Tom Wood is co-founder and Managing Partner of Foolproof, the UK’s third largest independent user experience consultancy. The company is in its fifth year, employing more than 30 people in two offices. Foolproof is proud of its commercial focus, promising clients measurable improvements to their online sales by helping them to understand and meet consumer needs and preferences. Tom is author of the OSS series of research reports one of the largest ethnographic studies of consumer behaviour in online retail environments. This has made him a familiar part of the UK usability scene and a regular speaker at conferences and UPA events.Before Foolproof, Tom ran advertising at Virgin Money, a UK retail financial services company. He pioneered usability in the Virgin group and has been planning, moderating and analysing qualitative research throughout his career. He has a business degree and holds a Diploma in Marketing from the Chartered Institute of Marketing.
Summary: Successful online community creation requires an understanding of both social and technical design challenges. Foundational principles for community come from sociology and anthropology and obviously predate the Internet. I’ll race through some academic background and I’ll illustrate current popular visualization techniques for online and offline community interaction, such as social network analysis (which also predates social networking sites). I’ll then explore some applications of online community from social networking sites to chat and discussion groups, and discuss some important design principles independent of technology. Finally, I’ll wrap up with handy principles for the IA or interaction designer faced with designing “community” in the web 2.0 world.
Bio: Lynn Cherny’s books Conversation and Community (1999) and Wired_Women (1996) were classic web 1.0 studies of online community that were used in many graduate classes, including the MIT Media Lab. Since her research days, she has been a designer and manager at Excite.com, TiVo, Adobe, Mathworks, and Autodesk. She is currently consulting and always happy to give talks and tutorials.
Summary: The intranet is a controlled environment, with a deliciously captive audience. Designing for it should be easy, right?
In theory, it may be. In practice, company politics, budget priorities, and other facts of life interfere with delivering the optimal user experience. What do you do?
In this experience report, we will use MITRE’s case to highlight the issues that affect organically-grown intranets, and discuss what makes intranet design different. In particular, we will examine UI consistency, and discuss the role of standards. We will reveal what has worked for us, and what has not in our efforts to improve the intranet.
Bios: Stan Drozdetski and Sarah Rambacher are interaction designers at MITRE, where they are working on improving the usability, accessibility, and effectiveness of the corporate intranet. Stan holds a M.S. in Human-Computer Interaction from the School of Information, University of Michigan, and a B.S. in Computer Science from Tufts University. Sarah earned her M.S. in Computer Science from Boston University, and a B.S. in Computer Science from Kent State University.
Summary: For certain military mission situations, aviators require ensembles, including gloves, with special protective properties, for example, flame-resistance, cold weather protection, protection against chemical-biological agents, or a combination of properties. More protection frequently impacts upon glove thickness or attributes that can compromise the tactility and dexterity needed to effectively operate an aircraft. An applied laboratory evaluation was conducted to determine if the level of tactility and dexterity demonstrated by two current military protective gloves (“baselines”) could be surpassed by the introduction of novel protective glove designs.
To generate novel concepts, a Government Request for Information was published requesting new aviation glove prototypes composed of one or more layers that would provide the same protective properties as the baselines while minimizing negative impact on tactility and dexterity. Stakeholders met to determine which submissions were worth testing and they formulated additional novel glove concepts by selectively combining component layers among baselines and new submissions. A new inner glove layer might, for example, be paired with a baseline outer glove layer to form a novel glove system. In total, 17 novel glove systems were identified as worthy of testing.
To assess tactility and dexterity, military aviators performed three objectively-scored tasks. They also self-rated their ability to manipulate cockpit controls on aircraft simulator panels and completed self-report surveys. An approach for integrating the objective and subjective data for each glove was applied. Results indicated that there were three novel glove concepts that were standouts in terms of tactility and dexterity performance compared to the other glove concepts – both baseline and novel.
To give attendees an experiential appreciation of the evaluation approach, Dr. Allan would like to conduct one or more audience volunteer “face-offs” (e.g., barehanded versus thin gloves, thin gloves versus thick or multi-layered gloves) on the timed tactility-dexterity tasks. After this demonstration, the methodological challenges encountered during this study will be described and audience ideas for future methodological improvements will be actively solicited.
Bio: Karla Eve Allan specializes in military human factors test and evaluation. After receiving her Ph.D. in psychology from the University of Texas at Austin, she conducted human factors evaluations of U.S. Army vehicles during field tests just prior to DoD purchasing decisions. Since 2004, she has been employed by the U.S. Army Natick Soldier Research, Development and Engineering Center in Natick, MA. There she conducts human factors evaluations of early prototypes of items either worn or carried by Soldiers, Sailors, Airmen, and Marines. Using military subjects, these evaluations assess a prototype in terms of ease of use, comfort, safety, survivability, ability to perform the mission, and compatibility with other gear with which the prototype will be worn. Problems are flagged and design changes recommended. Dr. Allan feels especially pleased when recommended design changes to the prototype are incorporated and – as a result – our fighting troops receive a better product to use.
Techniques for Understanding the User Experience: Usability is not Enough!
Summary: What techniques are available to understand the user experience on web sites, and especially on complex commercial web sites? How can we obtain a comprehensive understanding of the user experience when users differ from each other so dramatically? Traditional laboratory-based usability evaluations are certainly necessary, but far from sufficient.
Based on almost ten years of experience working on SuperPages.com (an online yellow pages and shopping resource), I’ll describe a comprehensive program for understanding the user experience. I’ll describe the different techniques we’ve used, their strengths and weaknesses, their costs in time and money, and present some interesting examples and anecdotes. I’ll argue that no single methodology or source of information is sufficient, and that for a comprehensive understanding of the user experience, information from multiple sources must be combined. I’ll explain why both qualitative and quantitative techniques are required, and suggest that for many products and services some custom techniques should also be developed.
I will discuss usability studies (with novice, experienced, and special populations), comparative studies, field studies, the analysis of direct user feedback (i.e., email sent to the site), basic log analysis, and the use of a panel of experts over many months (diary studies), and discuss the use of Personas and two extensions to the basic log analysis work: the use of discrete choice models to understand the factors that influence the selection of listings on a search results page, and the tracking of user behavior based on log data both within and across sessions.
Although the user experience research program I’ll describe was tailored for commercial business-to-consumer web sites, I’ll end by presenting the basic principles behind it, and by discussing how it can be modified for use in many other domains. As an example, I’ll briefly describe our current work on DSL and FiOS installation and on the use of broadband value-added services such as online backup and sharing.
Bio: Demetrios Karis led the SuperPages.com User Interface group at Verizon Labs for almost ten years. He is now part of a team working to understand and improve the Verizon broadband customer experience (from DSL or FiOS installation to the use of value-added services such as online backup and sharing). Before SuperPages, Demetrios worked on a variety of telecommunication products and services, including Airfone and a number of speech-based systems (including both IVR and ASR technologies). He also carried out applied research. Demetrios has a BA in Psychology from Swarthmore College and a Ph.D. in experimental psychology from Cornell University. After Cornell, he spent five years doing basic research in the Cognitive Psychophysiology Laboratory at the University of Illinois (Urbana-Champaign) before moving to industry, first at Grumman Aerospace, and then at GTE Labs, which became Verizon Labs after the merger of GTE and Bell Atlantic.
Summary: Building a User Experience team from the ground up is a great challenge within any organization. Often the traditional obstacles in the early stages involve justifying the team’s worth to executives and trying to educate product teams about the role of the team and how and why user experience adds value to the process. When first joining salesforce.com I expected to spend my first six to twelve months dealing with these very challenges, but it was a very different story.
Strategies to deal with the demand.
A focus on hiring. We recognized that we need to expand the team and find experienced talent that could hit the ground running.
We transitioned from chaos, to weekly feature team meetings to agile development. Making these transitions did not come without bumps in the road. Being successful meant we need to vocalize the needs of our team and make sure they were factored into new the process.
Moving from start-up mode to a mode with more process, without slowing the team down was a challenge. We recognized that there were some areas were we wanted to formalize our processes, but in other areas we decided to let each team member do what works best for them. For example, each designer creates prototypes in whatever medium is most comfortable for them.
We still struggle trying to find time for infrastructure related activities such as, documenting our processes.
We have decided that the team will remain as a centralized group, but we still struggle with the question of where should the team live within the organization? We have had a number of homes within different departments, but we are still searching for the right fit.
Bio: Catherine Courage is the Usability Program Manager at salesforce.com. She joined salesforce.com in 2004 as the founding member of the User Experience team. Today she manages a rapidly growing team of usability analysts, and is a key member of teams responsible for leading the rollout of agile development and for accessibility compliance. Prior to joining salesfore.com she worked at Oracle as a Principal Usability Engineer and manager of the Customer Design Partners Program. Catherine is the co-author of the book Understanding Your Users. She is an active member in the Human-Computer Interaction community and frequently attends and presents at conferences such as UPA, CHI and HCII. Catherine graduated from the University of Toronto with a Masters of Applied Sciences specializing in Human Factors.
Summary: Disaster is in the air! A stuffed cat dangles precipitously from a fake palm tree frond, a scant sixty seconds away from falling to the earth. A few feet away, unbeknownst to its hypothetical passengers, a cardboard train is about to encounter an enormous boulder lying in its path. Who could avert one, let alone both, of these impending catastrophes?
Come see for yourself, how SuperUser participants at the 2006 World Usability Day rose to the challenge. Or, better yet, create and test out your own SuperUser powers.
Bio: After being inspired by the vision of Chris Hass, Mary Weinstein conspired with UI Designers on her team, Chris Gibbons and Juan Gomez, to bring SuperUser to life for World Usability Day 2006 at the Boston Museum of Science.
Mary developed and currently leads the user experience team and is responsible for consumer websites at MetLife Auto & Home in Warwick, RI. For more than 10 years, she has managed web design and development efforts for major clients and companies, including Dell, GM, Minolta, and IBM, among others.
Summary: Web 2.0 has created a completely new environment for both technology implementers and marketers – an environment with new rules and challenges, as well as tremendous possibilities. Online marketers are faced with creating user-friendly applications in a new digital world, while meeting consumers’ increased demands for greater interactivity and control. To accomplish this and maximize the rewards, companies must understand the critical importance of the entire user experience (UX), as well as the audiences they serve. Consequently, user-centered design techniques are being adapted to embrace new technologies, and online marketers are challenged with delivering a rich, immersive brand experiences online.
During this presentation, you will hear from two experts who will share their insights into the ways in which companies are developing, delivering, and evaluating creative online experiences.
First, Beth will discuss the continuing convergence of marketing and usability toward a more holistic user experience model. Using case studies, she will illustrate how companies are leveraging UX in brand strategy, through multi-channel marketing and interactive experiences such as brand micro-sites. She will discuss the need to adapt traditional research techniques to address the unique nature of these digital experiences, and share tips for how you can do so in your organization.
At the same time, rich internet applications (RIAs) are playing an enormous role in the new digital world by offering users a more interactive, application-like functionality. Gessica will demonstrate how organizations are leveraging the benefits RIAs to increase customer satisfaction and ROI. In addition, she’ll share tips on usability testing for RIA applications and creative ideas on how to integrate them into your site’s design.
Beth Loring has 20 years of experience consulting on product design and usability, with expertise in the areas of user needs assessment, user interface design, usability evaluation methods, and ergonomics. She has both designed and evaluated consumer products, web sites, software applications, and medical devices. Beth also been a faculty member in Bentley’s Information Design certificate program since 2001. Before joining Bentley, Beth was a Principal Research Scientist at the American Institutes for Research, and before that she spent five years as the human factors team leader at IDEO Product Development in Boston. Beth holds an M.S. in Engineering Design from Tufts University and is a Certified Human Factors Professional. She has published extensively on usability and is co-author of a case study in “Understanding Your Users: A Practical Guide to User Requirements” (Morgan Kaufmann Publishers, 2005). Beth is past chair of both the New England Chapter of the Human Factors and Ergonomics Society and the Greater Boston SIGCHI.
For nearly a decade, Gessica has developed and contributed her expertise in user experience strategy, information architecture and user information design. Within these fields, she specializes in the niche areas of interaction design for consumer and B2B web sites and web-based applications; in particular she yields a deep knowledge of rich internet applications and guided selling as it relates to the customer experience and the user dialog. She has provided this unique insight to countless projects for renowned brand name companies in the retail, healthcare, and financial services industries. During her tenure with Molecular, Gessica has led many high-profile Web projects and contributed her expertise to many prominent companies including PerkinElmer, Fidelity, Boston.com and Polymedica.
Prototyping Tools: Does Fidelity Really Matter?
Summary: Our field has established a conceptual model of prototyping techniques as described by high and low fidelity prototyping. A common assumption is low fidelity prototypes should be used early in the process and that high fidelity should be used later. In this discussion we will introduce the “it depends” factor and explore the various approaches to prototyping and the factors that go into determining the best tools and approach to use. We will also focus on common software based solutions and explore their utility in addressing the various real world scenarios.
Michael Ledoux has spent the last twenty years in software development as a programmer, an information architect and as a usability engineer. Over the years he has worked for IBM, BMC Software and Varian Semiconductor. Michael is currently the senior user experience designer for Nexus Energy Software. He will soon be graduating with his MS in Human Factors and Information Design from Bentley College and holds a B.S. from Northeastern University. Michael is an active member in the Boston UPA chapter; this will be his 3rd Boston UPA presentation.
Adam Hoffman is a user experience designer at Bank of America, responsible for the user interface and workflow of online corporate banking applications. In previous roles, Adam represented users and elevated usability while managing the design and development of rich media, interactive websites and e-learning products. He has experience in a variety of industries including banking, healthcare, electronics engineering and information technology. Adam holds an M.S. in Human Factors in Information Design from Bentley College and a B.S. in Studio Art from New York University.
Summary: Complex software applications are collections of tools and subtasks integrated into work sequences with varying degrees of success. The effectiveness of IntelliJ, PhotoShop, or MS Word is less than the sum of their parts due to problems arising from the need for user focus to shift between tools, and the difficulties in ensuring that tools work well together.
Usability techniques concentrate on one-task tools which solve steps in a linear workflow. Tests of complex software proceed tool by tool despite the fact that users apply the tools in different ways, with different frequency, in a different sequence, at different times. Treating components as isolated tools is seductive because there are always plenty of usability problems to be found.
The key to multi-tool usability is in the transitions to the right tool at the right time, every time, ensuring steady focus on the work, not the tools themselves. By comparing salient points of more successful and less successful workflows and tool usage we expect to demonstrate 1) how to help users make better transitions and transition decisions, and 2) to facilitate the transfer of critical information between tools, making the design of more productive and creative sets of integrated software elements.
This session will offer example problem transitions drawn from help and documentation tools and will identify new research topics and tools. It offers practitioners techniques for examining the usability and productivity implications of choosing and switching between tools in a complex software environments. Researchers will benefit from techniques for creating and administering open-ended tasks and a data-capture protocol.
Bio: Will Schroeder has spent seventeen years designing and testing hardware and embedded software at Foster-Miller, Inc. Twelve years as Principal at User Interface Engineering – usability consulting and research on hardware, software, and the web. Principal Usability Specialist – The MathWorks – since 2005.
Exploratory Data Analysis (EDA) Techniques. EDA is a branch of statistics pioneered by Statistician John Tukey. EDA is a technique for examining data and generating (not confirming!) hypotheses about the causes of a particular phenomenon. The key tools in EDA are simple representations that include: Box-and-whisker plots, Stem-and-leaf plots, Pareto charts (a staple of quality engineering and summative usability engineering), Bubble charts – a way for displaying 4 variables simultaneously, and Radar plots.
Techniques for prioritizing data. How do we prioritize problems from usability testing or brainstorming data. We’ll examine techniques like threshold voting, Q-sorting, decision matrices, and other approaches for prioritizing data.
Qualitative Data Analysis. Many usability studies and surveys yield large amounts of qualitative data. Usability practitioners are often familiar with affinity diagramming as a way to organize data, but there are other techniques for getting deeper into the qualitative data. We will look at techniques like data coding, event listing, content analysis, triangulation, and matrix analysis.
Bio: Chauncey Wilson is a Principal Consultant for WilDesign Consulting and instructor at Bentley College with more than 25 years in the field. Chauncey has presented at CHI, UPA, HFES, and STC conferences and has co-authored chapters in the 1997 Handbook of HCI, and Cost-Justifying Usability, Second Edition: An Update for the Internet Age, Second Edition. He is currently working on a Handbook of User-Centered Design Methods and authors a bi-monthly column, The Well-Tempered Practitioner, for the ACM SIGCHI Interactions journal.
This session will provide attendees with updates and analysis about the field of persuasive technology in summary form. It represents a new style of MiniUPA session: a State-of-the-Industry Update.
Bio: Carolyn Snyder is an independent usability consultant. For the first decade of her career, she worked as a software engineer and project manager. In 1993, she joined User Interface Engineering, where she worked with UIE founder Jared Spool for the next six years. She started her own business, Snyder Consulting, in 1999. Carolyn has conducted hundreds of usability tests on dozens of interfaces over the past fourteen years and has become the world’s leading authority on paper prototyping. Her book Paper Prototyping was published in 2003, and Carolyn is co-author of two other books on web site usability. Carolyn holds a BS in computer science from the University of Illinois and an MBA from the University of Chicago.
Summary: The goal of the session is to discuss trends, observations and best practices for innovation. How can an organization facilitate the type of user experience innovation that will positively effect the business? How can an individual contribute to create a climate for innovation where perhaps they have very little control in the overall process?
This highly interactive discussion will begin by defining “innovation” in the context of current technology trends and weigh it against other factors such as consistency, creativity, and profitability. Then we will discuss techniques and challenges associated with fostering innovation, the feasibility of “innovation on demand” and the defining characteristics of collaborations that result in innovation. The discussion will lead to a group analysis of factors that support innovation, and the politics associated with enabling and institutionalizing innovation.
Bio: Amy Cueva is co-Founder and Chief Experience Officer at Mad*Pow, an interaction design firm based in Portsmouth, New Hampshire. She has extensive experience in user experience design, interface design, information architecture and usability. As the designer of Mad*Pow’s user centered design methodology, she has facilitated the business intelligence, research, analysis and strategy to create award winning user experiences for various clients including Monster.com, Starwood Hotels, Fidelity Investments, Aetna and Timberland.
Experience Design—what can we learn from games design?
Summary: While most of our experience design focuses on web applications, graphical user interfaces and web sites, there is a whole other world creating highly engaging interactive experiences: the world of games. This presentation explores the way games are designed to deliver engaging experiences, looking primarily at user interface details such as: how are errors presented and dealt with, certainly not pop-up dialog boxes. How does the user interact with the game? Not always through a cursor floating across the screen. How is navigation and orientation handled? There are no global nav bars.
If time allows, the presentation may also touch upon the process of game design, exploring user research, how is storytelling applied and is user evaluation the same or different?
Popular games, both multi- and single- player games, will be used as examples. This talk will also draw upon some of the underlying principles of Csikszentmihalyi’s concept Flow as a way to focus the discussion.
Bio: Sarah Bloomer has been creating user interface designs for nearly 20 years. She cofounded The Hiser Group in 1991, an interaction design company based in Australia. With Hiser, she helped establish the field of user-centered design, built GUIs across multiple platforms, and designed web applications and websites for corporations and government. After 4 years as a senior interaction designer for The MathWorks, Sarah set up Sarah Bloomer & Co to focus on design research and design facilitation. Sarah has delivered papers, tutorials and workshops at HCI conferences in Australia and the USA. Sarah worked with games designers while a masters supervisor at the Royal Melbourne Institute of Technology in the Animation and Interactive Media Program.
Summary: How do you produce a usable design from a 500 page software requirements document? How do you stay ahead of technical advances and balance technical constraints? Rich internet applications (RIAs) have changed the way designers produce design specifications. Agile development method usually means quick iterations with no time for traditional lab testing. What if you could create an iterative living document that captured requirements through participatory design sessions? What if you could capture subjective emotional responses by evaluating user reactions remotely? WireTags may be a methodology to help drive design direction throughout the design life cycle.
WireTags for Rich Internet Applications enable you to: build communication between teams by creating click-through wireframes; facilitate the transition of a living document between requirements gathering, design, and testing; and document subjective reactions to comparative designs, thus providing tangible “show & tell” results to stakeholders. This presentation will cover WireTag design: how to create a component library and WireTag evolution: showing how “free play,” “reaction tagging,” and “show and tell” activities enhance designs.
Rachael completed her undergraduate degree in computer science at Boston University and undertook graduate level coursework in HCI at Tufts. She has since championed user-centered design processes at various software development companies. Rachael’s area of specialization is in the use of hi-fidelity wireframes, and developing UI components using style-sheets. During her ten year career, she has worked in various environments including multimedia e-learning, the insurance and energy industries, portal and e-commerce software development, and finance. Rachael is currently a Usability Specialist at Fidelity Investments.
Jacqueline is a Bentley HFID alumna and has been working as a user experience consultant for four years. She has worked with Microsoft, Staples, HRBlock, Fidelity Investments, and Wipro. Jacqueline has worked in all phases of development, including Ethnography, Requirements Definition, Information Architecture, Interface Design, and Usability Testing. Prior to joining the usability community, Jacqueline worked in film and technology as a producer, project manager, writer, and designer.
What Makes User Interfaces Intuitive and Innovative?
Summary: Do clients ever ask you, the interaction designer, to come up with an intuitive yet innovative design? If so, what exactly does that mean? In this presentation, the presenters and the audience will explore what makes a design “intuitive”, and how that seemingly contradicts innovation. We’ll also talk about what we can really rely on as designers to create these in-demand interfaces: things like Gestalt laws and physiological perception. Sound dull? Naaaa. We’ll quickly introduce the textbook definitions, move right along to some fun examples, and then discuss some best practices that designers can leverage. Have some intuitive designs to share? Bring them along!
Jen Hocko – While still at the University of Hartford working towards a B.S. in Computer Science and Professional &Technical Writing, Jen started her career as a Web designer / developer and worked at a few small to medium sized design firms. (This is back when banks had static pages and tables were popular for page layout!) Jen left the Web scene after a few years to become a technical writer for companies like Pfizer Central Research and BEA Systems. A few years after that, she decided that it was probably easier to fix the UIs instead of trying to explain them to death. As a result, she got her M.S. in Human Factors in Information Design from Bentley College and basically came full circle. Jen is currently a Senior Usability Specialist working on improving web-based business applications at The MathWorks, and in her spare time she enjoys exploring the theoretical underpinnings of what we practitioners do.
Jen McGinn – Jen McGinn is a User Experience Engineer in the Software Experience Design (xDesign) group at Sun Microsystems, in Burlington, MA. She has written branded interaction guidelines for installation, developed personas for Sun Learning Services, and simplified the user experience with the Java Enterprise System. Jen has worked for Sun for over 11 years in user experience, technical training, and technical writing. Before joining Sun, Jen led other lives as a software developer and system administration consultant. She holds a BS in Information Systems from UMBC and an MS in Human Factors in Information Design from Bentley.
Multiple Evaluations, Varied Findings: Good News or Bad News?
Summary: Nielson has claimed that using multiple evaluations of different kinds will reveal more usability issues than using one evaluation method alone. Most practitioners in the area of usability would accept this point. However, we rarely have the opportunity to demonstrate the reality of the statement. This presentation will discuss a pair of recent studies, conducted on the same product within weeks of each other, will highlight the difference in findings and discusses the pros and cons of conducting multiple tests.
Presented as a case study, the session will include a detailed discussion of the two techniques used, one being an independent in-home study and one being a more formal usability test and why the session types were chosen.
Special focus will be placed on the test results. The presentation will cover specific findings from both of the tests, including common issues and unique findings. The potential causes for these variations will be examined and the significance discussed.
The session will end with a discussion on the advisedness of conducting multiple types of assessment and conditions under which the two techniques discussed in this session might be used.
Cay Lodine has spent the last 13 years advocating for the user in the fields of software and internet product development. Her primary work has been in usability and interaction design for consumer products. Experienced in a wide variety of techniques for collecting and analyzing user input, Cay has provided user insight into the development process for projects ranging from installed software, media products and internet applications.
Summary: As usability professionals, we have a harder time explaining what we do than, let’s say, accountants. Our best attempts at explaining usability often meet with responses such as “You make things user friendly? They pay you for that?” and “Human Factors? Do you mean Human Resources?” We all have a responsibility to evangelize usability in the workplace as well as in our daily lives. How do we explain what we do in a way that is easily understood by people outside the industry, without trivializing the value of what we do (or our value for that matter)?
If you cringe every time somebody asks you what you do for a living, come to find out how usability luminaries, and…well…how we can address this thorny issue. We will share tips from seasoned user experience professionals on explaining the job we do – along with some video clips of them in action. We will also share our own perspectives on the key aspects of effective explanations of usability. You will come away with the skill to deliver the ideal usability pitch in any situation, whether it be a job interview or a cocktail party.
Debbie Cook is a member of Bentley’s MS+MBA program, pursuing a Master of Science in Human Factors in Information Design in addition to an MBA. She earned a Bachelor of Science in Business Administration from The College of New Jersey and worked for over ten years at Bloomberg Financial Markets before returning to school to earn her master’s degree at McCallum Graduate School.
Eva Kaniasty is working toward the MS in Human Factors in Information Design degree at Bentley College, and works at the Bentley Design and Usability Center. She holds a BA from Boston University in Psychology and a Certificate in Client-Server Programming and Web Development from Clark University. Her past work experience includes web design and programming in the non-profit, healthcare, and corporate sectors.
Andrew Wirtanen is a usability specialist and web developer working at the Bentley Design and Usability Center and at The MathWorks. He holds an MS and BS in Information Technology from the Rochester Institute of Technology, and is working toward the MS in Human Factors in Information Design at Bentley College.
Summary: Blog software creates an extremely easy way to rapidly publish content to the web. These platforms allow authors to easily create text, images and video, categorize that content around multiple facets, syndicate that content and allow users to respond and interact. However, most blogs interfaces tend to be too raw and free-form for traditional corporate marketing goals. We will approach these ideas from a theoretical standpoint, but also rely heavily on some case studies and examples of best practices. We will focus particularly on the recently-launched Ford Global Auto Show site.
Bio: Jason has spent the past eight years creating online experiences that focus on users while fulfilling client needs. By understanding business drivers and measures of success on the one hand, and motivators and usability patterns of target personas and segmentation on the other, he is able to envision new modes of interactivity. The results are innovative solutions with improved interfaces that generate measurable ROI.
Among other clients and companies, he has worked for Fidelity and Staples as an Information Architect at TVisions; the Lincoln Center and Akamai as a Principal Experience Designer at ZEFER; Royal Caribbean as Lead Information Architect at Arnold. Jason is currently working with Ford, TimeWarner and Boston Scientific as a User Experience Lead at Avenue a | Razorfish. Jason holds a B.A. in Philosophy from Bates College. He does not like saying Web 2.0, paradigm, or low-hanging fruit.
Summary: Stories provide a way to understand the world around us. Useful data can be extracted from people’s stories that can lay the groundwork for user product requirements. The presentation is for usability professionals, designers, researchers and product developers, and anyone how can benefit from gaining better understanding of other people through their stories.
People tell and listen to stories for many reasons, but the most common reason is to make a connections, to bring people out of their own world, to share feelings and ideas and to understand something. When we look as stories people tell about their leisure time, their struggles and fears, we can understand what their problems are and then, how we can design or develop technology products and services that truly meet the needs of their users. These stories, when examined carefully, can provide data which can translate into customer needs and issues.
People navigate through their world by using knowledge that is commonly held, such as when you drop something it falls, water feels wet, etc. This type of information is informing a new area of study in artificial intelligence called “Commonsense knowledge” and is opening up new ways to provide computers with information about people and the world. Commonsense knowledge can be derived from stories and be used to develop a system that learns from stories that people tell. This talk includes some of my previous work on Customer Scenarios and Commonsense Knowledge, but builds on it by adding information about storytelling and how that can produce customer requirements. I will also provide a template for the storytelling process and creation of the requirements.
Bio: Elizabeth Rosenzweig is Principal Consultant at Bubble Mountain Consulting company where she conducts user centered research, design and development of software and technology products and services.. Previously, she was a Principal Research Scientist at Eastman Kodak Company for 14 years where she built the Boston Usability Lab. Elizabeth holds a MS from the MIT Media Lab and has over 20 years experience in user centered design, technology transfer and team collaboration techniques. She holds 4 patents for unique and intelligent user interface designs. Elizabeth is Founder and Director of World Usability Day. She frequently publishes in industry journals and presents at conferences around the world.
Summary: In this talk, I will describe a new way to perform heuristic evaluations, which allows multiple evaluators to easily compare and combine the results of their reviews. This method was developed to provide a single, reliable, result to the client, but it also allowed us to easily negotiate differences in our findings, and to prioritize usability problems identified by the evaluation. An unexpected side effect is that, by using this evaluation method, the practitioner can measure and predict the effect of usability improvements.
Bio: Jen McGinn is a User Experience Engineer in the Software Experience Design (xDesign) group at Sun Microsystems, in Burlington, MA. She has written branded interaction guidelines for installation, developed personas for Sun Learning Services, and simplified the user experience with the Java Enterprise System. Jen has worked for Sun for over 11 years in user experience, technical training, and technical writing. Before joining Sun, Jen led other lives as a software developer and system administration consultant. She holds a BS in Information Systems from UMBC and an MS in Human Factors in Information Design from Bentley.
How do you get buy-in from developers/PLs?
How big are your typical project(s)?
Any politics working for/against you?
What was your first project? First Success?
Bryn Dews is the Team Lead for the User-Centered Design group inside MITRE’s IT division. Starting in 2000, she was the proponent for bringing Human Factors engineers inside IT to be part of development teams. She was rewarded with a team of four Human Factors engineers in May 2003 and the team has grown in both size and accomplishments ever since.
Manya Kapikian is a Research Associate in the Design and Usability Center. She graduated from Simmons College in 2001 with a MS degree in Library and Information Science. She has work experience in academic, non-profit and corporate sectors. Currently, Manya also works on enterprise search at Raytheon Company. Manya also holds a BA from Northeastern University and is currently pursing an MS in Human Factors in Information Design at Bentley College.
Joshua Ledwell is User Interface Product Manager at Salary.com. An interactive professional with ten years of experience, he has applied design and usability expertise at consumer, small business, and enterprise businesses. He is currently enrolled in the Bentley College Human Factors in Information Design masters program. Visit his blog “Compete on Usability” at http://joshualedwell.typepad.com/.
Summary: User Experience design is understood to refer to the design of interactive software, yet we have experiences with all manner of things in our lives: products, stores, processes, forms and entertainment. This panel will bring together practitioners who can debate how user centered design techniques are applied across industries. What can we learn from each other?
Panelists will include UX experts from fields including industrial design, store design, process design and, of course, software design.
Sarah Bloomer has been creating user interface designs for nearly 20 years. She cofounded The Hiser Group in 1991, an interaction design company based in Australia. With Hiser, she helped establish the field of user-centered design, built GUIs across multiple platforms, and designed web applications and websites for corporations and government. After 4 years as a senior interaction designer for The MathWorks, Sarah set up Sarah Bloomer & Co to focus on design research and design facilitation. Sarah has delivered papers, tutorials and workshops at HCI conferences in Australia and the USA.
Steve Mulder is Principal Consultant in the User Experience group at Molecular (an Internet consulting firm in Boston), author of The User Is Always Right: A Practical Guide to Creating and Using Personas for the Web, and a regular speaker at web conferences. With over ten years of experience in user research, information architecture, interaction design, and usability, Steve practices what he preaches by delivering successful user experiences that drive business results. He has brought his expertise to a wide range of companies, including Morgan Stanley, PC Connection, 3M, CVS, Estee Lauder, Talbots, Wired, Terra Lycos, and ZDNet.
Amy Cueva is co-Founder and Chief Experience Officer at Mad*Pow Media, an interaction design company based in Portsmouth, New Hampshire. She has extensive experience in UX design, interface design, information architecture and usability. As the designer of Mad*Pow’s user centered design methodology, she has facilitated the business intelligence, research, analysis and strategy to create UX designs for clients such as Monster.com, American Express, Fidelity, Aetna and McGraw Hill Publishing.
Aaron Oppenheimer is a Principal in Continuum’s product innovation group. His career has been a zigzag through electrical engineering, software development, human factors design, and product design, before ending up in a position where he applies all of these in the creation of coherent user experiences. He developed the “Product Behavior” discipline at Continuum, working for clients including General Motors, Sunbeam, Sprint, OXO, and Pepsi, as well as numerous start-ups in medical and consumer products. He enjoys simplifying the complicated. Aaron is a regular speaker at interaction design and design research conferences.
Tom McCann is responsible for providing usability and human factors support to the Staples Retail business and its Branded Products Group with a focus on making the shopping and purchase experiences as ‘easy’ as possible for our store customers. Tom’s approach to usability has been significantly informed by his early work experiences as an assessor of the impact of the design of military equipment on operator performance. During this period of his career he witnessed the impact of confusing targeting information on the accuracy of tank gunnery operators, the frustration that poorly designed keypads can provoke in radio operators, and the devastating loss of face of his inability to accurately interpret direction and distance data displayed on ‘state of the art’ navigational equipment while wandering (it seemed like forever!) in heavily wooded Australian hillsides. Since successfully managing to work out how to leave the military, Tom has worked in Consulting, Financial, Telecommunications, Software and Retail industries in Australia, India, and the USA and holds a Masters Degree in Psychology from the University of Sydney, Australia.
Summary: “Five users are enough” has become a guideline for usability practitioners and it has been widely followed. However, in the research domain, “how many users are enough in usability testing/evaluation” has been in a debate among researchers.
The presentation will first review the research by previous researchers and discuss about the problems with the previous research. Then it will describe a more complete model on the sample size issues in usability testing to address the limitations in the previous research. The more complete model includes five sections: severity levels (the difficulty levels users have with a certain user interface component), distribution of users at different severity levels (the proportion of users that are each severity level), impact (the effect of having less than perfect usability for a given user interface component), benefit (the reduction in the impact from pre- to post-improvement of a given user interface component), and decision-making (prioritizing the problematic user interface components for improvement). Examples will be given when describing each section of the model. After that, an empirical study and sample simulations will be presented. The purpose of doing the empirical study is to give real-world examples to the more complete model and to provide guidance in choosing parameters for simulations. This empirical study involved the usability testing with a very large sample size (N= 103). User performance on each interface component of the two products was obtained. Simulations are done by randomly drawing users of different sample sizes from 103 tested users in order to demonstrate the influence of sample sizes using the more complete model proposed in this presentation.
To sum up, this presentation is aimed at proposing a more complete model on the sample size issues in usability testing. With a big picture in mind, usability professionals can make an informed decision on how many users to test in a real-world case.
Bio: Minmin Yang is currently a Ph.D. candidate in the Human-Computer Interaction program at RiceUniversity. Her research and professional interests include quantitative usability methodology, interaction design, and user experience research.
Summary: Like most projects central to User Experience professionals, Tango – H&R Block’s new consumer online tax preparation product, offers two important stories: product design AND managing product design. While clearly dependent, the business of usability (management) and the practice of usability (design) presented very unique and distinct challenges. Project Tango was a meaty stew of conflict, design process, celebrity consultants, ego, cultural differences, expectations and hype, a case study from the minute it kicked off. Gregg Almquist and Chris Whelan will share their experiences from working on this high-stakes, high-drama project in which doing best by the user required a delicate balance of cunning and patience. | 2019-04-22T04:41:18Z | http://uxpaboston.org/events/usability-user-experience-2007/ |
When we are communicating through language, we are participating within the limits of a specific sensory frequency range which is then decoded by the thinking mind to determine meaning at a certain level of the conscious mind. This applies to both verbal and written frequencies. Language is limiting because it can never relay the full essence of experience. Its frequencies reduce pure meaning to an approximation of experience.
The awakening and remembering of our infinite Divine consciousness is a frequency of meaning, existence, and being that is beyond the generalized limits of language. Therefore, we can never use language as the means, teaching, or manual to the awakening of our true infinite consciousness. We can use language to guide, offer insights and feelings on direction, and to develop context for the experiential journey. It is all information and energy that may or may not resonate with the experience of unique souls who are at various sequences in their journey.
Because humanity has been living within a disharmonic frequency of a false restricted fear-based consciousness of conflict, control, and separation for many thousands of years, humanity has been veiled from full Divine awareness within incarnate form. Without this awareness, we are not experiencing and expressing our infinite consciousness on Earth. The fear-based operating system of the mind conditions a consciousness that identifies with the mind contents of limiting beliefs, emotions, and traumatic experience. This identification with contents is then experienced as the restrictions of energy in the body. The primary identification with the limited frequencies of language is part of the current personal identity operating system of the mind, and has been designed to keep humanity operating in a narrow consciousness range of external identification through the experiences of the bodymind.
With the primary awareness of our being through a language dependent system, humanity is veiled from its true infinite Divine consciousness. This consciousness is nonlocal. It is an ultimate simplicity experiencing as an infinite complexity. The existing frequencies of language are not capable of expressing either the simplicity or an infinite simultaneous complexity of meaning. When we use language to assist our awakening and remembering who we truly are as infinite Divine being, we are using limited tools to open to a higher frequency.
When we write or speak about awakening to Divine awareness, we are endeavoring to provide insights and direction to an action that exceeds the capabilities of language. With regard to the infinite consciousness that we are, there is no direct “how to” at the level of language. Through language we can offer insights, feelings, and experience that may assist the journey. These can include meditations, worldviews, healing modalities, etc.
Through the medium of language, we can receive and transmit insights on how the infinite consciousness, mind, and body emanate as a unity. We can express ways of working at the physical body level, the subtle levels of mind, and the interaction of the heart as an interface between the bodymind and infinite consciousness in soul and spirit. With language, we can also point toward an experience of Divine awareness that is beyond words.
However, the language form of processing meaning to experience can never fully capture the infinite complexity of all the frequency systems. The experience of healing, transforming, awakening, and remembering is not reducible to written or verbal communication. As we awaken to our true Divine humanity, we will express a knowing intelligence of the higher mind within the heart through the physical body. This heart-centered infinite consciousness is beyond the operating system of the personal identity mind of thinking and its limiting content programs—it is a higher mind of knowing and doing.
Through language, we are using a lesser vehicle of expression to offer a general guidance on the experience of healing and transforming the bodymind, and awakening to our true Divine humanity incarnate on Earth. We are also communicating a resonant frequency of the higher mind in the heart that transcends the meaning that can be conveyed by the mind’s perception of only the narrow frequencies of the language itself. As we read and learn from others through their communications on awakening to infinite Divine consciousness, let us keep in perspective the role that language is playing in this process of Divine awareness and shifting frequencies.
For thousands of years, humanity has been living a veiled existence on Earth. This frequency veil has hidden the knowledge of our true being that is infinite Divine consciousness. The fear-based cultural system of conflict, control, and separation has conditioned awareness to identify at various levels of the continuum of body and mind. In this time of shifting frequencies, humanity on Earth has the opportunity to move beyond all false identification of external belief systems, and awaken to the pure inner knowing of our Divine awareness within soul and spirit.
In truth, our infinite consciousness is our seamless unity with the mind and body. The bodymind is part of our infinite consciousness continuum for experiencing and expressing love and creativity in this frequency dimension of the universe on Earth. The error of the false matrix has been to condition an identification of the whole self within a certain frequency range of the mind and body. As we awaken and remember who we really are, we will know our true human nature as infinite consciousness. We will then be able to express that consciousness directly within the mind and through the body.
The human being on Earth is one unified Divine infinite consciousness expressing this awareness as organized frequency patterns of mind and body. Thus, we are one consciousness of the Divine infinite that is creatively emanating through two main energetic frequency domains of body and mind. Our true being of infinite consciousness is spirit and soul. As we awaken, we will remember and know how we express on Earth as Divine infinite consciousness, mind, and body.
When humanity became infiltrated by a restricting fear-based consciousness, the core disruption occurs at the level of the mind. If we use the computer analogy, which is not entirely accurate, but is helpful in our transition of recovering knowledge, the body and mind is a consciousness and energy bio-computer that is a receiver/organizer/transmitter of information. The physical body is hardware—structure, central processing unit, and hard drive memory. This includes sensory awareness, the major consciousness organs of heart and brain, all systems such as the nervous and endocrine systems, DNA, and cellular awareness or memory. The mind is the software—operating system and content programs. The operating system is the overall belief of either our personal identity or our infinite being, and the content programs are our beliefs, emotional encodings, experiences, and secondary defense mechanisms and patterns of action.
The infiltration into the human system occurred within the operating system of the mind. The true operating system of the mind is an awareness of infinite consciousness that can support the intentions, thoughts, emotions, and experience in the Earth reality. When the operating system supports infinite awareness, energy will go to any content mind processes and body frequencies without blocking the free harmonic flow of energy. Without identifying with the mind contents, energy is never restricted. The energy harmonically pulses to content frequency and flows back to infinite consciousness. The false programs which orchestrate the fear, conflict, control, and separation illusion stems from an operating system of personality that identifies with the mind content and physical body. This identifying operating system enables energy to restrict as blockages in mind and body through limiting beliefs, emotional codes, and painful experiences. This energy then becomes one with the physical frequencies of the body vehicle.
Wilhelm Reich pioneered an understanding of how the fear-based operating system restricts energy and manifests as blockages in the physical muscular and cellular system. He identified seven major areas where the life energy or “orgone” is restricted in the physical vehicle. These body armor segments include the forehead/eyes, chin/jaw/throat/, neck musculature/upper back, chest, diaphragm, solar plexus/stomach, stomach muscles between ribs and pelvis, and the pelvis. All of these areas interact with each other, and must be released or transformed in order for energy to move in a fluid harmonic of expansion and contraction pulsation through the body. Only when all areas are unhindered will sexual energy express as its highest purest Divine frequency in the human being. Reich determined that the full freedom and flow of energy in physical sexual expression was a measure of whether the human being had an armored or unarmored consciousness.
Reich saw that the content programs of the mind manifest as muscular restriction in the body which he called “body armor.” It is our understanding that these content mind programs which cause energy restrictions in the physical body originate from the personality identifying operating system. This system is the foundation of the false fear-based 3D mind matrix that limits the awareness of infinite consciousness.
Wilhelm Reich’s experience with the segments of body armor can give us some insight into how and where the mind’s content system and operating system may be expressing or anchoring in the body. The knowledge of specific areas provides us some direction in understanding how our consciousness emanates through the mind and body. However, it is only a guide for our awakening to inner knowing as our infinite consciousness ultimately manifests throughout the entire cellular body.
Reich found that the energy blocks in the upper four segments (forehead/eyes, chin/throat, neck/back, and chest) released as emotions and word language, such as fear, anger, sadness, and crying. However, with regard to the diaphragm and solar plexus, Reich found that a release of the blocking armor did not correspond with expressive emotion and word language. The diaphragm/solar plexus did not reflect specific emotional energy and expressive language that would be indicative of content conditioning. Here, Reich’s work can give us insight into both the content and operating systems of the mind. It appears that the four upper segments and the lower stomach and pelvis may be directly associated with the mind’s content programs of limiting beliefs, emotions, and experience. Whereas, the core of the mind’s operating system may relate to the frequencies of the physical body by being situated in the muscular armor of the diaphragm and solar plexus. With this connection to the operating system of the mind, we can see why unrestricted breathing and the solar plexus/gut reactions are pivotal for expressing the free flow of energy of Divine human consciousness through the body.
The freedom of the diaphragm and solar plexus is vital to transforming to an unarmored bodymind. This can only occur when we are the awareness of infinite consciousness, and we relinquish the fear-based operating system of personal bodymind identity and open to the operating system of higher mind in unity with the heart. In order to live directly as infinite Divine consciousness through the body, we must let go of the attachment to the fear-based operation system of the conditioned personality. This transformation coincides with the shift to harmonic energy flow in the diaphragm and solar plexus.
We cannot work at primarily the body or mind level in order to transform all restrictions and restore the pure harmonic flow of infinite consciousness through the energy movement within mind and body. By working through the body and/or mind we can release many restrictions, but we cannot fully restore the unarmored human solely by changing beliefs, emotional codes, and their resulting physical restrictions. We can heal and transform to a high degree by loosening blockages at the body and mind frequencies, but we will not eliminate the problem of the infiltrated human consciousness.
In order to awaken, remember, and restore the pure unarmored expression of the spirit and soul through the mind and body, we need a wholesale change of operating system. The only way to effect this change to an operating system that reflects the soul’s infinite love and creativity, is through direct awareness of the true human nature as infinite consciousness. While incarnate, a heart-centered consciousness is the interface between the bodymind and the unity of infinite consciousness in Divine awareness. We are actually working from all three levels of body, mind, and infinite consciousness at once. When we are working to change and transform the bodymind programs, we make it easier for consciousness to awaken and remember Divine awareness. And as we can directly restore and emanate Divine awareness, we can transform the operating system of the mind, and thus, fully go beyond all limiting conditioning and body armor.
When we awaken, remember, and restore our inner knowing as our true Divine nature, we shift frequencies beyond the infiltrated program of the limiting fear-based mind of conflict, control, and separation. This false matrix has veiled our knowledge of who we are, and installed the error that the fear-based matrix system is our nature. This misperception has made us think and feel that humanity is something less than infinite Divine consciousness. It has caused the normalizing of conflict, harm, and separation, and the false belief that humanity must somehow change or transform its nature to solve its painful situation.
With this mindset, humanity has been conditioned to look outside to external belief systems, groups, organizations, and technology to try to understand human nature. This very external energy continues to veil humanity from its truth of infinite Divine consciousness. By shifting attention and intention within, humanity will awaken to its infinite consciousness and full capacity of interior consciousness technologies—an infinite experience and expression of love and creativity, telepathy, teleportation, harmonic cellular regeneration, and intentional creativity and manifestation.
The accelerating energetic frequencies that we are receiving from the galaxy and sun are creating a resonance where we are given the choice to reawaken to our Divine awareness as infinite consciousness.
We are an infinite Divine consciousness experiencing and expressing through mind and body frequencies. Infinite consciousness emanates as a consciousness continuum of spirit, soul, mind, and body. This is our true humanity. Because of an infiltration of a fear-based conflict, control, and separation false matrix in humanity over thousands of years, we have been living in various states of amnesia from our true nature.
We know we are living in a time of awakening and remembering our true nature as a result of a direct awareness of Divine consciousness. We are becoming aware of a Divine timing sequence that is part of an awakening and shifting consciousness on Earth to a higher frequency organization. The Divine synchronic timing sequence is neither linear nor cyclical. It is beyond time and is now manifesting in our current awareness of Earth experience. This awareness is intrinsic to our consciousness and being, and is not part of any prophecy or cycle. We remember from an inner knowing through an awakening heart consciousness.
The change in frequency is assisting an accelerating awakening and healing of fear-based conditioning and programming. It is loosening rigid inharmonic energy patterns, and making it easier to transform limiting beliefs and emotional encoding. We are moving beyond identifying with these mind programs as personality, and trusting in our innate nature as Divine awareness of infinite love and creativity. While this work is still very challenging and takes great attention, intention, and patience, the shifting energetic frequencies are enabling healing/transforming at deeper and multiple layers simultaneously. This is the main preparation of human consciousness for living in a higher frequency dimension of Earth. Our awakening to Divine awareness is in synchrony with a Dimensional Ascension of the Earth incarnate experience.
The encodings of the lower thinking mind programs of the fear-based matrix are virtually infinite. The human mind has been encoded, conditioned, and manipulated by cultural, educational, childhood, intergenerational, and past life contents of limiting beliefs, emotions, and traumatic experience. It would be impossible to directly clear all of the attachments to this content at either a conscious or unconscious level within a current lifetime. Therefore, as we awaken to infinite consciousness and transform the content programs, we are moving toward a change in the mind’s operating system. The key to this change is to know that we are an infinite Divine consciousness, and no longer attach to the programmed contents of the mind which are part of the fear-based matrix programs of conflict, control, and separation.
Only with a change in the mind’s operating system will we fully remember our Divine awareness as lived directly through the cellular consciousness of the body. While incarnate, our true Divine awareness is a heart-centered consciousness that expresses through the mind and body.
Our preparation for ascension includes an accelerating transformation of mind content which will assist a change in the operating system of the mind. We will go beyond the current fear-based belief conditioning of the mind, and shift to the higher mind of creativity that supports heart consciousness. We have been conditioned to be veiled from Divine awareness by a false mind operating system. Through this disconnection at the mind level, we have been simultaneously separated from both full body awareness and our Divine awareness.
In an upcoming article, we will provide more detail on the consciousness of our true Divine humanity, as well as the flow of communicating energies through the bodymind. The human bio-computer has been primarily infiltrated in the mind. Once this infiltration has taken place, the human being can be manipulated at both the mind and physical body frequencies. Awakening to our true Divine consciousness will transform the operating system beyond the false programming mind, and thus restore the oneness of the Divine awareness throughout the body frequencies and cellular consciousness.
After living on Earth for many thousands of years within an isolating and low energy matrix, humanity is now interacting with a higher frequency oscillation that is emanating from higher dimensions through the galactic center and throughout the entire energetic system of the galaxy. These frequencies are then transduced and transmitted by the Sun to the Earth. In sequence, the Earth then transforms these energies in communication with all life on the planet.
The higher frequency energy is part of a Divine timing sequence of elevating the Earth and human consciousness. The higher dimensional information and consciousness is interacting with humanity in a harmonic resonance that is assisting humanity to awaken and remember our true infinite being. The awareness and expression of humanity’s infinite Divine consciousness in soul and spirit through the consciousness vehicle of mind and body has not been lived on Earth for several hundred thousand years.
As a result of an infiltration of an inharmonic fear-based conflict, control, and separation conditioning into human consciousness, humanity has searched outside for rules, leadership, and systems of living that would express true human nature. All of the historical systems of culture have been part of a deception that has conditioned a false fear-based view of human nature. All of the systems organize external ideas and impress that humanity must become something that it is not by nature—the thoughts on the change of our being include salvation, transformation, enlightenment, alchemy, etc.
In both overt ways and in very subtle ways, the systems of organization and transformation reinforce the fear-based system. The so called “answers” are revealed in some sort of specific content that is part of humanity becoming something new. In reality, we already are an infinite consciousness of Divine love and creativity. Our difficulty and challenge is not to become something else, but to awaken and remember who we already are.
Now it is true that awakening and remembering is a life journey of deep healing, changing of beliefs and emotional encodings, and doing the work in order to resonate with a higher consciousness of soul/spirit that is lived through a body consciousness. We can perceive “transforming” or “evolving” in this way, but not in a way that is a change of our nature of who we are as infinite Divine spirit/soul within incarnate form on Earth.
All content based systems develop the mind and body to adhere to some external control group, network, organization, or system. The very beliefs and actions of an external controlling content system are part of the veiling of our true human nature. They move the attention away from our truth that is only found within the consciousness of the heart. While incarnate, the heart is our connection to our infinite Divine awareness, and the oneness of our full consciousness capabilities with the physical frequencies of the body. Some of these abilities include intentional creativity and manifestation, telepathy, and harmonic cellular regeneration.
All of our actions of communication and creativity emanate from our interior consciousness technology. Our unique mission, soul frequency, and infinite being comes from within. Any external system must by its very nature pull us outside of our true being under fear-based ways of authority, ruling, and controlling. Therefore, true freedom is only manifested within the heart, soul, and spirit of our interior consciousness. It is only here where we have knowledge. Any other ideas or thinking is a lesser frequency of various mind functions. Only within do we open to and acknowledge the true responsibility to our being and Divine source. Within this responsible freedom, we act on our love, goodness, and creativity as part of our experience and expression of life that is a unitary endeavor with all.
We are Divine light, consciousness, and energy. We are an infinite freedom of being that is a gift of Divine love. We have an unprecedented opportunity with our incarnation on Earth to remember and restore our true Divine love and eternal freedom within our experience. The most we can truly say at this point in a time of shifting energetic frequencies, is that the current awakening is part of a Divine timing sequence for our experience of our soul journey on Earth. This time is not occurring from prior content systems of prophecy, cycles, etc. It is time for us to truly begin to look within the freedom of our true nature and move beyond the reliance on all content systems that continue to keep us imprisoned in conflict, control, and separation frequencies.
We are not saying to forego all organized thought, community sharing, books, as well as different viewpoints of approach and ideas on the awakening to higher knowledge. All of our gifts of mind and lower vibrational languages, empirical knowledge, and beliefs need to be in service of our life mission through the knowledge and wisdom from our heart, soul, and Divine being. We can no longer both look within and also continue to adhere to an external authority to know our human nature. It is time to shift beyond all of the false conditioning and remember our infinite Divine consciousness. All of the false identities and fears that maintain conflict and control must be relinquished.
The external control system that has infiltrated humanity on Earth maintains its centralized authoritarian control through the false self-identity. This identity lives in fear because of the false belief that something is wrong with our human nature—thus humanity is conditioned to look outside for love, acceptance, and the answers to life. This has been done through the deceptive conditioning within human institutions, cultures, and social systems. The whole manipulating intelligence of the last thousands of years has instituted a false programming of control and authority by veiling human consciousness from its infinite being within.
The entire conditioning of humans that their nature is flawed prevents them from being themselves. As a result they do not express Divine love, power, and creativity. Humanity has been deceived in following an external authority. As humanity awakens, we will see that this authority system has been universal within all culture. All external content managing systems of ruling, authority and control inhibit freedom. Authentic freedom can never be defined from the outside. The very instant that humans resonate with this frequency of external symbol, figure, language, or person, human Divine power and energy is siphoned off.
By forgetting who we really are, humanity has completely lost sight of the creative and cooperative process where we know our freedom and being from within as we experience others and the perceived outside world. When we awaken and connect to our infinite free being, the conflict and control frequencies with others and the outside no longer resonate. All the knowledge, freedom, goodness, understanding, and creativity of being is our true nature. Now, the true gift of others and the outside perceived experience of this holographic Earth experience can be shared in joyful freedom.
We are an infinite consciousness of pure love with a purpose to love and create with one another through infinite choices of love and creativity. Love experienced in biological consciousness vehicles we refer to as the “physical body” is part of the eternal soul experience in the dimensional universe and dimensionless spiritual realms. Our freedom and direction emanates from the Divine source that is the center of being. It is time to fully awaken to who we really are as authentic freedom of consciousness, and to live our unique mission of being in a unity consciousness with all.
As the 3D hologram continues to devolve into a more overt transhumanist authoritarian control system, it is important to move attention and intention to our Divine freedom of being. The awakening and ascending is a shift of consciousness. Within this aspect of shifting intensity, the Divine timing is sequencing a Dimensional ascension which is a change in organization of the holographic frequency to a higher dimensional oscillation. The choice to ascend with this frequency manifestation on Earth amidst an intensifying devolving 3D frequency through the infiltrating external control structure is within the energetic frequency of freedom of being.
The pure freedom of being is a trust in one’s Divine goodness and infinite love that we are within the Divine source. Our mission now is to awaken to our heart-centered Divine unity by opening the heart and Divine mind of interior consciousness. We do this not only within some established pathway or system that has been infiltrated by an authoritarian control system, but by directly resonating with the truth and love in our soul and spirit of infinite Divine consciousness. By awakening at this level, we will go beyond just accessing higher consciousness at the higher mind/chakras and truly be this awareness directly through the physical body and cellular consciousness.
It is this commitment to remembering the freedom and trust of truth and love that will assist us in navigating the challenging times ahead as the 3D matrix devolves, collapses, and dissipates in frequency. As we still participate in the 3D holographic frequency, the transitioning energies of a higher dimension will further integrate with human consciousness and the Earth. Within this awakening to our true nature as Divine infinite consciousness incarnate, we are going beyond all external content systems. All of the content systems of religious, spiritual, esoteric, metaphysical, alchemical, scientific, star being, and inter-dimensional content systems will only progress us so far in our pure awakening to Divine awareness.
All of these systems rely upon communicating to the external conceptual organization of the human mind, and therefore are drawn into the authoritarian 3D fear-based control matrix that has infiltrated the perception in this frequency band of experience. The higher frequency energy that is being transmitted to humanity on Earth is assisting us to awaken without a content management system categorizing the truth of our being. This level of awakening directly to our essence, experience, and expression of our Divine Being is the next sequence in dimensional ascension. It is part of the yet unknown timing and manifestation of a holographic change to the dimensional frequency of humanity incarnate on Earth.
The future of humanity is an awakening of heart consciousness. Within the heart, we open to a higher dimension of our mind that intends, knows, and acts beyond thinking. Since humanity has been conditioned in a narrow range of fear-based conflict, control, and separation through a dualistic thinking mind, it can seem incomprehensible at the current level of consciousness that we can use intelligence to intend, create, and act on Earth through the mind and body without thinking. Through a manipulation of the “thinking mind,” humanity has been at once disconnected from the full life of the body and full Divine awareness of our infinite consciousness.
Heart consciousness is our Divine awareness in incarnate form. Within the heart, we unite a body consciousness with a whole new level and understanding of all aspects of the mind in service of the heart. The true multidimensional human mind is always expressing in the moment beyond time. The thinking mind is never in the now because its frequency is a perpetual censor of consciousness. Therefore, it is always operating from the prior unconscious programming that continues to relive the past and fear the future. This perpetual censoring device is the anchor for the narrow range of the five physical senses that have been the primary means for decoding and experiencing this reality on Earth for thousands of years.
It is time to awaken, remember, and be our infinite heart-centered consciousness. A dense inharmonic conflicting frequency has been infecting and infiltrating the human mind for many thousands of years. The entire 3D false matrix of fear, conflict, control, and separation has been disrupting the planet and humanity incarnate. This cultural system works against the harmony, freedom, creativity, and unity of life. It is time to commit to being who we really are as infinite souls of Divine light, consciousness, energy, and love. Anything less than pure love and creativity is a level of acceptance of the false ways of being that humanity has been immersed in.
The attack by inharmonic intelligence has been to focus on a frequency matrix of the thinking mind that has been conditioning limiting beliefs, painful emotions, and past experience. When this occurs, the human consciousness becomes consciously unaware of its infinite consciousness, and thereby identifies with a more limited frequency range of the body-mind. This identification with the body-mind vehicle of consciousness actually separates the awareness of our true infinite consciousness from the body. Therefore, when we identify with the body outside of infinite consciousness, we are no longer fully present within the body.
The force that has infiltrated and enslaved humanity has conditioned the human mind through a false fear-based programming which has separated humanity from both the body and infinite consciousness. Humanity has been kept in a veiled and controlled state through identification with the dualistic software program of the 3D thinking mind. This results in the human being mistakenly believing that his or her life condition in this restricted consciousness is part of human nature. When in reality, humanity has been living in a false artificial nature through a mind program of a hierarchical authoritarian ruling control structure.
As humanity remembers, Divine awareness is awakened. From our infinite consciousness, a higher frequency of mind manifests as love, freedom, unity and creativity. This frequency of mind serves the unity of the heart through the body. Infinite consciousness will become one with the body. The key of reuniting with infinite consciousness is through a heart-centered consciousness. Through the heart, we open to our Divine awareness of infinite consciousness and reconnect our being throughout the cellular consciousness of the body. Within the heart, infinite consciousness and the body become one through a new activation of the higher mind.
The knowing mind does not think. Within the intuitive frequencies of mind, information is spontaneously accessed by the direction and attention of intentional consciousness. The intuitive knowing mind is operative when Divine awareness is within infinite consciousness in soul and spirit. When our infinite being is expressing as incarnate humanity on Earth, the heart, infinite consciousness, higher mind, and cellular body consciousness are experienced as unitary Divine awareness.
The spirit-soul of infinite consciousness expresses through the mind and body vehicle. Our true nature is a Divine infinite consciousness of love, creativity, freedom, and unity with all. Our being is pure information, consciousness, and energy, and is experienced and expressed in its fullness through interior consciousness technology. This includes telepathic consciousness, multichannel telepathy, teleportation, bi-location, harmonic cellular regeneration, and intentional creativity and manifestation. While our true consciousness abilities of communication, creativity, and action are all internal, a reference to external electronic computer technology can help us understand the consciousness continuum of the physical body consciousness bio-computer, the subtle dimensions of mind, and infinite consciousness. We can relate the physical body—cellular structure, organs, DNA, and all systems with an analogy to hardware. This includes physical structure, CPU, and hardrive. The mind relates to the software, and Divine infinite consciousness is the intelligence and creativity beyond the software.
Within the manipulated matrix of fear, conflict, control, and separation there has been interference and conditioning of both the mind and physical body. It is a two way bi-directional interference—mind programs alter physical energy frequencies of the physical vehicle, and a disruption in the energetic and biochemistry of the physical vehicle inhibits the full efficient functioning of the software program that is the mind.
In our awakening and remembering, we no longer identify our consciousness with the physical vehicle of the thinking mind. We open to Divine awareness of knowing our being, experience, and expression as a Divine infinite consciousness. Therefore, we realize that we cannot heal and transform the body and mind to infinite consciousness solely by intervening at the physical body or the etheric subtle mind level. We must go beyond the thinking mind program in order to remember infinite consciousness to fully awaken to our true Divine nature. It is not sufficient to understand that we are an infinite Divine consciousness through the conscious awareness of the thinking mind level. We must be infinite consciousness with a direct awareness from this nonlocal multidimensional level.
Many spiritual, philosophical, psychological, and metaphysical systems have sought to heal on the mind level by equating mind with the higher self, soul, spirit, etc. At this level, we can only change individual software codes of limiting beliefs, emotional coding, and actions. This will assist us, but in truth, the entire mind software has been conditioned by the false 3D fear-based matrix. Thus, we need to override or uninstall the mind software in its entirety. This we do by awakening and remembering who we are as infinite consciousness.
While this computer analogy can help us understand our consciousness in this time of transition, we must realize that all external technologies are an artificial external extension of the current limited mind programming that is decoding electromagnetic information that is relayed to the brain by the physical sensory system. When we awaken to our true abilities, we have all the communication and creative capabilities in our interior multidimensional infinite consciousness. Thus, our awakening is to be infinite consciousness in awareness which will be lived in frequency through the mind and cellular consciousness of the physical body.
Ultimately, while we are experiencing our being as incarnate on Earth, our infinite consciousness, mind, and physical body will function as a seamless receiver/transformer/transmitter of the knowing Divine awareness of love and creativity. Within this time of energetic shift, the process of awakening is reuniting our physical body and information instructions of the mind all within an infinite consciousness emanating through the vortex of the heart consciousness. The future of humanity on Earth is to live from an ascended fifth dimensional and beyond matrix of oscillating consciousness and energy.
As we bring Divine awareness into direct experience in the mind and body, the very frequency of the physical body and overall mind software is changing. This evolving expression will reflect our true being of a higher energy fluid expression and continuous harmonic flow of energies. They emanate at the physical frequency of consciousness through a unified light and sound frequency. No longer will friction, energy blockages, and defensive secondary energy pathways restrict our Divine awareness. We will restore the pure balance of energetic flow of the limitless unrestricted Divine. We will remember our infinite consciousness of a nonlocal timeless dimension within our incarnate form on Earth.
May we open to the fullness of the Divine light and awareness so as to remember our multidimensional humanity, and express ways of living on Earth that oscillate the harmonic frequencies of Divine love and creativity. The firm choice to live from Divine love, and ways of communicating and creating that reflect freedom, love, and Divine unity is inherent within the movement of Dimensional Ascension. | 2019-04-20T16:50:06Z | http://blog.peterborysjr.com/2013/06/ |
The youngest of Sir Sayer de Rochford of Fenne’s prominent sons, John de Rochford the Younger, first appears on record in 1376. The register of the Boston Guild of Corpus Christi records that in that year he and his wife Alice joined the Guild, just as his late father and eldest brother had done before him.
Confusingly, John’s eldest brother was also called John. If this sounds odd, note that it was not unknown at the time for siblings to share a name; and for the most part these two can easily be distinguished from one another in contemporary records. The older John was already knighted when the younger was born, and he was almost always called “Sir John de Rochford” or “John de Rochford, knight” in the records of the time. For clarity I refer to him as Sir John de Rochford II of Fenne. As the eldest son, he was heir-apparent to the ancestral family estates. The younger John, the subject of this biography, meanwhile, was usually called “John de Rochford the Younger” or “John de Rochford of Boston” in contemporary records. There are some records where the distinguishing details are missing – in particular, lists of men appointed to royal commissions in the Patent Rolls. But in these cases it is usually clear who was being referred to by their position in the list and thus their relative status. Sir John, as a knight, would be named before all men on the commission who were not knights, whereas John the Younger would be named among them. This applies until about 1399, when John the Younger himself was knighted and thereafter usually known as “Sir John de Rochford” just as his older brother had been – an obvious source of further confusion that is cleared up only with the knowledge that the older Sir John had died between 1392 and 1396.
Returning to John the Younger’s early life: about a year after he joined the Boston Guild of Corpus Christi, on 6 February 1377 he joined another older brother, Sir Ralph de Rochford of Walpole, as a commissioner of the walls and ditches in Marshland Hundred, Norfolk. John’s name appears very low in the pecking order for this commission, after a couple of clerks; but as a younger son he might have been considered lucky to be on a royal commission at all. The opportunity to learn the ropes with Sir Ralph, who was an experienced royal commissioner and some 20-25 years older than him, must have been useful. Perhaps his appointment was under the growing influence of their eldest brother, who had just been elected to parliament, or of the increasingly powerful John of Gaunt, whose patronage would soon play a pivotal role in the fortunes of the family.
If John the Younger was of age by this time, he must have been born by about 1357. In fact, an inquisition post mortem into the estates of the late Sir Roger Hillary taken in 1403 (with clarification from a court case of 1422) confirms that John was born around 1354-1357 and that his mother was Sir Roger’s sister Joan Hillary, who Sayer had married by 1348. Roger had died leaving no children and his estates were to be split between the heirs of Joan and another sister, Elizabeth, both of whom were dead. Joan’s heir was “John son of Saer de Rochefort, knight, junior” who was “aged forty years and more”, while Elizabeth’s heir was her daughter Elizabeth aged “fifty years and more”. Assuming John was therefore 40-49 years old, he was born in or after 1354.
So John the Younger was in his early twenties when he was appointed to his first commission. In November 1379 he was appointed to another commission with his brother Ralph, this time to find out who had been harassing the Boston Friars Preachers in their beds at night “so that they were obliged to ring their bells to raise the commonalty of the town to come to their aid”, and arrest the accused. But in early 1380 the commission was dissolved and the brothers and their colleagues were ordered to free anyone imprisoned by it.
While their eldest brother, Sir John, lived at the family’s ancestral home at Fenne, and Sir Ralph was based at Walpole in Norfolk, John the Younger lived in Boston itself where he associated with the wealthy merchants. Unusually for a younger brother, he appears to have been extremely wealthy himself early in life. The 1381 poll tax return for Boston put his assessment at ten shillings – the largest figure by far of the 1,594 tax payers in the town, and second only in Skirbeck wapentake to his eldest brother’s payment of 13s 4d. The tax return also stated that John the Younger had a wife named Joan. This seems to have been a clerical error, perhaps intended for his mother who was by now a widow. Some time between June 1381 and June 1382 John de Rochford the Younger and his wife Alice – not Joan – came to some agreement with his maternal uncle Sir Roger Hillary over the manor of East Bergholt in Suffolk. Alice was still alive in 1398, and John asked to be buried beside her in his will in 1410.
The arms of the Rochfords and the Fastolfs impaled, as described in the Norfolk Visitations of 1563-1613 for John de Rochford the Younger and his wife Alice. If correct, Alice must have been a Fastolf.
There is no known primary evidence to confirm who Alice was, but she seems to have had local family connections, as in 1381 and 1388 she was involved in various court cases as executrix of the will of Richard de Neuton, another Boston merchant. It has been said that she was a Hastings, but there is no evidence to support this – it appears to be a mix up with John’s brother John the elder. Meanwhile, there is a tenuous clue in the Norfolk Visitations of 1563-1613, which correctly states under an entry for the Tilney family that one of John’s daughters, Margaret, would marry Frederick de Tilney, a son of Philip de Tilney, with whom John struck up a close relationship during his time at Boston. The entry also records arms for “Rochford and his wife – Quarterly or and gules, a bordure sable bezantee; impaling, Quarterly or and azure, on a bend gules three escallops argent”. The first blazon, Quarterly or and gules, a border sable bezanty, is the Rochfords’ coat of arms. The second, impaling it to indicate marriage, Quarterly or and azure, on a bend gules three escallops argent – quarters of gold and blue, with a red diagonal stripe over the top with three silver shells on it – is best known as the arms of the Fastolf family of Great Yarmouth on the east coast of Norfolk. If the visitation was accurate, Alice must have been a member of that family, but there is no other evidence to weigh in on the matter.
The Register of the Guild of Corpus Christi, Boston. This page records the membership of John de Rochford the Younger’s father, Sir Sayer, in 1343. John himself became alderman of the guild for many years. The register is now in the British Library (BL Harley MS 4795).
In 1380 John the Younger had been appointed as one of the two chamberlains or treasurers to the Corpus Christi guild, and he must have done a fine job as in 1381 the members chose him as their alderman, the chief official of the guild. He would continue in this role until 1386 when he was succeeded by Sir Philip de Tilney, but he would later hold the office again from 1391 to 1394, then from 1397 to 1399, and finally in 1409. John cannot have been more than 27 years old when he was first appointed as alderman, and the role would have brought him many useful connections. On 3 November the same year he stood surety for the Boston merchant John Bell and John de Swyn to have them freed from arrest. Bell was also a member of the guild and would be a close associate of the Rochfords into the 1400s.
The 1381 poll tax was the trigger for the Peasants’ Revolt. Sir John de Rochford, who had been made a commissioner of array and a justice of the peace in 1380, was sent to deal with the Lincolnshire rebels in July and December 1381. In March the next year, as the insurgency lingered on, John the Younger was appointed to join his older brother in keeping the peace in Lincolnshire, and “to arrest, imprison and punish such rebels and any who incite rebellion” using an armed force of knights and esquires if necessary. In December their commission was renewed, and Sir John and John the Younger were appointed as justices of the peace together for the Parts of Kesteven and Holland respectively.
These were John the Younger’s first royal commissions since the abortive investigation into who broke into the Friars Preachers’ house in 1379. They mark the start of a remarkable lifelong career in royal service with hardly a break: by the time he died in 1410, John could count more than fifty individual commissions to his name. After 1382, John the Younger was appointed as a justice of the peace in Lincolnshire a further eight times – in 1388, 1390, 1397, 1398, 1399, 1401, 1406 and 1410 – mostly for the Parts of Holland and occasionally for Kesteven and Lindsey. He also followed in his father’s and brother Sir Ralph’s footsteps, serving on numerous commissions of the walls and ditches, most of them in Lincolnshire, some in Norfolk and a few in Cambridgeshire. These were in 1386, 1390, 1392, 1394, 1395, 1399, 1405, 1406, 1407, 1408 and 1410. In the later years he was often appointed to two such commissions in different counties at the same time, bringing his total to fifteen. To add to this, John also served on some twenty-odd ad-hoc royal commissions during this period.
By early 1385 the French were planning an all-out invasion of England. Amid fears of an imminent attack, the English crown fired commissions off to every corner of the country, including to John de Rochford the Younger and others in the Parts of Holland, “to array all men-at-arms, armed men and archers … and distrain all who in lands and goods are capable but by feebleness of body incapable of labour … to contribute to the expenses of those who will thus labour in defence of the realm … Moreover the signs called ‘Bekyns’ are to be placed in the accustomed spots to warn people of the coming of the enemy”.
John the Younger would be appointed to a few more commissions of array, in 1399, 1402 and 1403, and even join one or two military expeditions. But in stark contrast to the rest of the Rochford family, he did not get much involved in war: he seems to have been far more interested in trade, justice and religion. John must have inherited these traits from his mother’s father, Sir Roger Hillary, a lawyer who had risen to become a chief justice of the Common Pleas.
Aptly, many of John’s ad-hoc royal commissions were connected with Boston and local trade. At some point in 1385 he was appointed to a “special assize”, and on 24 November that year he and other “merchants of England, complaining of the unjust arrest and detention in Prussia, by merchants of that country, of their goods and merchandise to the value of £20,000” were instructed by the crown to retailate by detaining all Prussian merchants’ goods in ports from London to Boston: it was a trade war. In a sign of his growing influence among local merchants, on 26 July 1386 John the Younger was elected Mayor of the Staple of Boston. He was about thirty years old. His constables were Richard de Northwood and John Bell – he had stood surety for the latter in 1381, and just a few months before, in May 1386, he and Philip de Tilney had helped a chaplain named John de Barton acquire some property in the town from John Bell and his wife, Isabella.
Soon after, on 22 September, the king sent instructions to John de Rochford the Younger – now often called “of Boston” – and Philip de Tilney and others to assess and levy a loan of 200 marks from the town, perhaps to help fund the punishing costs of war. A few days later, on 25 September, the king instructed John’s brothers Sir John and Sir Ralph to control the escalating prices of arms, armour and horses in their neighbourhood. The French had struggled to get their expedition off the ground in 1385, but by autumn 1386 the threat of invasion was greater than ever.
Meanwhile, John of Gaunt had left for Castile to pursue his hopes for the throne there, and Richard II’s fragile reign began to fall apart. The Lords Appellant staged their coup, and in March 1388 John de Rochford the Younger appeared alongside his brothers and his nephew Henry de Rochford in swearing allegiance to them at the Merciless Parliament. A number of Richard’s favourites and supporters were executed that year. Gaunt’s own son, Henry Bolingbroke, the earl of Derby and heir to the duchy of Lancaster, was among the leaders of the Lords Appellant, and it is perhaps out of loyalty to him that the Rochfords supported their actions. After all, they could not have known when, or even whether, Gaunt would return, or how he would react. Many of the Rochfords’ Lincolnshire associates swore to support the Lords Appellant too: the Skipwiths, Leakes, Claymonds, Spaignes and John Bell, to name a few.
On 24 May, while parliament was still sitting, John the Younger and his brother Sir Ralph de Rochford of Walpole undertook a commission to investigate a dispute over the manor of Denver in Norfolk. Later in the year, in September, a case that he and others had against Walter Couper of Spalding was quashed. In February 1389 John and Philip de Tilney, who was then alderman of the Guild of Corpus Christi, took the precaution of having the royal licences from Edward III for the founding of the guild reviewed and admitted into the Patent Rolls. And in February the next year John and a host of others gained royal licences to grant property to Barlings Abbey, where he would one day be buried.
By the end of the decade Richard II was able to restore royal authority with the support of John of Gaunt, who had returned crownless from Castile in 1389. The Lords Appellant were treated with surprising leniency and peace was maintained until 1397, when the increasingly tyrannous king set about a calculated revenge. It would prove to be his undoing.
If the 1380s had been a brilliant decade for John Younger, the 1390s got off to a remarkable start. In 1390 he was elected as one of two knights of the shire to represent Lincolnshire in parliament in November that year – although he would not actually be knighted until the end of the century. The other representative was Sir John Bussy, another prominent member of John of Gaunt’s group who had sworn allegiance to the Lords Appellant in 1388. Bussy had probably been at the 1378 siege of St Malo with John de Rochford’s brothers Sir John and Sir Ralph.
The next year John the Younger was re-elected as alderman of the Corpus Christi guild, and in May 1392 he was able to gain a royal licence for his colleague and friend Philip de Tilney and others to grant property worth £20 a year to the guild.
By this time John’s two aging eldest brothers were both in or close to their sixties. He undertook two further commissions with the eldest, Sir John – one in May 1391, and the other in May the following year. Both were to deal with several chaplains serving local fraternities and secular individuals, who “maliciously resist and refuse to obey” the vicars of their parish churches, “and have induced their masters and abettors to beat and wound” these vicars, “and insult and threaten them with death, so that they cannot attend to their duties”. Between these two investigations, one of the John de Rochfords – it is not certain which – was appointed as sheriff of Lincolnshire and instructed to investigate allegations that “certain of the king’s lieges” had been involved in counterfeiting the king’s seal at Lincoln. This was a serious matter – the crime was a form of treason.
Sir John’s involvement in the May 1392 investigation with John the Younger is the last certain record of him alive. The last record of Sir Ralph alive is a final commission of the walls and ditches in July 1391. It seems that soon after this, both passed away. After this point John the Younger was only called “the Younger” in records that referred to the past.
The Guildhall in Boston, built in the 1390s by John de Rochford the Younger and his associates for their newly-incorporated Guild of St Mary. Copperplate about 1820, from Pishey Thompson’s Boston (p235).
In September 1392 John de Rochford (now no longer “the Younger”) clubbed together with Philip de Tilney, John Bell, William de Spaigne and others, with £40 cash in hand, to gain a royal licence to found a new Guild of St Mary in Boston. They were all tenants of Richard II’s wife, Queen Anne. She persuaded the king to give his consent and was duly nominated as foundress of the new guild.
On 5 March the next year John, Philip de Tilney, John Bussy (with whom John had served as a knight of the shire) and Walter Tailboys were appointed to sort out a row between the church, the commonalty and “some of the more worthy citizens” of Lincoln over the election of a new mayor and bailiffs. The task must have looked like political suicide, as they soon wrote back that “without authority of the king’s special command they dared not take upon them that charge because of divers doubts and other perils which might arise in time to come”. The king determined to have the matter settled before him personally.
Soon after John was appointed to a commission to look into the use of fraudulent weights and measures in Lincoln. And at the turn of the year he and Sir John Bussy were once more elected as Lincolnshire’s knights of the shire for the parliament of January-March 1394. On this occasion Bussy was also elected as Speaker of the House.
John de Rochford and Bussy’s relationship was not purely political. Later that year Bussy, together with John’s nephew Sir Ralph Rochford III, John of Gaunt, the bishop of Salisbury and others became trustees of the manor of Little Thetford near Ely in Cambridgeshire. This property was to be the inheritance of Frederick de Tilney, the son of John de Rochford’s late friend Philip de Tilney, and John’s own daughter Margaret. Frederick and Margaret were married, but they were still very young and John was to hold the property in trust for them for eight years, after which presumably they would be old enough to have it for themselves.
Further evidence of the Rochfords’ association with the Bussys could be seen in the latter’s home church, where the arms of the two families once appeared together, alongside those of Sir John Bussy’s mother’s family, the Paynells, and others with whom they were connected.
John de Rochford did not deal much in property for himself, but he often supported family members and associates in their own dealings. In 1381 he had been involved in his brother Sir Ralph’s purchase of property in Hagworthingham, while in 1382 he witnessed an agreement between Sir John de Toutheby and two Boston men. Between 1389 and 1394 John was involved in several transactions of Sir Henry Hasty’s estates in Heckington, Great Hale, Little Hale and elsewhere, presumably as a trustee. In 1389 he was party to a transaction between a clerk, Robert de Whitby, on the one side, and William son of Thomas de Wainfleet and Christian his wife on the other. And in 1393 he was involved in a deal between the chaplain John de Barton, and Ralph de Derby and Elizabeth his wife, regarding property in Benington, Leverton, Skirbeck and Freiston.
For unknown reasons, for the three years after 1394 John de Rochford was replaced as alderman of the Corpus Christi guild, and he was appointed to no royal commissions other than a single commission of the walls and ditches in May 1395. The next record of him after this is not for two years. Perhaps John had fallen out of favour, or perhaps he was abroad. Several sixteenth- and seventeenth-century writers referred to “his noble birth, great learning” and “large travel through France and Italy”. If true, it may be during this period that John toured the continent.
Whatever the reason for the hiatus, things began to get back to normal in 1397: John was re-elected as alderman, in July he was appointed as a justice of the peace for the Parts of Holland, and in autumn he represented Lincolnshire at parliament with Sir John Bussy for a third time. By this time Richard II had fully recovered royal authority and his conciliatory demeanor was gone. Bussy, who was Speaker again, turned against the former Lords Appellant to become a fearsome proponent of the king’s revenge. Bussy swiftly persuaded the Commons to repeal the Lords Appellant’s royal pardons, and by the end of the next year they were all executed, imprisoned or in exile. Henry Bolingbroke was banished from England for ten years.
In December 1397 John de Rochford was appointed to deal with “the assembling in divers conventicles in divers parts of the county of Lincoln of disturbers of the peace armed and in warlike array, who have assaulted the men and servants of John bishop of Lincoln”. In February the next year John de Rochford was reappointed as a justice of the peace in Lincolnshire, and on 2 June 1398 he was instructed to return possessions belonging to the vicar of Sibsey that he had previously been told to seize, as it turned out that the vicar had been falsely accused by his brother of whatever it was he was supposed to have done wrong.
Around this time John and his wife Alice received papal indults – permission – from St Peter’s in Rome to have a portable alter so they could pray on the move, and also “that the confessor of their choice may grant them, being penitent … plenary remission in the hour of death”. This is the last record of Alice: it may be that her death was anticipated.
While John de Rochford’s favour with the royal faction does not appear to have returned to pre-1394 levels, his influence within Lancastrian circles was greater than ever. By the time of John of Gaunt’s death on 3 February 1399, John de Rochford had become steward of the duchy of Lancaster’s honour of Bolingbroke, which was headquartered at Bolingbroke Castle about fifteen miles north of Fenne. This was where Gaunt’s exiled son, Henry Bolingbroke, was born.
With Gaunt’s death, his retainers might have expected Henry Bolingbroke to inherit the duchy and all that went with it. But King Richard II had not yet had his fill of revenge, and he took the opportunity to dispossess the young heir. It was a tyrannical move, and it triggered a crisis that would end Richard’s reign within the year. In July Henry set sail from France with a small army on the precept of reclaiming his inheritance. He landed in Yorkshire, where he could count on the support of many family retainers, and as he marched south his numbers swelled. By 1 September Henry had Richard II locked up in the Tower of London. Sir John Bussy, for his part in the tyranny, was summarily beheaded by Henry’s supporters at Bristol Castle.
The hastily convened 1399 parliament at which King Richard II was formally deposed and Henry Bolingbroke established his claim to the throne. John de Rochford the Younger was one of the two Lincolnshire representatives at this parliament. From Jean Creton’s La Prinse et Mort du Roy Richart, c1401 (BL Harley MS 1319, f. 57r).
Official accounts state that on 29 September Richard II “voluntarily” abdicated, while a hastily convened one-day parliament formally deposed him the next day at Westminster. John de Rochford and Sir Thomas Hauley were present as Lincolnshire’s representatives. Henry Bolingbroke summoned a parliament of the same representatives to start six days later, during which he secured his claim to the throne, and he was crowned King Henry IV in Westminster Abbey on 13 October 1399. So it was that the Rochfords’ new patron became king. John would certainly have been present for the coronation.
The deposed King Richard, meanwhile, was relocated to Pontefract Castle, where John’s father Sir Sayer de Rochford had been imprisoned almost eighty years before. Richard is said to have starved to death in captivity around February 1400.
The Rochfords appear to have played a valuable role in Henry’s bid for the throne, since royal appointments and rewards soon began to pour in. John de Rochford was knighted, probably during the October-November 1399 parliament, and in stark contrast to his marginalised years under Richard II, he would now be at the centre of royal administration in Lincolnshire for rest of his life. Records of John’s activities from this time have noticeably less to do with Boston and mercantile issues – he ceased to be alderman of the Guild of Corpus Christi – and rather more to do with supporting the new Lancastrian regime, which was beset by rebellion from all sides.
On 28 November 1399 John and his nephew Sir Ralph Rochford were appointed as justices of the peace in the Parts of Holland and Kesteven respectively. In December they and Henry Rochford, the son of John’s late older brother Sir Ralph of Walpole, were appointed as commissioners of array in Lincolnshire and Norfolk. They must have aided the king in putting down the Epiphany Rising of earls loyal to King Richard, all of whom were captured and summarily executed in January 1400. One of these was Thomas earl of Kent – on 18 February John was rewarded with the stewardship of all his seized estates in Lincolnshire.
The following month, on 17 March 1400 John was given the delicate task of recovering and restoring goods and chattels “of no small value” that belonged to King Henry IV’s friend and ally Thomas Arundel, archbishop of Canterbury, and had gone missing after the archbishop fled into exile in 1397. In August “Sir John de Rochefort knight” and his nephew Henry, now also knighted, joined the king’s expedition to Scotland as captains, with two men-at-arms and twenty archers under them. But John was back by November when the royal administration issued several commissions to him and William Gascoigne to handle disruptions on the Bolingbroke estate, of which John was still the steward. By the end of the year John was appointed as sheriff of Lincolnshire.
On 11 May 1402 John and other leading Lincolnshire knights were sent instructions to “arrest and imprison all persons preaching such lies … that the king has not kept the promises he made at his advent into the realm”. They were to proclaim clearly the king’s intention to rule justly, and ensure everyone understood that subversion would not be tolerated.
Meanwhile, a rebellion was fomenting in Wales under the leadership of Owain Glyndŵr, and on 7 August John was instructed to array the men of Lincolnshire and send them to Shrewsbury to “resist the malice of Owen Glyndourdy and other rebels”. In October the king, who was in urgent need of funds, sent letters to John and other knights across the country requesting that they raise a “benevolence” from their home counties. By summer 1403 the Welsh were in full revolt with the support of both Sir Edmund Mortimer, whose nephew of the same name had a strong claim to the throne against Henry IV, and the rebel earl of Northumberland, Henry Percy, who brought the Scots in on the action.
On 21 July 1403 Percy’s son Harry “Hotspur” was killed at the battle of Shrewsbury. A few days later, on 27 July, the king sent instructions to John de Rochford and others to “assemble all knights, esquires and yeoman” and “bring them to the king in person at Pontefract … to go with him against Henry earl of Northumberland, who has risen in insurrection in the county of Northumberland … and is directing his steps south to destroy the king and his lieges.” In August and September these commissions of array were repeated with fresh urgency as “the king’s enemies … have lately invaded the realm”. Towards the end of the year the king’s Privy Council summoned John and many other lords and knights of the realm to a Great Council, presumably to discuss the rebellion. Parliament early the next year consented to a new tax “in consideration of the wars in Scotland, the rebellion in Wales, the safeguarding of the sea” and much else besides, for which John de Rochford was appointed as a controller and collector in the Parts of Holland and the Isle of Ely.
Percy was still at large in June 1405 when the king sent John instructions to send urgent supplies to him and his army at Newcastle. They were heading “north to punish Henry earl of Northumberland”, who was entrenched at Berwick. They needed 30 tuns of flour, 25 tuns of wine, 2000 fish, 100 quarters of oats and 140 quarters of beans and peas, from Lincolnshire alone. The following month the French sent forces to aid the rebels in Wales, and simultaneously invaded English-owned Aquitaine. John was among those commissioned to raise a loan to support the costs of the erupting war – the king desperately needed money “to pay the wages of men-at-arms and archers, both those who are to remain in Wales … and those who are to set out for Aquitaine”. In November John was commissioned with William Gascoigne, who was now chief justice of England, to try a large group from Lincolnshire accused of treason.
In 1406 John got into a violent altercation of some kind with Robert Kerville. On 29 April he was bound over to do no harm to Kerville, for which Walter Tailboys, John Coppledike, Frederick de Tilney and John Skipwith stood as sureties for him. Curiously, only ten days before this John’s nephew Sir Henry Rochford and Robert Kerville had stood surety for one another, that Henry would do no harm to John Gauthorp, Walter Godard of Terrington and William Maysoun, and that Kerville would do no harm to William Lovell and Robert Falyate. Whatever the nature of this fight, it was not serious enough to stop John from being reappointed as a justice of the peace for Lincolnshire that year. But otherwise he appears to have taken a brief step back from front-line support for the Lancastrian regime to focus on a personal passion for history and literature.
There are two manuscripts in the British Library that were written by Sir John de Rochford around this time. The first, completed in 1406, is a series of extracts from Josephus’ history of the Jewish people written around the year 93 or 94 AD. It has a mouthful of a title: Notabilia Extracta per Johannem de Rochefort Militem de Viginti et Uno Libris Flavii Josephi Antiquitatis Judaice, or in English, Notables Extracted by Sir John de Rochefort from Flavius Josephus’ Twenty One Books of Judean Antiquity. The second, probably completed soon after, is an index to Matthew Paris’ Flores Historiarum or Flowers of History, a chronicle of history from the creation to 1306.
By May 1407 John was no longer steward of the honour of Bolingbroke, but from October to December that year he was back in parliament, this time having been elected to represent the county of Cambridge. Other than one commission of the walls and ditches there in 1392 and another in March 1407, his only known association with that county was as constable of Wisbech Castle, so perhaps his patron for that post, the bishop of Ely, had some part to play in his election. Their relationship appears to have evolved over the years, as in 1404 John was also acting as a justice for the bishop’s treasury.
For the last few years of his life John turned his attention back to his hometown of Boston, and also to Lincoln. He was appointed as sheriff of Lincolnshire in 1409, and elected for one final stint as alderman of the Guild of Corpus Christi – a post he had first been elected to in 1381. He continued his work as a justice of the peace and on commissions of the walls and ditches in Lincolnshire, and no doubt his responsibilities as constable of Wisbech Castle kept him busy too. In addition, in 1410 John was appointed as keeper of Lincoln Castle, and also as one of the “justices of the survey and custody of the rivers” in Cambridgeshire and Huntingdonshire.
One of the surviving fragments of Sir John de Rochford the Younger’s personal work, Extracts from the Chronicles of the Church of Chester … to the Year 1410, which is when he died. The manuscript was severely damaged in a fire – what little remains is now in the British Library. Copyright the British Library Board (Cotton MS Vitellius D XII, ff 1–28).
John still found time to continue his scholarly work around this. There was a third manuscript of his, entitled Extractum Chronicarum Cestrensis Ecclesiae per Johannem Rocheford, a Christo nato ad annum 1410 – in English, Extracts from the Chronicles of the Church of Chester by John Rocheford, from the birth of Christ to the year 1410. These were the chronicles started by Ranulf Higden and now called Polychronicon, which ran up to 1357. Perhaps John wrote his own entries from that date onwards and updated it each year until he died. It has been said that this manuscript was destroyed in a fire – fragments of it do survive today in the British Library, but they are severely damaged.
John went on to detail various bequests to St Paul’s in London, the shrine of St Alban, the shrine of St Hugh of Lincoln and the shrine of St Ives at Ramsey in Cambridgeshire, and also funds for the fabric of Lincoln Cathedral and priests there. Interestingly, there are no gifts to the churches of Boston or John’s ancestral home at Fenne, but he left to Stoke Rochford church a “vessel of gilt copper… to bear the body of Christ on the feast of Corpus Christi”.
Other than his wife, John did not mention any family members in this testament. Instead he referred to a separate last will, of which there were two copies: one in his own possession, and another in the possession of his principal executor, John Southam, who was a canon of Lincoln Cathedral. John de Rochford also wrote that he intended “by divine permission to make codicils for legacies to both friends and servants”. Sadly, no copies of this will or any codicils are known to have survived.
There are no other records of William de Rochford, but we can deduce that he died childless some time between May 1401, when his father became constable of the castle, and 1411 or 1412, when his father’s only surviving heirs were William’s sisters Margaret and Joan, and his late sister Alice’s eldest son.
John de Rochford’s maternal uncle Sir Roger Hillary had died childless in 1400, so the Hillary inheritance was to be split between the heirs of Roger’s two late sisters, Joan and Elizabeth. Joan’s heir was her son John de Rochford the Younger, while Elizabeth’s heir was her daughter Elizabeth de la Plaunk, who was by this time married to her fourth husband, Sir John Russell of Strensham. The valuable Hillary inheritance included manors at Bescot, Aldridge and Fisherwick in Staffordshire, and Stretton on Fosse in Warwickshire. But Roger Hillary’s widow, Margaret, was still alive, and the property was not shared out until after she died on 27 April 1411. Since John de Rochford and his only son William were also both dead by this time, the Rochfords’ share of the inheritance was to be shared between William’s three sisters – or in Alice’s case, her son.
Around 1394 John arranged the marriage of his daughter Margaret to Frederick de Tilney, the son of his late friend Philip de Tilney. Frederick and Margaret were both minors, since John’s part of the marriage agreement involved him maintaining them. Margaret herself cannot have been more than twelve years old, since another inquisition identifying John’s heirs in 1422 reported that she was in her thirties at that time. For their part, Philip de Tilney’s executors and trustees contributed a manor at Little Thetford near Ely, Cambridgeshire, into the bargain, which John was to hold on behalf of the married couple for eight years, suggesting that Frederick was perhaps about thirteen years old. Frederick and Margaret were both still alive in 1404 when John’s nephew Sir Ralph Rochford, who had become a trustee to the property, appointed attorneys to help the couple protect their property in a legal battle. By the time of the 1422 inquisition, however, Margaret was a widow, and she was still alive in 1434.
John’s second daughter, Alice, married William Gibthorp, but she had died by 1412 and her heir was their son John Gibthorp, who was still under age. By the time of the 1422 inquisition, John Gibthorp had also died and and his heiress was his only child Elizabeth Gibthorp, who was just one-and-a-half years old.
John de Rochford’s third daughter, Joan, was married to Robert Roos of Gedney in Lincolnshire, by 1412. John and his nephew Sir Ralph Rochford had been given the wardship of the young Robert Roos and his inheritance after his father Sir James Roos died in 1403. By the time of the 1422 inquisition Joan had died and her heiress was her only child Margaret Roos, who seems to have been somewhere between about six and eleven years old, depending on which account is to be believed.
With the death of his son William, John de Rochford the Younger’s branch of the family name ended. But it would continue for several decades through his nephews Sir Ralph Rochford of Fenne and Sir Henry Rochford of Walpole, and their children. | 2019-04-20T16:15:19Z | https://therochfords.wordpress.com/biographies/rochford-of-boston/sir-john-de-rochford-the-younger-of-boston-died-1410/ |
Should energy resources in the Arctic National Wildlife Refuge be developed?
Viewpoint: Yes, energy resources in the Arctic National Wildlife Refuge should be developed because dependence on foreign resources poses a serious threat to the security of the United States.
Viewpoint: No, energy resources in the Arctic National Wildlife Refuge should not be developed because the gain would be minimal and the cost to the environment unacceptable.
When the first major oil strike occurred, at Titusville, Pennsylvania, in 1859, the momentous character of the event could hardly have been appreciated. There were no automobiles then, nor could anyone have imagined the importance that petroleum would acquire within three-quarters of a century. Even if they had, most observers would have presumed that America had all the oil supplies it needed.
At that time, paleontologists were just beginning to understand the fact that dinosaurs had once ruled the planet. It would be years before scientists understood that the deposition of their bodies in the earth—the result of a great cataclysm some 65 million years ago—had provided Earth's "new" human rulers with a vast but nonetheless limited supply of energy in the form of petroleum.
Likewise it would be years before prospectors began to discover ever more abundant supplies of oil on U.S. soil, first in Texas and surrounding states, and later in Alaska. Also in the future lay the discovery of even more impressive reserves in the Middle East, a region that until the mid-twentieth century was economically impoverished and geopolitically insignificant.
By 1973, much had changed. America and other industrialized nations had millions of cars on the road and regularly imported millions of barrels of crude oil from Saudi Arabia and other nations, which—because of their vast oil wealth—had become powerful players on the international scene. In 1973, Americans would be forced to confront their dependence on foreign oil. That was the year when the Organization of Oil-Exporting Countries (OPEC), composed primarily of Arab nations, placed an embargo on oil sales to the United States in retaliation for U.S. support of Israel. The results were disastrous: suddenly scarce, petroleum was in high demand, and anyone who lived through that time can recall the long lines at the gas pumps, the frustration of cancelled family trips, the exigencies of enforced conservation, and the fears raised by dependency on hostile foreign powers for the fuel that literally runs our nation.
Those fears subsided somewhat with the conclusion of the embargo—unsuccessful inasmuch as it failed to sway U.S. policy in the Middle East—but they have resurfaced again and again over the years. One of the most dramatic instances of such resurfacing occurred after the September 11, 2001, attacks on the World Trade Center towers and the Pentagon. Though a small band of Muslim extremists actually carried out these acts, the subsequent response by a large segment of the Arab world—most notably, a refusal to wholeheartedly condemn the terrorists' actions—once again gave notice to Americans that their trade agreements with Saudi Arabia and other oil-exporting Arab nations could break down at any time.
In the eyes of many Americans, three decades of strained relations with the Arab world only served to reinforce the need to develop oil resources on U.S. soil. By that time, most economically viable reserves in the continental United States had been tapped, but Alaska still presented a potentially rewarding frontier for future exploration. In response to the embargo of 1973, America stepped up its efforts to extract oil from Alaska.
Significant oil reserves had first been discovered along the shores of the Arctic Ocean in 1968, but the lack of infrastructure (including roads) in that largely uninhabited region had presented an impediment to exploitation of those reserves. Then, in 1969, a group of petroleum companies paid the state $1 billion for drilling rights and proposed the building of a pipeline. Opposed by environmentalists, the proposed pipeline had gone unbuilt, however, until November 1973, a month after the Arabs imposed the embargo, at which point Congress authorized the construction of a 789-mi (1,262-km) pipeline.
The pipeline made possible the transport of oil from the Prudhoe Bay oil field on the Arctic coast to the harbor at Valdez, from whence oil tankers transported it to the ports on the West Coast of the United States. However, environmental concerns remained, and loomed greater in the years that followed. In part, this was due to the growth of an increasingly powerful and politically forceful environmental movement, which was still in its infancy at the time the original pipeline was proposed. But concerns over the threat posed to the Alaskan wilderness by the extraction and transport of oil had also spread far beyond the limits of the environmentalist movement to the population as a whole. This was particularly the case after the 1989 disaster of the Exxon Valdez, an oil tanker that ran aground off of Prince William Sound, causing the worst oil spill in the history of North America and doing immeasurable damage to the environment.
In the essays that follow, arguments are made, based on scientific speculation regarding the recoverability of resources, both for and against the development of energy resources in ANWR. In other words, not all arguments against drilling necessarily revolve around environmental concerns alone, and not all arguments in favor of it are based purely on concerns for national security. Obviously, those two positions—the environment on one hand, and national security on the other—play a major role in governing one's views on the advisability of exploiting the resources at ANWR. However, at heart the question is one of costs versus benefits.
On the one hand, there are the costs involved in the impact on the environment, as well as on the lives of native peoples. Furthermore, there is the sheer economic cost of extraction and development of ANWR reserves against the economic and political benefits to be accrued from those actions. On the other hand, there is the political cost of dependence on oil exported by increasingly hostile nations, combined with the potential economic benefits, both to the state of Alaska and to the nation as a whole.
Viewpoint: Yes, energy resources in the Arctic National Wildlife Refuge should be developed, because dependence on foreign resources poses a serious threat to the security of the United States.
For the last 40 years of the twentieth century and into the first decade of the twenty-first century, drilling for oil in the Coastal Plain of the 19 million-acre Arctic National Wildlife Refuge (ANWR) has been strongly debated. The ANWR, located in northeastern Alaska, is an area abundant with fauna and flora, and rich with oil potential. Energy experts agree that the Coastal Plain (commonly called 1002 Area) is currently the most promising domestic onshore oil and gas prospect. The consensus of most petroleum geologists is that its potential is on the order of billions of barrels of recoverable oil and trillions of cubic feet of recoverable gas.
Since 1985 oil and gas leasing on this federally owned land, administered by the U.S. Fish and Wildlife Service (within the Department of the Interior), has been banned. Exploration and development of oil and gas are supported by the oil companies and by the majority of Alaskan officials and citizens, but has been opposed by many environmental organizations. The inhabitants of the area, the Inupiat Eskimos and Gwich'in Indians, are also actively involved since they have a direct economic relationship to the land, and to its wildlife and other natural resources. The U.S. Congress will ultimately decide whether to open up the ANWR for oil exploration and development.
Under federal law, 17.5 million acres (about 92%) of ANWR will remain permanently closed to all development. The remaining 1.5 million acres (about 8%) on the northern Coastal Plain of ANWR is the only area being considered for development. If oil drilling commenced, less than one half of one percent, or about 2,000-5,000 acres, of the 1.5 million acres of the Coastal Plain would be directly affected. According to Senator Frank Murkowski (R-AK), the actual area in the ANWR covered by such structures as drilling rigs, buildings, and roads would be less than the size of the Anchorage International Airport.
The 11 countries of OPEC (Organization of the Petroleum Exporting Countries) account for more than 40% of the world's annual oil production and possess about 75% of the proven reserves. At the time of the 1973 Arab oil embargo, the United Stated imported only 36% of its oil. As of 2001, the U.S. imported, according to the American Petroleum Institute, a little over 55% of the oil needed domestically. Experts at the Department of Energy are expecting the import percentage to increase from 55% to 65% by the year 2020.
Little interest was given to oil potential in ANWR when oil prices were low. However, in 1999, OPEC and other oil-exporting nations agreed to cut oil production. Within five months world oil prices went from $10 to $33 per barrel; but leveled off in 2001 to about $26. Consequently, interest in Alaskan oil, and especially in ANWR development, has drastically increased. Recent OPEC production agreements have renewed calls for U.S. policies that might reduce dependence on foreign oil and help with uncertainties in energy markets due to continuing Middle East crises.
United States oil production has steadily declined since its peak in 1973. ANWR development would alleviate current oil supply problems. According to the Energy Information Administration (EIA), peak annual ANWR production—assuming that 9.4 billion barrels of petroleum are recoverable at a market price of $24 per barrel—would be approximately 1.4 million barrels per day, compared with projected U.S. oil imports of 15.3 million barrels per day and total oil use of 24.3 million barrels per day in 2015. (The level and timing of peak production would depend upon the rate at which the ANWR oil fields are developed; according to the EIA, from the time of approval to first production would be from 7 to 12 years.) Supporters of development argue that ANWR oil would reduce dependence on foreign sources, and that the additional incremental supply could be crucial in determining oil prices. At the upper estimate, the U.S. Geological Survey projects that ANWR reserves could total as much as 16 billion barrels of recoverable oil, an amount that represents all the oil currently imported from Saudi Arabia for the last 30 years.
New petroleum technology, including advances in computing and exploration methods, developed since the early 1970s will allow companies to tap underground reservoirs with a much smaller surface impact. Senator Murkowski recently said that through such technologies oil companies could safely develop a manageable "footprint" (the area occupied by infrastructure) in order to protect the surrounding environment and the ecology. If the Prudhoe Bay oil fields were built today using the latest techniques, the footprint would be 1,526 acres, 64% smaller than when actually built. In addition, millions of dollars of research on wildlife resources and their habitat on Alaska's North Slope have greatly increased the scientific understanding of arctic ecosystems and have also shown that wildlife and petroleum extraction can coexist.
The indigenous Gwich'in Indians are most apprehensive about oil development in the Refuge because they depend on the barren-ground caribou of the Porcupine herd for food. They fear that ANWR development would disrupt the caribou's calving grounds and diminish their food supplies. However, Department of Interior Secretary Gale Norton stated in 2002 that the wildlife of the ANWR can be adequately protected and America's treaty obligations with native tribes would not be violated by oil exploration in the ANWR chiefly due to improvements in oil-drilling technology.
Proponents of drilling point to the oil fields at Prudhoe Bay and Kuparuk, both about 60 mi (100 km) west of the Refuge, and the central Arctic caribou herd. According to Pat Valkenberg, a research coordinator with the Alaska Department of Fish and Game, the herd has increased its numbers from 15,000 in 1985 to 27,100 in 2000 despite several hundred miles of roads and more than a thousand miles of elevated pipe.
As mentioned previously, drilling in the ANWR can now be accomplished with far less impact than could have been possible using older technology. Among the improvements are smaller gravel pads to support the wells, greater distances that can be reached from a single (draining) pad, the re-injection of drilling wastes (eliminating the need for large waste pits), and a reduction in the need for gravel roads. In addition, other improvements include three-dimensional seismic exploration, four-dimensional time-lapse imaging, ground-penetrating radar, and enhanced computer processing of resulting data on geological structures. According to the Energy Department, these latter improvements have increased the number of successful wells from about 10% to as much as 50%, resulting in a decrease in the number of pads and exploration costs. Together, these advances decrease the developmental impact.
Between 1980 and 1994, Alaska's North Slope (ANS) oil field development and production activity contributed over $50 billion to the U.S. economy. The oil-rich region extended eastward from the 2-billion-barrel Kuparuk River field, past the Prudhoe Bay field (originally 11 billion barrels, now down to about 4 billion barrels), and a few smaller fields (such as Lisburne and Endicott), and in all likelihood extends through ANWR's 1002 Area. With the close proximity of these current oil resources, it is believed that the ANWR could easily contain the largest un-drilled, petroleum potential known in the United States.
The state of Alaska is already strongly tied to oil with regards to its revenue base. The Prudhoe Bay field, the largest single accumulation of oil ever discovered in North America, is located on lands owned by Alaska. The proportion of the state budget utilizing petroleum revenues has risen from an annual average of 12%, initially in 1968, to 90% 15 years later, and currently holds at 80%. According to Arctic Power, an Alaskan nonprofit organization, since 1987 the North Slope oil fields have provided the country with nearly 20% of its domestic production. But its actual production has been on the decline during that same period. Peak production was reached in 1980 with 2 million barrels per day, but is currently at nearly 1.2 million barrels per day. By 2010 oil flow is predicted to drop to just 315,000 barrels per day, and no new fields have been identified to compensate for the decline.
Industry interest in the 1002 Area is based in part in keeping the Trans-Alaska Pipeline operating efficiently. Oil is transported from the North Slope by the 800-mi (1,290-km) system, from Prudhoe Bay to Valdez in south-central Alaska, where it is then transferred to tankers. Pipeline costs are largely fixed; a smaller flow of oil means higher pipeline rates per barrel.
Both the national and Alaskan state governments have important political and economic reasons to develop natural resources and assist those corporations extracting them. Revenues (estimated in the billions of dollars in the form of bonus bids, lease rentals, royalties, and taxes) and employment (estimated by Senator Murkowski to create between 250,000 and 735,000 jobs) from such companies are central to their financial welfare. Backed by the majority of Alaskans, two U.S. senators and one house representative from Alaska are strong advocates of oil development in the ANWR in order to meet the state's economic needs.
Mark Rubin of the American Petroleum Institute says that ANWR is the best place to look for domestic oil. The Coastal Plain lies between two known major discovery areas. To the west, the Prudhoe Bay, Lisburne, Endicott, Milne Point, and Kuparuk oil fields are currently in production. To the east, major discoveries have been made in Canada, near the Mackenzie River delta, and in the Beaufort Sea. Rubin adds that if current predictions hold, then there is more oil in ANWR than any other place in the United States. Petroleum geologists agree that the Coastal Plain is America's best possibility for a major discovery like the giant "Prudhoe Bay-sized" discovery. Estimates from the Department of Interior range from just under 6 to upwards of 16 billion barrels of recoverable oil.
According to a February 2000 poll performed by the Dittman Research Company, more than 75% of Alaskans favor exploration and production of the oil reserves in ANWR as long as it is done in an environmentally sound way that keeps land disturbances to a minimum. According to a poll taken by the Los Angeles Times between January 31 and February 3, 2002 (and backed by earlier polls with similar results), 48% of all Americans favor opening a part of the ANWR to energy exploration. Alaska Democratic Party Chairman Scott Sterling said that he supports oil drilling in ANWR as long as wildlife is protected.
The Inupiat people of the North Slope have called the Arctic their home for thousands of years. They have depended on Alaska's North Slope and the area within the ANWR for their very lives. The majority of Inupiat Eskimos support onshore oil development on the Coastal Plain. These partial-subsistence hunters will gain financially (by providing jobs, schools, and a better economy) from leasing ANWR's potentially rich land to the oil companies. On the other hand, the Inupiat people fear the potential disruption of wildlife and their way of life. However, former Inupiat Mayor Benjamin P. Nageak said that since the first discovery of oil in 1969 the oil companies have consistently met the strict standards and regulations that were imposed on them in order to protect the land. Nageak went on to say that his people have the greatest stake possible in seeing that all development is performed in an environmentally safe way.
Oil development in the ANWR could yield up to 16 billion barrels of oil. The U.S. economy is highly dependent on oil and because of this the country is currently importing over half its oil, much from the Middle East. Conservation and renewable energy have great potential, but for today and for many years to come, oil will be a major source of energy. While it may be gratifying for some to strongly resist drilling in sensitive areas, it is naïve to ignore the national security and economic benefits that ANWR oil extraction can provide. Rather than trying to prevent the inevitable, ecologists (and others sensitive to the environment) should work hard to design and implement enforceable environmental standards for drilling in sensitive areas such as ANWR. Because the United States—at least for the foreseeable future—is so dependent on petroleum, the energy resources of the ANWR should be developed.
Viewpoint: No, energy resources in the Arctic National Wildlife Refuge should not be developed, because the gain would be minimal and the cost to the environment unacceptable.
Early explorers to the North Slope of Alaska often noted oil seeps and oil-stained sands on the surface. Yet it was not until 1944 that oil exploration began in earnest on 23 million acres of what was then called Naval Petroleum Reserve Number 4 in northwestern Alaska.
In 1968, North America's largest oil field was discovered near Prudhoe Bay, Alaska. The Trans-Alaska pipeline was finished in 1977. By 1981, the oil fields around Prudhoe Bay, Endicott, and offshore in the Beaufort Sea, yielded about 1.7 million barrels of oil per day—about 25% of U.S. domestic production. By 1988, these oil fields showed signs of exhaustion and oil yields declined. No new oil fields have been discovered in this area.
In the late 1980s and early 1990s, oil companies leasing off-and onshore sites farther east announced the potential for oil drilling on these holdings. These sites are situated in or just offshore of the Arctic National Wildlife Refuge (ANWR), designated by Congress in 1960 as an 8.9-million acre protected wilderness. The Alaska National Interest Lands Conservation Act (ANILCA, 1980) doubled ANWR's size, but omitted protection for the shoreline region known as 1002 Area, pending further research into its oil-production potential and its effects on wildlife. This region is the main focus of interest for oil companies and conservationists. The U.S. Geological Survey (USGS) has analyzed the region's energy potential, and found that ANWR and 1002 Area do contain oil. The questions remain, though, about whether it is economically feasible to recover it.
The U.S. Fish and Wildlife Service (FWS) meanwhile conducted numerous studies to assess the effects of oil exploration and extraction on ANWR's wildlife. They concluded that resource exploitation would seriously affect the Porcupine herd of caribou, destroy polar bear den areas, and disrupt key breeding bird sites.
There is oil under ANWR. But the first two questions that need to be answered are: "How much is there?" and "Is it economically and technically feasible to extract it?"
The most reliable studies of potential oil deposits under ANWR have been conducted by the USGS. The agency assessed the potential for technically recoverable oil in ANWR and in 1002 Area. The agency has reported that there are three likely scenarios surrounding the amount and recoverability of the oil.
Scenario 1: Most Likely, Most Recoverable, Least Amount.
There is a 95% probability of finding 5.7 billion barrels of recoverable oil from ANWR's Coastal Plain. Peak production rates for this scenario are estimated between 250 and 400 million barrels per year.
There is a 50% probability of finding 10.3 billion barrels of oil that are recoverable from ANWR's Coastal Plain. Peak production rates for this scenario are estimated between 400 million and 600 million barrels per year.
Scenario 3: Least Likely, Least Recoverable, Greatest Amount.
There is a 5% probability of finding 16 billion barrels of recoverable oil from ANWR's Coastal Plain. Peak production rates for this scenario are estimated between 600 and 800 million barrels per year.
No matter how much oil is under ANWR, it will take time to develop the area and extract it. For all scenarios, and at the highest extraction rate, significant amounts of oil will not be produced until about 10 years after development begins, with the greatest yield after 15-20 years. Maximum yield will be recoverable for less than five years, before it begins declining rapidly. Thus, any amount of oil recovered from ANWR will not affect immediate energy needs and will contribute most to our energy needs for a period of only a few years. As discussed below, even at its greatest, this contribution is insignificant compared with U.S. energy consumption.
Not all of the oil believed to underlie ANWR is technically or economically recoverable. The FWS reports that at prices lower than $16 per barrel, there is no economically recoverable oil in 1002 Area of ANWR. The amounts and rates of oil extraction set out in the above scenarios assume an oil price of $24 per barrel to make extraction economically feasible. It is clear that the most recoverable oil (at 95%) yields the least economic return in terms of oil production.
Much of the oil under ANWR and 1002 Area occurs as small, widely dispersed deposits. The USGS, with concurrence from oil companies, states that accumulations of less than 100 million barrels of oil are uneconomic for mining. Other economic factors that influence the cost of oil extraction are the current state of oil-extraction technology and the field's proximity to infrastructure.
The region known as 1002 Area is 100 mi (161 km) wide and located more than 30 mi (48 km) from the tail end of the nearest pipeline and more than 50 mi (80 km) from the nearest gravel road and oil support facility. To be fully developed, 1002 Area would require the construction of all the above, plus production sites, power plants, processing facilities, loading docks, living quarters, airstrips, gravel pits, utility lines, and landfills. Thus, its isolation adds significantly to the costs of developing its oil. The USGS report shows that far less oil can be economically recovered than actually occurs, or even than is technically recoverable. (Technically recoverable oil is defined as the in-place oil that is available for extraction based on geology and the state of current oil-extraction technology, regardless of cost.) Further, when oil prices decline, some oil companies may simply abandon their oil fields, leaving the infrastructure and waste lagoons intact.
The crux of the argument in favor of oil drilling in ANWR and 1002 Area is that it will significantly reduce U.S. dependence on foreign oil; that it will make the United States more "energy independent." That argument is patently untrue.
As of 2000, the United States consumes about 19.6 million barrels of oil each day, or 7.154 billion barrels per year. If development of ANWR's oil fields began tomorrow and oil began to flow by 2010, the national rate of oil consumption would by then be more than 8 billion barrels per year. By the time of ANWR's maximum output, in 2020, U.S. oil consumption is projected to be about 9.5 billion barrels per year. Yet at its maximum output, ANWR would yield merely 800 million or so barrels of oil per year. And this high yield would last for only about five years, before declining drastically.
In short, even if ANWR could produce the maximum amount of oil (16 billion barrels, at a 5% chance of recovery), it would at best contribute less than 10% of U.S. oil needs. If the mean amount of oil was recoverable (10.3 million barrels, at 50% chance of recovery), at best about 5% of U.S. oil needs would be met. For the most recoverable oil (5.7 billion barrels, at 95% chance of recovery), only about 2% of our oil needs would be met by ANWR.
Those who are concerned with U.S. dependence on foreign oil—which should be everyone—obviously cannot find relief in ANWR's oil. However, raising fuel-efficiency standards in American cars and trucks—or even using better tires—will significantly reduce our oil consumption and thus our need for foreign oil. Raising the fuel-efficiency of cars, SUVs, and trucks to 39 mi (63 km) per gallon (mpg) would save vastly more oil than occurs in all of ANWR. At 39 mpg, we would save a whopping 51 billion barrels by 2050. Just using more efficient tires would save more oil than ANWR can produce. On an annual basis, by 2020 (the time of ANWR's maximum output), if vehicles are getting 39 mi (63 km) to the gallon, we would be saving more than 1.2 billion gallons of oil per year—far more than ANWR yields.
ANWR is one of our last, great undisturbed wildernesses and the last U.S.-owned remaining intact arctic-subarctic ecosystem. It is recognized as a key component in an international arctic-subarctic refuge network (including neighboring preserves in Canada, where resource exploitation is forbidden). The FWS studies have shown that oil extraction in ANWR, and particularly in 1002 Area, will have severely negative effects on wildlife.
ANWR is home to the Porcupine herd of caribou, which migrates through the refuge and into and out of adjacent preserves in Canada. However, the largest concentration of caribou calving locations lies within 1002 Area. The FWS has shown that oil extraction in this area would reduce suitable calving locations, reduce available forage for caribou, restrict their access to insect-relief habitat on the coast, expose the herd to higher predation, and alter ancient migratory pathways, with unknown consequences for the herd. The FWS concludes that there is no doubt that oil drilling will damage, perhaps irremediably, the Porcupine herd of caribou. A 1987 FWS report also indicates a similar "major" effect (defined as "widespread, long-term change in habitat availability or quality" that would negatively affect wildlife) for ANWR's muskoxen.
The FWS reports that ANWR and 1002 Area are "the most important land denning habitat for the Beaufort Sea polar bear population." Denning bears are female bears with cubs. Without these denning areas, this population of polar bears would decline, due to increased cub mortality. Development might also result in more deadly bear-human confrontations.
More than 135 species of birds are known to nest in 1002 Area, including many shore-birds, waterfowl, loons, songbirds, and raptors. Oil drilling would result, at the least, in disturbance of nests, at worst, in destruction of the habitat required by breeding birds for nesting and feeding. Most affected birds include snow geese, seabirds, and shorebirds.
ANWR is tundra. Permafrost lies beneath it. This land and its vegetation are extremely vulnerable to disturbance and mend slowly or not at all. The land is still scarred, and the vegetation still damaged, where simple seismic studies were conducted more than 15 years ago. Tire tracks leave scars and ruined vegetation that takes decades to recover, if they recover at all. Wildlife cannot survive in this harsh place while waiting for vegetation to recover. And if simple tire tracks leave permanent scars, the damage inflicted by the infrastructure built to sustain oil extraction will do irremediable damage.
The Inupiat and Gwich'in peoples of northeast Alaska depend on the caribou for survival. (Gwich'in means "people of the caribou.") Not only do these native people have a deep spiritual and cultural attachment to the caribou, but they rely on them for much of their subsistence, from meat to skins for clothes and shelter to tools and trade. The Gwich'in are most closely associated with the Porcupine caribou herd, which is most threatened by oil development. Both the Gwich'in and the Inupiat continue to lobby the U.S. government to abandon plans for oil development in ANWR, and to pressure the Canadian government to oppose it.
To make oil drilling in ANWR more palatable, Congress nominally reduced the size of the area open to "production and support facilities" to 2,000 acres on the Coastal Plain (1002 Area), or a 2,000-acre "footprint." "Footprint" is an oil-industry term used to describe the number of acres actually covered with a layer of gravel to support oil-field infrastructure.
However, this provision excludes "leasing and exploration," which will be permitted on the entire 1.5-million-acre Coastal Plain. Exploration means drilling. Oil companies do not drill anywhere they will be prohibited from extracting profitable oil.
Further, the 2,000-acre limit applies only to "surface" acreage. It does not cover "seismic or other exploratory" activities. Seismic research is done with convoys of bulldozers and "thumper trucks." Oil exploration entails erecting large oil rigs and airstrips for aircraft.
The limitation also does not apply to aboveground pipelines, which, because they do not touch the ground, are not considered as part of the acreage developed! FWS studies show that caribou avoid calving within 2.7 mi (4.4 km) of pipelines and roads, thus greatly expanding the "footprint" impact of development on wildlife.
The impression given by the limitation is that the 2,000 acres will be contiguous and compact. That is false. Nothing prevents smaller, intermittent developments over a vast area of the Coastal Plain. In fact, the USGS has reported that "oil under the coastal plain is not concentrated in one large reservoir, but is spread underneath [it] in numerous small deposits." Developing these widely dispersed deposits would damage an area far greater than 2,000 acres—and would affect wildlife throughout the region.
There is oil under ANWR. However, the amount of oil that can be extracted technically and profitably does not begin to approach the amount of oil the U.S. needs to reduce its dependence on imports. Improving fuel efficiency will have a far greater impact on reducing our oil consumption and dependence on foreign oil. Furthermore, it will save a priceless and irreplaceable wilderness that a secretary of the interior described this way: "[ANWR's] wildlife and natural [wilderness] values are so magnificent and so enduring that they transcend the value of any mineral that may lie beneath the surface. Such minerals are finite. Production inevitably means changes whose impacts will be measured in geologic time in order to gain marginal benefit that lasts only a few years."
Arctic National Wildlife Refuge. U.S. Fish and Wildlife Service [cited July 12, 2002]. <http://www.r7.fws.gov/nwr/arctic/index.html>.
"Arctic National Wildlife Refuge: Potential Impacts of Proposed Oil and Gas Development on the Arctic Refuge's Coastal Plain: Historical Overview and Issues of Concern." U.S. Fish and Wildlife Service Report [cited July 12, 2002]. <www.fws.gov>.
"Arctic National Wildlife Refuge, 1002 Area, Petroleum Assessment, 1998." USGS Report [cited July 12, 2002]. </geology.cr.usgs.gov/pub/fact-sheets/fs-0028-01/fs-0028-01.htm>.
Baden, John A. "Drill in the Arctic National Wildlife Refuge?" Bozeman Daily Chronicle (31 October 2001).
Chance, Norman. "The Arctic National Wildlife Refuge: A Special Report." Arctic Circle. University of Connecticut [cited July 12, 2002]. <http://arcticcircle.uconn.edu/ANWR/>.
Corn, M. Lynne, Lawrence C. Kumins, and Pamela Baldwin. "The National Arctic Wildlife Refuge." The CRS Issue Brief for Congress. National Council for Science and the Environment [cited July 12, 2002]. <http://cnie.org/NLE/CRSreports/Biodiversity/biodv-14.cfm>.
Doyle, Jack. Crude Awakening: The Oil Mess in America: Wasting Energy, Jobs, and the Environment. Friends of the Earth, 1994.
Lentfer, Hank, ed. Arctic Refuge: A Circle of Testimony (Literature for a Land Ethic). Milkweed Editions, 2001.
Mitchell, John G. "Oil Field or Sanctuary?"National Geographic Society [cited July 12, 2002]. <http://magma.nationalgeographic.com/ngm/data/2001/08/01/html/ft_20010801.3.html>.
Natural Resources Defense Council (NRDC) [cited July 12, 2002]. <www.nrdc.org/land/wilderness/anwr>.
NWR News [cited July 12, 2002]. <http://www.anwr.org/index.html>.
The Oil and Gas Resource Potential of the Arctic National Wildlife Refuge 1002 Area, Alaska. Open File Report 98-34. Staff of the U.S. Geological Survey. Reston, VA: U.S. Geological Survey, 1999.
Petroleum Supply, Consumption, and Imports, 1970-2020 (million barrels per day). National Association of State Energy Officials [cited July 12, 2002]. <http://www.naseo.org/events/winterfuels/2001/presentations/Blake1.pdf>.
Potential Oil Production from the Coastal Plain of the Arctic National Wildlife Refuge: Updated Assessment. Report # SR/O&G/ 2000-02, U.S. Department of Energy [cited July 12, 2002]. <http://www.eia.doe.gov/pub/oil_gas/petroleum/analysis_publications/arctic_national_wildlife_refuge/html/execsummary.html>.
"Senator Launches Battle over Drilling in Arctic Refuge." Inside Politics. February 21, 2001 [cited July 12, 2002]. <http://www.cnn.com/2001/ALLPOLITICS/02/26/arctic.refuge.drilling/>.
Strohmeyer, John. Extreme Conditions: Big Oil and the Transformation of Alaska. New York: Simon & Schuster, 1993.
Trustees for Alaska [cited July 12, 2002].<www.trustees.org>.
Union of Concerned Scientists [cited July 12,2002]. <www.ucsusa.org/energy/brf_anwr.html>.
Ward, Kennan. The Last Wilderness: Arctic National Wildlife Refuge. Wildlight Press, 2001.
The animals of a particular habitat, region, or geological period.
The plants of a particular habitat, region, or geological period.
Relating to or denoting geological surveying methods involving vibrations produced artificially, such as by explosions.
Prudhoe Bay, on the North Slope west of ANWR, has been in oil development since the early 1980s. Since few people ever go there and see for themselves, not many people know what the impact of oil exploitation has been. Below are a few facts that should be considered before developing ANWR for oil extraction.
More than 1,000 square miles of tundra are covered with gravel (an area greater than Rhode Island); 23 additional oil fields cover another 2,000 acres; the Trans-Alaska pipeline and haul road eat up another 10,000 acres; there are more than 1,123 mi (1,807 km) of subsidiary roads and pipelines connected to oil wells, with an additional 500 mi (804 km) of roads along these pipelines; there are two 6,500-ft (1981-m) airstrips.
More than 10,000 acres of wetlands have been filled and covered by gravel for roads, airstrips, drill pads, and other facilities. All told, more than 22,000 acres of the North Slope is covered in gravel; there are 350 mi (563 km) of gravel roads; one mile of road requires 50,000 cubic yards of gravel. (Phillips Petroleum used more than 1 million cubic yards of gravel to fill in a 100-acre wetland for just one well.) Gravel is mined from open pits along floodplains, river deltas, and riverbanks; gravel mines covered the entire flood-plain of the Put River. The FWS estimated that over 60-million cubic yards of gravel have been mined, enough to cover Rhode Island with a 1-in (2.5-cm) layer of gravel.
The Arctic is arid, getting a mere 3-12 in (8-30 cm) of precipitation per year. Oil exploitation is water-intensive: each year 27 billion gallons of water are used for oil extraction; a single well requires 1.5 million gallons for drilling and another 360,000 gallons for "camp" use. Winter roads are "paved" with 6-in (15-cm) thick ice: one mile of road requires 1-1.5 million gallons of water for "paving," ice helipads need 2-3.6 million gallons; one airstrip gets 8 million gallons of water for ice-paving.
Between 1991 and 1997, 25 billion gallons of toxic pollutants were discharged into surface waters of the North Slope. Saline water (estimated at 16.4 million gallons) from the Prudhoe Bay is drawn into wells, contaminating freshwater resources.
Oil and other contaminant spills are a chronic problem: there are about 400 spills a year of various toxic substances onto the surface; between 1984 and 1993, there were 1,955 crude oil spills (376,321 gallons), 2,390 diesel spills (464,856 gallons), 977 gasoline spills (13,382 gallons), and 1,360 hydraulic fluid spills (77,301 gallons). From 1996 to 2000, more than 1.3 million gallons of oil (crude, diesel) were spilled. In 2000 alone, 18,000 gallons of drilling mud spilled at a BP facility, 9,000 gallons of crude gushed from a ruptured pipeline, destroying a wetland, 92,000 gallons of a salt water/crude oil mixture covered the tundra near a Phillips Petroleum site.
As of 1990, more than 4 million gallons of crude, gasoline, diesel, hydraulic fluid, acids, corrosives, heavy metals, lead, and other toxic chemicals had been spilled on the North Slope. Oil companies admit that they are unable to control or to clean up spills, citing the inclement Arctic weather. Their "spill drills," or clean-up tests, fail repeatedly.
Before 1988, about 6 billion gallons of drilling wastes were dumped into 450 unlined reserve pits. After mixing with snow and freezing, during spring melt, the wastewater flows over the tundra as toxic runoff and accumulates in wetlands and ponds. Lawsuits have forced oil companies to abandon surface pits. Today, the waste is injected under the permafrost. To date, less than half the surface reservoirs have been cleaned up. In March 2001, more than 5,000 gallons of drilling waste spilled onto the tundra from a waste injection facility.
"Should energy resources in the Arctic National Wildlife Refuge be developed." Science in Dispute. . Encyclopedia.com. 20 Apr. 2019 <https://www.encyclopedia.com>. | 2019-04-23T00:12:09Z | https://www.encyclopedia.com/science/science-magazines/should-energy-resources-arctic-national-wildlife-refuge-be-developed |
There was a predecessor institution to Island Resources Foundation and this was the Caribbean Research Institute (CRI) at the then College, now University, of the Virgin Islands in St. Thomas, U.S. Virgin Islands (USVI). In 1967, IRF founder, Dr. Edward Towle, commenced his tenure at the College as director of its research arm, the Caribbean Research Institute, a decided diversion from Towle’s earlier career paths as a naval officer, academician, and Smithsonian curator. CRI was the training ground for Ed and for what would later emerge as Island Resources Foundation. Here he learned how to build an institution in the Caribbean. But even more importantly, it was while affiliated with CRI that Ed was introduced to the few individuals and fewer still institutions pursuing conservation goals in the insular Caribbean of the mid-to-late 1960s. The former historian fortuitously, almost accidentally, stumbled on this new challenge, which would then direct the course of the remainder of his life.
It was an opportune moment and one that gave credence to the old adage that “timing is everything.” With funding support from American philanthropist, Laurance Rockefeller, and led by a handful of concerned but relatively unorganized advocates, the Caribbean Conservation Association (CCA) had been established in 1967 as a collaboration of governments, NGOs, and individuals united in the pursuit of conservation goals in the Caribbean. In 1968, less than a year after his arrival in St. Thomas, Ed was elected president of the CCA, no doubt, at least in part, because his unbridled enthusiasm for new causes was seen by the CCA’s organizing board to be what was needed to ignite the undertaking and move the association forward.
Towle’s presidency of CCA, from 1968-1974, put him on the frontline of this new movement and became the platform for his immersion in the early years of Caribbean conservation. CCA provided an unexpected opportunity to travel the region, meet leaders, form friendships, and learn quickly about the Caribbean. Without Ed’s tenure at CRI and, even more importantly, his concurrent assumption of the presidency of CCA, there likely would not be an Island Resources Foundation. To wit: the CCA presidency enabled Ed to take hold of essential knowledge about the Caribbean with remarkable speed and to acquire a new tool bag of risk-taking skills, something that would serve him well during the four decades of IRF’s history. After all, who but a risk-taker — especially one who was the new kid on the block, the white novice in an historically black region — would assume that he could take on the untried conservation movement and help to make it work?
Today, islands have almost become an industry unto themselves — island studies, island associations, island stakeholders, island issues, small island states, islands and climate change, UN year of small islands, and on and on. But back in the late 1960s and early 1970s, as Island Resources Foundation was taking shape first as a concept and then as an institution, that was not the case. One emerging paradigm during this period was “small is beautiful,” which became well known in 1973 after publication of a collection of essays by British economist E.F. Schumacher; thereafter, it was often used to denote technologies that were “appropriate.” But even the “small is beautiful” movement seldom focused on small islands, which at the time were very much places where “appropriate technologies” should have been — but were not being — employed.
Within a small island, no problem or area of study can stand by itself, no piece of life remains isolated; every living and non-living thing forms an integral part of a structured whole. Similarly, an island chain is a delicate and fragile network, representing a set of highly interdependent relationships — island to island, system to sub-system, island to sea.
Islands of every kind and however remote are currently experiencing strong development thrusts founded chiefly on tourism, on extractive enterprises, on their use as global air and steamship transportation nodes, and on the increased demands for local resources generated by rapidly growing insular populations. An unwanted by-product of this development has been a dramatic deterioration of island environments, accompanied by a decline in the insular quality of life as measured by welfare indicators other than the traditional economic ones ….
While the stresses and pressures of population growth, unrestrained development and modern technology are partly responsible for this decline in island environmental quality, serious shortcoming are also becoming apparent in the matter of resource planning, allocation and management [appropriate] for island systems.
The principal deficiency has been the omission of environmental values in planning and development strategies [emphasis added]. The question … therefore is how to incorporate ecological principles to a far greater degree in the modernization of island communities now being shaped by local forces and by development agencies involved in or responsible for island administration and growth.
Today these paragraphs seem all too familiar — they were groundbreaking for the early 1970s.
Islands are special places, their environments are unique and vulnerable, and the Foundation’s mission would be to assist small islands (especially those in the Caribbean) to meet the challenges of social, economic and institutional growth while protecting and sustainably managing their environments.
To this mission — environmental planning for island development — Island Resources Foundation would devote more than four decades of research, educational outreach, information sharing, technical expertise and capacity building.
Some may assume the date shown on this section’s header to be in error, as IRF has traditionally evoked 1972 as the date of its establishment. However, two years earlier, Ed Towle and two of his CRI colleagues signed incorporation papers for a non-profit organization to be domiciled in the U.S. Virgin Islands. Its name: Island Resources Foundation. Initially, this new entity was planned as an affiliate of the Caribbean Research Institute, but one which could absorb Caribbean-wide programming that was increasingly of lesser concern to the USVI-focused College of the Virgin Islands, where CRI was housed. The 1970 Articles of Incorporation for IRF were broad and expansive in their scope and reach, some might say relatively unfocused except for a concentration on small islands.
The 1970 legal framework remained on paper for several years, until 1972, when Ed and Judith Towle determined to breathe life into the happenstance foundation that up to that point only existed as a legal document. First, Judith signed on as the Foundation’s initial employee in 1971; a board of three trustees was assembled consisting of the Towles and Dr. Norwell Harrigan of the British Virgin Islands (BVI); and eventually, in 1972, Ed resigned his position at the Caribbean Research Institute and became IRF’s first president and CEO.
Throughout the world, insular communities, with limited areas, are experiencing the pressures of a growth and development phenomenon which has rarely been equaled on larger land masses. Attracted by the undeveloped, pristine nature of islands and by their recreational qualities and economic opportunities, more people from continental areas are focusing on offshore oceanic and coastal insular areas, threatening to alter the very qualities that make islands viable as ecosystems and as communities.
American and Eastern Airlines responded, and for several of IRF’s early years (indeed, for many decades in the case of American Airlines), they provided critical support for the fledgling Island Resources Foundation.
From the start, IRF found its talent and its forte in the execution of funded programs. This was the approach of its founders, and over time the Foundation’s principals realized the organization’s enduring strength lay not in a broad membership base or in building an endowment or in pursing unrestricted funding in support of centralized goals. Rather, IRF found its strength primarily from the identification and execution of funded programs that reinforced its core mission.
The Foundation did build a small but enthusiastic membership base over time, which largely grew out of an endangered species research program led by IRF scientists who, from 1971 to 1976, conducted annual research expeditions to study, monitor, and tag green sea turtles nesting at Aves Island, an isolated, then uninhabited Venezuelan island in the eastern Caribbean that was a major nesting site for this endangered species. To raise funds for the research, IRF initiated a “name your turtle” program that allowed donors to name a tagged turtle and follow the animal’s progress in Caribbean waters. When this research initiative ended, the Foundation had assembled a base of donors, and the Aves Island contributors eventually morphed to a larger group of persons interested in the Foundation’s work who, in turn, became IRF’s initial universe of members.
IRF’s first headquarters was in St. Thomas at the Johnny Harms Lagoon Marina on the island’s eastern end. Harms, who is credited with first promoting sports fishing in the USVI, was long a friend and supporter of IRF, especially during its earliest years. In 1983, IRF moved to an adjacent property where it was housed in a “wooden cottage” style building that reflected traditional West Indian architecture and was expressly constructed for IRF’s occupancy. In that same year, the Foundation opened a small auxiliary office in downtown Washington, DC, and, from 1990-1999, IRF supported a second auxiliary office based at the National Museum in St. John’s, Antigua; the later facility existed largely in support of IRF’s NGO strengthening program. Finally, in the late 1990s, in partnership with the H. Lavity Stoutt Community College in Tortola, IRF established a registered office in the British Virgin Islands and, in 1997, donated its extensive and respected library on Caribbean environments to the College.
Like any child learning to take its first steps, the Foundation officially came to life in 1972 with perhaps more uncertainty and a few more tumbles than anticipated. During that first decade, what we called our survival decade, IRF was nothing so much as it was eclectic — it was at times all over the programming map as the organization’s principals sought to define its identity more clearly, focus its ambitions more realistically, and support its programs more sustainably.
IRF began close to home, in the U.S. Virgin Islands. It developed a partnership with the territory’s new Department of Conservation and Cultural Affairs, one of the first — if not the first — environment-focused departments or ministries of government in the region. Before the department had sufficient staff, IRF served as its surrogate research arm, while also partnering with the government’s Planning Office (1976-77) to design the territory’s brand new coastal zone management program, the first in the eastern Caribbean. IRF prepared a comprehensive marine resource assessment and coastal classification system for the U.S. Virgin Islands and developed the initial CZM planning guidelines.
Nowhere in the 1970s was environmental stress induced by change more evident than in the coastal zone of Caribbean insular environments where competing human interests interacted directly with the dynamics of natural ecosystems. Recognizing the need for improved management strategies for coastal environments, the Foundation began to carry out a series of projects that initially focused on water quality and pollution control, fisheries development, and marine resource utilization, but which eventually led to the Foundation’s more integrated contributions to coastal area planning in the wider Caribbean in the 1980s and 1990s.
At the same time, Island Resources Foundation was among the earliest advocates for environmental impact assessment (EIA) procedures for Caribbean islands, in a region that was rapidly developing but with few standards or controls for understanding how development was impacting the environment. EIAs prepared by the Foundation in the 1970s for Caribbean public sector infrastructure projects (including airport construction, mass transportation systems, harbor dredging, dock construction, sand mining and petroleum transport facilities) were among the first in the region.
With support from the United Nations Development Programme, the Foundation undertook the region’s first environmental survey (1973-74) of selected Caribbean islands (eight in all), reporting on key problem areas requiring special management approaches well before these issues were more generally appreciated. In 1976, the Foundation was commissioned by the British Virgin Islands Government to carry out a more comprehensive environmental survey of the BVI including preparation of attendant guidelines for future development options in the territory.
During this period, IRF began to reach out to Caribbean governments to provide assistance for park planning, training, research and ecotourism programs. Earliest initiatives concentrated on the Dominican Republic, Dominica, Anguilla, Jamaica, and offshore islands in Venezuela and Panama as these and other Caribbean states began to formulate how to protect natural resources within protected area frameworks. Cultural heritage was also on the Foundation’s agenda during its early years, including a 1976 inventory of over 100 historical sites and landmarks in ten Caribbean islands.
Environmental Planning and Impact Assessment, with an emphasis on coastal and marine resource development.
in IRF’s future as biodiversity conservation and research.
Additionally, by the end of the 1970s, an overarching approach to program execution had been firmly embedded in IRF rhetoric and pursuits, namely, the Foundation’s tenacious emphasis on the application of sound science to environmental problem solving.
As the Foundation’s reach and scope expanded, so did its staff. From two employees in 1972, the Foundation’s permanent staff would number between 10 and 20, dependent on project activity, and included biologists and ecologists, geologists and historians, planners and economists, system analysts and international development specialists, community organizers and institutional specialists.
Additionally, IRF came to rely on an interdisciplinary rooster of IRF-affiliated associates who consulted with the permanent staff within their disciplinary specialties, helped to keep the Foundation informed regarding island affairs, and remained available for assignment on appropriate IRF projects. Numbering approximately 75 professionals with island residency or island-specific experience, the Foundation’s Research and Program Associates helped to expand the reach and opportunities available for the organization’s ongoing work.
From its inception, the Foundation’s governing board has comprised individuals whose background and skills included experience not only in environmental sectors but also in international development and business management. In so doing, the Foundation recognized the need to address environmental concerns within a broader framework of economic and social development. These concerns were reflected in the composition of the Foundation’s board of trustees for more than four decades, and were perhaps best illustrated in the 1970s when George A. Spater, then president of American Airlines, and Dr. Harold J. Coolidge, a founding member of the IUCN and the WWF-US, both served on the IRF board at the same time.
Beginning in 1973, Island Resources Foundation launched a program of sponsored internships, successfully placing over 50 student interns from North American and Caribbean academic institutions. IRF interns (primarily at the graduate-student level) were generally assigned to the Foundation’s offices in St. Thomas, Tortola, Antigua, and Washington, DC, although approximately a dozen interns were also placed with IRF institutional partners in the Caribbean, primarily environment-focused NGOs.
Throughout its history, Island Resources Foundation built an organization that promoted openness, mutual trust, and confidence, which in turn created pride and loyalty among the organization’s staff, program associates, recurrent consultants, trustees, members, supporters, Caribbean partners, island stakeholders, and even some donors. Such esprit de corps enhanced the Foundation’s reputation, energized IRF’s leadership, and created a congenial institutional framework that was conducive to progress and sustainability.
In the 1980s two programs stand out in the narrative of Island Resources Foundation’s development, in terms of level of funding, uniqueness, and impact.
The first was development of environmental profiles for eight eastern Caribbean countries and territories.
The background for these studies dated to the mid-1970s when the Congress of the United States directed the U.S. Agency for International Development (USAID) to provide a statement of baseline environmental conditions and institutional capacity for all AID-recipient countries. These statements would be called Country Environmental Profiles. Subsequently, in 1986, the Caribbean Conservation Association in Barbados and the University of the West Indies sponsored a conference at which participants acknowledged the need for environmental profiles, specifically in the eastern Caribbean. Finally, by 1987, USAID’s mission in Barbados had launched a program to provide environmental profiles for each AID-funded country in the eastern Caribbean.
The ensuing Profile Program was implemented by the Caribbean Conservation Association, with Island Resources Foundation selected to provide the technical skills needed to prepare the documents. The profiles — for Antigua and Barbuda, Dominica, Grenada, St. Kitts and Nevis, St. Lucia, and St. Vincent and the Grenadines — were funded by USAID, prepared by IRF, and published by CCA and IRF. Shortly thereafter, the United Nations Development Programme in Barbados approached CCA and IRF to undertake a similar project for two UK territories in the eastern Caribbean — Anguilla and Montserrat.
The eight profiles were groundbreaking for their time. An unprecedented assemblage of institutions, government agencies, NGOs, and individuals were involved in a first-of-its-kind effort to comprehensively examine and assess priority environmental issues in the eastern Caribbean. Unique to the process, particularly for the years in which the documents were produced, was the requirement that the lead technical assistance organization (IRF) was partnered in each island with an indigenous NGO and a designated government agency, a collaboration that IRF insisted on when drafting the program’s operational framework.
The second major IRF program in the 1980s, continuing into the 1990s, was the Foundation’s Institutional Strengthening Program for Eastern Caribbean Environmental NGOs. This nine-year initiative (1986-95) was at the time the largest regional program specifically targeting the role of the non-profit sector in Caribbean environmental affairs. It represented an overdue policy recognition of a longstanding Foundation assertion that non-governmental organizations had a major role to play in the management of the region’s environment.
An ambitious institutional support program was launched by IRF in the mid-1980s with start-up funding from the World Wildlife Fund-US and the Rockefeller Brothers Fund. Long-term support was later facilitated through a Cooperative Agreement with the U.S. Agency for International Development. For almost a decade, from its office in Antigua, IRF provided targeted technical assistance, in-country training, small grants, and institutional planning support for emerging conservation NGOs, a then mostly unrecognized sector in the eastern Caribbean. By its end, the program had confirmed that these organizations had important roles to play as agents for sustainable development and as institutional stakeholders for building consensus about national development goals.
Melding the management processes for these multi-island, multi-disciplinary projects was a major challenge for the Foundation, but by implementing careful data management and program accountability, IRF was able to maintain credibility with donors and leverage benefits for participating island organizations and government agencies.
Environmental Policy and Law, highlighted by preparation of Country Environmental Profiles but eventually to include conflict resolution and environmental arbitration, economic analysis of natural resource development, policy innovation for insular resource management, co-management strategies for natural resource protection, and evaluation of environmental institutions, legislation and programs.
Institutional Development, with an emphasis on skills building for islanders and collaborative capacity building for island institutions, highlighted by the Foundation’s NGO Strengthening Program.
Additionally, in the 1980s, IRF assumed leadership — as a founding member and coordinator — of the Virgin Islands Resource Management Cooperative (VIRMC), a unique collaboration of public and private sector institutions who recognized the need for a cooperative approach to the management of natural resources in the wider Virgin Islands, including the British Virgin Islands. With funding from the John D. and Catherine T. MacArthur Foundation and the U.S. National Park Service, and joined by collaborating VIRMC institutions, IRF executed a five-year research program focused primarily on the marine resources of the Virgin Islands Biosphere Reserve. Thirty research studies were carried out by 33 investigators from nine VIRMC-affiliated institutions.
INFORMATION – THE LIFEBLOOD OF ISLAND RESOURCES FOUNDATION!
Island Resources Foundation was built on the premise that knowledge is power and that information is the basis for informed decision-making about the environment in small islands. Therefore, with the launching of Island Resources Foundation in the early 1970s, its founder, Dr. Edward Towle, determined that the institution would create a library of information, comprised primarily of non-traditional, so-called gray (unpublished) literature, and that this information would be available within an open-access framework. The subject matter of IRF’s library — small island systems, insular environments, and sustainable development in the Caribbean — were all relatively new subjects for the region in 1972. And because initially these were pre-Internet, pre-Google, even pre-personal computer years, the extensive service function provided by the library Ed created, as well as his conscientious cultivation of a broad distribution network, fulfilled a growing regional need at a level that was unique for its time.
As the Foundation’s library became better known among neighboring Caribbean islands, regional institutions, government agencies and international bodies, and as the Foundation developed its own publication series, exchange arrangements became possible, which also added to the Foundation’s ability to acquire new materials for its collection.
Eventually, the IRF library in St. Thomas (with an auxiliary library in Washington, DC) totally outstripped the organization’s ability to properly house it at the Foundation’s facility in the U.S. Virgin Islands. Ed began to explore options for the future development of this valuable collection and to address the immediate problems of housing and access.
The solution lay in a new partnership between Island Resources Foundation and the H. Lavity Stoutt Community College in Tortola, British Virgin Islands. In 1997, the Foundation donated its library to the College and transferred it to Tortola, where it is currently housed at the College’s Learning Resource Centre as the Dr. Edward L. Towle Island Systems Environmental Information Collection.
By 2015, the College and Island Resources Foundation mutually recognized that accessibility was again an issue as digital library collections were becoming the norm. The two institutions created a new partnership, this time to digitize the Towle Collection, eventually to scan all documents, convert each to a searchable PDF format, and index the collection within a newly created digital cataloguing system.
The decade of the 1990s witnessed a transition in the leadership of Island Resources Foundation. Founder and longtime president, Dr. Edward L. Towle, retired in 1998, thereafter assuming the chairmanship of the board of trustees. The presidency was taken up by Bruce G. Potter, who had joined the Foundation’s staff in 1994. A former U.S. Peace Corps Volunteer and later staffer for Latin America and the Caribbean at Peace Corps headquarters in Washington, DC, Bruce also brought to the Foundation an extensive background in economic planning, disaster management, institutional development, and information systems management in both the public and private sectors.
Environmental Information Management, concentrating on the development of information management models and strengthening the availability of information resources for informed decision making.
Under Potter’s leadership, the Foundation became a leader in the development of emerging information management technologies that actively encouraged improved environmental decision making for small island states. With Bruce as coordinator and more than 30 electronic mail groups under his management, IRF began to concentrate on building regional and global networks among islanders to facilitate communication and information exchange. E-groups were established in response to constituent requirements and covered diverse subject matter from Caribbean biodiversity to geographic information systems to sustainable tourism. Potter’s contributions to the field will be continued with the establishment in 2016 of the Bruce G. Potter Nature Tech Fund.
Island-specific Biodiversity Research and Conservation, designed to provide technical expertise in biodiversity for highly stressed insular environments, species, and habitats.
Another long-term initiative commencing in the 1990s concentrated on a series of research studies in the U.S. Virgin Islands and Puerto Rico to develop erosion models and sediment control practices for land-based activities that impact fragile coral reef systems in Caribbean islands. The program, which extended to 2015, was directed by IRF geologist and watershed management scientist, Dr. Carlos Ramos Scharrón. During the 1990s, IRF researchers also created guidelines for sediment control practices in the insular Caribbean, including best management practices for land use activities that impact coastal ecosystems (published by the United Nations Environment Programme for the Caribbean in 1994).
Many program initiatives from earlier decades were extended in the 1990s, for example: park and protected area planning with the preparation of a comprehensive management plan for the Bird Island Marine Reserve in Antigua and an assessment of the Montego Bay Marne Park and Blue Mountain National Park in Jamaica.
IRF continued to focus on integrated coastal area planning keyed to small-island conditions, especially island states with expanding tourism sectors and increasing vulnerability to natural disasters. In the 1990s, the Foundation developed management plans for 18 “areas of particular concern” as designated under U.S. Virgin Islands Coastal Zone Management legislation. In 1996, IRF developed comprehensive guidelines for integrated coastal area planning in the wider Caribbean, which were published and disseminated by the United Nations Environment Programme’s Caribbean office in Jamaica.
Throughout its history, Island Resources Foundation has been a contributor to global initiatives designed to enhance the development options of small islands. IRF’s second president, Bruce Potter, expanded the Foundation’s longstanding interest in educating international agencies and donor institutions about the uniqueness of insular environments. Under his leadership, IRF partnered with global island initiatives such as the Global Islands Network (www.globalislands.net), an early worldwide, internet-based information consortium intended to provide easy access to available information on sustainable island development.
During its four-decade tenure, Island Resources Foundation funded its program activities primarily through a combination of externally funded grants and contracts, collaborative partnerships, and private sector contributions.
With project-specific funding totaling just under $10 million, primary programmatic support and donors have included 14 U.S. Government agencies, 9 Caribbean Governments, more than a dozen international and Caribbean regional agencies, and more than 50 private sector institutions, including corporate sponsors, philanthropic foundations, and other grant-making, non-governmental organizations.
Preliminary planning for the proposed Nevis Peak National Park.
Completion of a five-year Conservation and Management Plan for the protection of bat species in the US Virgin Islands.
Preparation of a biodiversity inventory and status assessment for the Wallings Forest Protected Area and the Codrington Lagoon National Park in Antigua and Barbuda.
Development of environmental and socioeconomic baseline studies for proposed park sites in St. Kitts and Grenada.
Yet, even as these and other activities moved forward, the Foundation was beginning to slow down. Increasingly, programs focused on the Foundation’s office in the British Virgin Islands where IRF had maintained an office since the late 1990s with IRF founder and vice president, Judith Towle, directing operations. Two major projects were initiated in this British overseas territory commencing with the turn of the century.
The first was an eight-year project which brought IRF full circle back to its initial donor in 1972 — Laurance S. Rockefeller. The American entrepreneur and conservationist owned a 14-acre island in the British Virgin Islands known as Sandy Cay, which he had maintained for over 30 years as a private park with open access to all. As part of his planning to donate the island to the BVI, Rockefeller sponsored a comprehensive program to facilitate the donation. First, he engaged Island Resources Foundation to prepare an ecosystem survey and a long-term management plan for the island. But Rockefeller did not stop there as he wanted to ensure that Sandy Cay would be managed and protected in perpetuity as a unique natural area as it had been for more than three decades under his stewardship.
Thus, in partnership with IRF and in collaboration with the National Parks Trust of the [British] Virgin Islands, Rockefeller funded an eight-year multifaceted program of sustained and targeted assistance for BVI institutions, laws and policies that supported conservation and protected area management. The so-called Sandy Cay Program, co-directed by Edward and Judith Towle, would be Dr. Towle’s last IRF project; both he and Laurance Rockefeller would die before the island was formally transferred to the National Parks Trust in 2008. The Sandy Cay Development Program represented the culmination of IRF’s four decades of resource assessment, capacity building, and planning guidance on behalf of park and protected area development in the Caribbean.
The second major BVI program during the Foundation’s final years was a long-delayed initiative to provide environmental profiles for the multiple islands of the British Virgin Islands archipelago. Directed by Judith Towle, the BVI project extended and completed the environmental profiling work carried out by the Foundation from 1987-1993. At that time, profiles were prepared by IRF for two other UK overseas territories — Anguilla and Montserrat — and now it was the BVI’s turn. IRF’s objective was not only to provide a current-state description and assessment of the BVI environment, but also to substantially expand the environmental information base for the territory and to make that information easily accessible. Five major publications were prepared, with a stand-alone profile for each of the major islands (Jost Van Dyke, Virgin Gorda, Anegada, and Tortola) and a fifth profile highlighting the natural history of 17 of Tortola’s sister islands. In all, the BVI environmental profile series comprised well over one thousand pages of text and data, and all are now available online as PDF documents.
Nevertheless, by 2015 — with the death of founder Edward Towle in 2006, the relocation of IRF principals from the Caribbean to the continental United States, and a downsizing in funding for broader-based, geographically diverse programs in the region — it was increasingly clear that the role of Island Resources Foundation in the wider Caribbean was changing. At the time of its establishment in the early 1970s, IRF was one of the very few institutions addressing environmental change in the Caribbean; 43 years later, it was one of many.
In 2014, the Foundation’s board of trustees began to explore options for the Foundation’s future. It was understood that Island Resources Foundation had made important contributions — one need only identify the number of times that the words “unique,” “initial,” “first of its kind,” “groundbreaking” and “early leadership” have been used in this narrative to understand how the Foundation has stood at the forefront of environmental research, capacity-building, policy innovation, and island-centric initiatives. Furthermore, those institutions and individuals associated with the Foundation over the decades have enjoyed a richness of opportunity and experience.
Nonetheless, the board came to the conclusion that the Foundation’s contributions had run their course, and it was time for those associated with IRF to bequeath the future to a new generation of environmental scientists and advocates. To this end, Island Resources Foundation ceased its operations in June 2016 and closed its offices in St. Thomas, Tortola, and Washington, DC.
As I end this narrative, I would like to cite a line oft-quoted by my late husband, Dr. Edward Towle (which in turn was a paraphrasing of a quotation from the eighteenth-century English poet, Alexander Pope).
In everything respect the genius of the place.
To this pronouncement, Island Resources Foundation has remained true … always respecting the genius of small islands, their environments, their people and their fragile beauty. | 2019-04-18T22:28:30Z | http://www.irf.org/irf-history/ |
The impacts of fluctuations in the money stock run like a thread through the economic history of the United States, Milton Friedman and Anna J. Schwartz explain in "A Monetary History of the United States (1867-1960)." This book takes in monetary developments during the Civil War that set the stage for the post-Civil War period.
Monetary factors played a major role in the economy's cyclical movements, "and conversely, non-monetary developments frequently had major influences on monetary developments; yet even together," there is much in business cycle history that they acknowledge is not covered in the book.
the monetary stock changes have often had a demonstrably "independent origin" excluding the possibility that they were the result of changes in economic activity.
This weakness appears most dramatically in the book's discussion of the Great Depression. This would be just a minor weakness in this otherwise masterful book - if not for the tendency of many of those who follow Milton Friedman's views to also overlook the limitations of monetary manipulation - and if not for the dramatic assertion by the authors in the book's conclusion that a more aggressive monetary policy response to the Great Depression by the Federal Reserve System "would have cut short the spread of the crisis, would have prevented cumulation of bank failures, and would have made possible, as it did in 1908, economic recovery after a few months." See, "Friedman & Schwartz, Monetary History of U.S.," Part II, "Roaring Twenties Boom - Great Depression Bust (1921-1933)," at sections E) "Great Depression Bust (1929-1933)" and F) "The Power and Limitations of Monetary Policy," and Friedman & Schwartz, Monetary History of U.S.," Part III, "The Age of Chronic Inflation (1933-1960)," at section H) "Conclusion: The Impacts of Fluctuations of the Money Stock."
The larger deposits get in relation to reserves retained by the banks and in relation to the currency in the hands of the public, the more bank system money is being created.
The amount added to the money stock by bank deposits depends both on the willingness of the public to use the banking system, and the amount of deposits bankers are willing and able to lend to the public over and above retained reserves.
Money that can be used as liquid reserves for bank deposits is considered "high-powered" money, since the fractional reserve banking system serves to increase the total stock of money. In 1867, the public held about $1.20 in deposits for each $1 in currency. This rose quickly to $2 by 1873, reflecting the rapid rise of the commercial banking system. It stayed about at that level until 1880, rose -with numerous spikes and troughs - to $12 in 1929, and then fell sharply during the Great Depression - recovering just to $6 in deposits for each $1 in currency in 1960.
A bank deposit available to the depositor on demand is money to the depositor as well as money to the borrower from the bank. The larger deposits get in relation to reserves retained by the banks and in relation to the currency in the hands of the public, the more bank system money is being created.
Price statistics leave much to be desired during this period, especially for consumer or general price levels. The authors make use of indexes based on calculated - or "implied" - prices, and so refer to "implicit" prices rather than consumer or general prices. They rely heavily on wholesale prices, since these are more available.
A graph of various measures of currency and "money" in circulation shows a steadily accelerating expansion accompanying the growth of the economy and the nation, with sharp increases between 1879 and 1882 after the successful resumption of the gold standard and during both World Wars of the 20th century. Money - but not currency - had significant surges in 1868 to 1873 with the resumption of normal banking after the Civil War, during the New Deal years 1933 to 1937, and during the 1950s.
Currency in the hands of the public shows only a few years of actual decline - mainly in 1875 and 1876 in preparation for return to the gold standard and during the depression years 1877, 1894, 1921 to 1922, and 1933. The graph of broader money measurements of money indicate declines from 1875 to 1878, 1893, 1907, 1921, and 1930 to 1933.
From 1867 to 1960, currency expanded 50 fold, and currency plus commercial bank deposits 243 fold. Mutual savings deposits had expanded 127 fold. Prices rose during this period on average just under 1% per year. However, prices declined significantly during the last three decades of the 19th century, so the rate of price inflation did accelerate significantly through the first six decades of the 20th century - especially from 1940 to 1960. Output per capita during this 93 year period increased almost 2% per year.
Expressed as a fraction of income, there was an increase of almost 1% per year in money balances held by the public. Money balances equaled less than 3 months income in 1869 and more than 7 months income in 1960. However, this trend experienced many sharp ups and downs - examined more at length in the body of the book.
The U.S. did not stiff its creditors to help pay for the vast expenses of the Civil War.
The financial aftermath of the Civil War dominated monetary and financial history until the beginning of 1879 when specie payments were resumed - at the prewar parity. It was a struggle for the U.S. economy and its people to maintain sufficient monetary restraint to drag prices back down to a point where the "greenback" dollar would be "as good as gold." The U.S. did not stiff its creditors to help pay for the vast expenses of the Civil War.
Responding to the declining prices, politics were influenced by "greenbackism" and "Free Silver" movements that didn't end until the defeat of William Jennings Bryon in the 1896 presidential election.
Even prior to 1879, gold was still important for foreign transactions, since Great Britain and other important European nations were on a gold standard. Gold could be purchased with dollars, but its dollar price was free to fluctuate - upwards during the war and then downwards back to parity by 1879.
The controversy over the place of silver in the monetary system dominated the last two decades of the 19th century. As more nations went on the gold standard, demand for gold increased - exceeding even the rapidly increasing supplies. Silver prices declined sharply after the Civil War, of course, but continued a slow decline even after resumption of the gold standard in 1879. The value of gold was rising relative to the the value of other goods and services. Further development of financial techniques that supported "a larger superstructure of money on a given base of gold," didn't totally offset this tendency.
Responding to the declining prices, politics were influenced by "greenbackism" and "Free Silver" movements that didn't end until the defeat of William Jennings Bryon in the 1896 presidential election. (Prices had declined throughout the first half of the 19th century as well.) Substantial new sources of gold in Alaska and South Africa and technological advances in gold mining substantially increased the production of gold and doomed Bryan's political hopes. World prices responded by beginning to rise from the beginning of the 20th century despite vast increases in economic output.
The nation's banking structure was subject to periodic difficulties and panics during this period. 1873, 1884, 1890, 1893 and 1907 saw banking crises involving widespread fears, runs on banks, and bankruptcies. In 1893 and 1907, most banks suspended payments on deposits, causing money measures to decline while currency rose as the public withdrew deposits during the panic.
Even excluding WW-I, the Federal Reserve System failed to increase monetary stability.
The Federal Reserve Act of 1913 was the ultimate response. It was designed to bring effective regulation at least for Federal Reserve System member banks. The international gold standard weakened during WW-I, giving the new Federal Reserve System (the "System") both greater freedom of action and increased responsibility. The Treasury had previously exercised a limited central banking role. The U.S. economy grew massively during this period, reducing the relative importance of foreign trade and the impact of foreign influences on the economy.
The System, however, failed to increase monetary stability. Even excluding WW-I, monetary fluctuations increased.
WW-I was financed in part by a rapid rise in the stock of money which was not stopped until early in 1920. This stoppage was "the first major deliberate and independent act of monetary policy taken by the System" and drew severe criticism as the economy tumbled into a depression.
A "fiduciary standard" for paper money unsupported by gold and freely floating against gold and other currencies - dependent thus entirely on the credit of the issuer, the U.S. government - existed from the Civil War until 1879. Gold money and "greenback" paper money existed together and fluctuated against each other.
The total money stock consisted of gold, gold certificates, U.S. notes - popularly called "greenbacks" - fractional silver currency, other U.S. currency, national bank notes and subsidiary coinage and deposits in commercial banks and mutual savings and postal savings banks. After 1914, it also included Federal Reserve notes.
"High-powered money" is the type of money that can be used as liquid reserves to support the bank deposits that add to the total "stock of money." Between 1867 and 1879, it consisted principally of gold, greenbacks, and national bank notes. National bank notes were issued by the Treasury for banks upon deposit with the Treasury of eligible government securities as security for the notes.
With the end of the Civil War, the expansion of paper money ceased, prices declined, and the vigorous economic expansion that would vault the U.S. into the 20th century as an economic powerhouse commenced. This "coincidence cast serious doubts on the validity of the now widely held view that secular price deflation and rapid economic growth are incompatible."
Rapid economic growth with declining prices was experienced in the U.S. during the first half of the 19th century, also. For that matter, price fluctuations on English commodity exchanges fluctuated within a non-inflationary band for 350 years from 1600 to 1930 while England enjoyed the economic growth and expanding power of its industrial revolution.
By 1867, nearly 75% of the total money stock was of Civil War origin - types of money that had not previously existed. These were primarily national bank notes and U.S. "greenback" notes and other U.S. currency.
National bank notes grew rapidly to nearly $300 million by 1866. Growth continued slowly thereafter to $340 million by 1874, and these notes remained an important part of the monetary system until 1935. They were backed by requirements for 111% security in the form of government bonds bearing the security privilege. They thus were actually indirect obligations of the federal government. In the event of bank failure, the bonds would be forfeited to the Treasury to be sold to redeem the bank money, and the Treasury had a first lien on the bank's assets if more was needed.
Thus, the national bank notes circulated at parity with other currency as an equivalent part of the money system. This had not been the case prior to the Civil War and represented a significant accomplishment for the pertinent Civil War and post-Civil War legislation. The last wrinkles were ironed out of the system by monetary legislation in 1874.
By controlling the issuance of bonds bearing the security privilege, the government could control the maximum amount of national bank note money - but the national bank notes didn't approach their maximum until the 1920s. They rose slowly from only 20% of their limit to 28% by 1900, and surged to 80% during WW-I. Before WW-I, the issuance of national bank notes was apparently not profitable enough to be more widely employed, but the authors concede that they could not determine why. There were also capital stock requirements, but these didn't came into play after 1905 because the eligible bond limitation was a more restrictive requirement.
Greenbacks exceeded $350 million by 1867 - fluctuated at levels below $400 million until 1878 reflecting political controversy over their role in the 1870s price decline, and were then fixed permanently at $347 million through 1960.
Other U.S. currency included some legal tender notes, government demand notes, and some other government obligations that were not legal tender. Amounting to almost $240 million in 1865, the legal tender notes were quickly redeemed after the Civil War and were retired by 1872.
The two moneys - greenbacks and gold or British sterling - fluctuated freely, and were thus able to coexist without one driving out the other.
Gold coin and gold certificates were used primarily for foreign exchange transactions. The gold "dollar" was worth over $2 at the end of the Civil War - but declined rapidly to about $1.383 in June, 1867 and to about $1.10 in the 1870 to 1875 period. They thereafter declined towards parity by 1879.
Domestically, customs duties were payable in gold, and the Treasury paid almost all the principal and interest on its debts in gold. The credit of the U.S. was thus jealously guarded throughout the Civil War period. Some private debts also required payments in gold. The West Coast remained on a gold basis, with greenbacks quoted at a discount, whereas prices were quoted in greenbacks on the East Coast with gold valued at a premium.
The two moneys - greenbacks and gold or British sterling - fluctuated freely, and were thus able to coexist without one driving out the other. With floating exchange rates, the greenback price of gold was in effect the greenback price of sterling, since Britain was on a gold standard throughout this period. The completion of the transatlantic cable in 1866 substantially reduced the difficulty of coordinating European and U.S. money markets, materially reducing the burdens of the fluctuating exchange rate.
Thus, total money stock figures for this period are meaningless unless adjusted for the fluctuating premium for gold - approximately 38.3% at midyear, 1867. Even so, gold money being independent of official or bank issuance, cannot be exactly calculated, but the authors provide estimates based on the banking statistics available.
Money stock fluctuation in the 12 years before 1879 was comparatively modest. The money stock actually declined in 5 of the calendar years and ended up only 17% higher for the whole period.
Initiation of monetary movements typically precede the corresponding economic movements by some months. However, these monetary movements are often not turns but just a slowing or acceleration of the rates of growth.
Monetary restraint was required for the effort to make the greenback "as good as gold." Not until the sharp decline during the initial years of the Great Depression do we find so many years of money stock decline in any dozen year period. Indeed, including the 5 years 1929 to 1933, there were only 13 single years of decline in the 81 years up to 1960. Because of variations in statistical evaluation and availability, these calculations are not always based on calendar years.
Most of the 1870s decline in the money stock occurred during the 1873-1879 depression - considered one of the longest and apparently most severe on record. During many economic contractions - such as 1869-1870 - money growth slowed but there was no actual contraction of the money stock. Initiation of monetary movements typically precede the corresponding economic movements by some months. However, these monetary movements are often not turns but just a slowing or acceleration of the rates of growth. The authors note that the absolute troughs in business and money stock levels in 1879 just about coincided.
"We shall find these phenomena of acceleration of the money stock preceding a cyclical trough and deceleration preceding a cyclical peak, both by sizable intervals, repeated time and again in subsequent experience. We shall find also in subsequent deep depressions that the absolute trough in the money stock often coincided with the cyclical trough as, for example, it did in 1933."
Fluctuations in wholesale prices tracked these monetary movements. Wholesale prices declined significantly from 1867 to 1879, interrupted only by the cyclical expansion 1870 to 1872 when money stock was also rising. The average decline from 1865 to 1879 was an unprecedented 6½% per year as greenbacks rose back to par with gold. In terms of gold, prices were practically stable.
Velocity is a relatively stable magnitude, the authors assert.
The severity of the 1873 to 1879 depression may well be significantly overstated due to the weaknesses in the statistical data for that period.
There are severe problems with the price statistics available for this period, the authors warn. Farm produce and raw materials markets provided readily available prices, but many other price levels were uncertain or are unavailable. With respect to farm produce and raw materials, technological improvements - especially in transportation - were probably the cause of a substantial relative decline in their prices during the period. The general price decline is estimated on the bases of particular scholarly analyses producing an "implicit price deflator" or "implicit prices." This implicit price decline was running at around 3.5% per year.
With money stock rising at just over 1% per year between 1867 and 1879 while prices were declining, either the velocity of money was declining or output - and the work done by each dollar - was increasing. "As a matter of economics, there can be little doubt that it reflects primarily a rise in output." Velocity is a relatively stable magnitude, the authors assert.
Velocity became much less stable in several countries after 1964, during the period of inflation caused by Keynesian policy.
Despite a mild recession trough in 1867 and a deep one in 1879, the authors estimate output increased about 3.6% per year during this period for an impressive increase of about 54%. A substantial increase in population of more than 30% accounts for more than half of this increase in output. The latter part of the 1870s experienced a worldwide depression, sending a wave of immigrants into the U.S. despite U.S. economic difficulties.
However, even with the cyclical downturns and the population increase, output per capita was surely rising. The authors' estimate is 1.3% per year. The severity of the 1873 to 1879 depression may well be significantly overstated due to the weaknesses in the statistical data for that period.
Indeed, the vast expansions of the railroads, railroad ton mileage, mining output, and western settlement, and a 50% increase in the number of farms and an increase in land values even as agricultural prices declined, all affirm the great increase in productivity and output. Despite the 1879 depression trough, manufacturing employment was 33% higher than in 1869. Exports of finished products were nearly 2½ times greater in terms of gold values.
"In the greenback episode, a deflation of 50 percent took place over the course of the decade and a half after 1865. Not only did it not produce stagnation; on the contrary, it was accompanied and produced by a rapid rate of rise in real income."
The available statistics make it appear that an extraordinary period of net national product increase and real per capita income increase corresponded with a period of apparent severe depression and price decline. The authors explore in some depth the relative unreliability of output and monetary statistics for this period and the various estimates of net national product.
"Whichever estimate of net national product one accepts, the major conclusion is the same: an unusually rapid rise in output converted an unusually slow rate of rise in the stock of money into a rapid decline in prices. We have dwelt on this result and sought to buttress it by a variety of evidence, because it runs directly counter both to qualitative comment on the period and to some of the most strongly held current views of economists about the relation between changes in prices and in economic activity. Contrast, for example, this result with the widely accepted interpretation of British experience in the 1920s, when Britain resumed specie payments at prewar parity. The prewar parity, it was said, overvalued the pound by some 10 percent or so at the price level that prevailed in 1925 at the time of resumption -- prices by then having fallen about 50 percent from the postwar peak --; hence, the successful return to gold at the prewar parity required a further 10 percent deflation of domestic prices; the attempt to achieve such further deflation produced, instead, stagnation and widespread unemployment, from which Britain was unable to recover until it finally devalued the pound in 1931. On this interpretation, the chain of influence ran from the attempted deflation to the economic stagnation.
"In the greenback episode, a deflation of 50 percent took place over the course of the decade and a half after 1865. Not only did it not produce stagnation; on the contrary, it was accompanied and produced by a rapid rate of rise in real income. The chain of influence ran from expansion of output to price decline. - - - After 1873, the stock of money rose less rapidly and then fell, while population continued to rise, so money wage rates did fall; and this was connected with the severe contraction beginning in 1873. But even so, wages apparently fell fast enough to avoid continued severe unemployment or industrial stagnation."
The difference with England in the 1920s was that debt levels were higher and labor market flexibility much lower than in the U.S. in the 1870s. Government activities constituted a much larger burden on the English economy. The U.S. economy during the 1870s was simply much more flexible, which made post-Civil War adjustments much easier.
Nevertheless, while many thrived, there were many losers. Businesses closed, workers lost jobs and nominal wages declined. Although real wages increased along with net national product, social problems were created and political attention turned to the lack of growth in the greenback money supply.
Greenback agitation grew after the banking panic of 1873. Greenback inflation lost by the narrowest of political margins in 1878, after which it declined - to be replaced by agitation for a bimetallic silver and gold monetary system.
The determinants of the money stock under both fiduciary - or "fiat" - and specie standards, are briefly set forth by the authors. They explain how a slow decline in greenbacks and other currency was translated by the banking system into a modest rate of increase in the money stock until that, too, began to decline during the 1875 to 1878 depression years. Changes in deposit-to-reserve ratios and deposit to currency-in-the-hands-of-the-public ratios explain these movements. The greenback agitation failed to more than marginally impact greenback circulation, leaving the banking determinants as the most influential factors after 1867.
A reduction in national bank reserve requirements in 1874 was the one government action that contributed most to money stock growth. The rise of greenback circulation from 1870 to 1874, and its decline thereafter through 1878 did reinforce money stock movements.
Events impacted the banking determinants. The rapid spread of commercial banking induced deposit growth - which was slowed by the bank panic of 1873 and reversed by the numerous bank failures in the 1876 to 1878 period. Deposit-reserve ratios rose as the system matured and accepted greater risk levels - declined sharply during the panic of 1873 as surviving banks increased liquid reserves - and rose to new heights in 1874 when reserve requirements were lowered.
Deposit-reserve ratios for non-national banks were higher than for national banks. Only 6 states imposed any reserve requirements, and only 3 of those were as high as the federal requirements. Bank suspensions were concentrated in the non-national banks, inducing greater caution and need for liquid reserves among the survivors - and sending deposits fleeing to the greater apparent safety of the national banks. The desire for greater safety and for greater liquidity led to reductions in the deposit-reserve ratio during the banking problems of 1876 to 1878.
The authors illustrate the massive benefits bestowed upon the nation by its carefully maintained good credit. They analyze the movements of gold prices and interest rates during and in the 15 years after the Civil War.
Investor confidence restrained the rise in the greenback price of gold and - just as important - kept long term interest rates at reasonable levels - thus massively facilitating the nation's ability to finance the war.
As gold prices rose against the greenback during the war, the markets kept discounting a return to parity after the war rather than further devaluation of the greenback. This investor confidence restrained the rise in the greenback price of gold and - just as important - kept long term interest rates at reasonable levels - thus massively facilitating the nation's ability to finance the war.
"It seems likely that - - - the rise in the greenback price of gold produced speculative capital inflows, which helped to finance a deficit in the balance of trade and which explain why the depreciation in the exchange value of the dollar, over and beyond that to be expected from purchasing-power parity, was so mild -- given the drastic change in the North's international trade position. Such capital inflows would also have constituted a demand for U.S. securities, which explains why interest rates were so low despite the rise in commodity prices and the extensive government borrowing."
Speculative money was parked in long term U.S. and private - mainly railroad - bonds, whose yields were thus lowest precisely when gold prices were highest and speculative interest in a greenback recovery would be greatest. Short term call money and commercial paper were not convenient parking places for such speculative money, and their yields rose as might be expected from the concurrent inflation and heavy government borrowing.
Payments in gold for gold bonds were maintained - apparently much to the surprise of the market. While confidence that the greenback would eventually return to parity was high, such was not the case for gold bonds. The yield on the 6% 1881 bond exceeded 16% at one time during the war. The gold bonds were discounted in line with the discount for greenbacks - so market speculators made substantial profits as gold payments were maintained. Towards the end of the war, yields declined sharply, with further declines after 1869 when the government committed itself to continue payments in gold.
As the war turned in the Union's favor in the middle of 1863, capital inflows - especially from Dutch and German investors - substantially increased even as the greenback devaluation reached its worst levels. In England, the government and commercial interests had generally favored the South, but as Generals Grant, Sherman and Sheridan won major victories in late 1864, capital inflows from English investors increased also.
"If this analysis is correct, the depreciation of the exchange rate manifested in the rise in the greenback price of gold contributed to resolving the North's balance of payment difficulties in two very different ways: by affecting the 'real' terms of trade and so fostering exports and discouraging imports; by stimulating a speculative inflow of capital, which limited the depreciation, holding it to only some 20 percent in excess of that required to compensate for internal price level changes, and kept the terms of trade from turning even more strongly against the North."
The authors note that something similar occurred during the early stages of the German inflation after WW-I - but the inflation continued and speculators lost heavily for their misplaced faith in the Weimar government.
With the end of the war, capital inflows continued - presumably now seeking permanent investment in the expanding U.S. economy. This supported the greenback at higher valuations than warranted by recovering trade levels. Gold declined from 20% above calculations of purchasing power parity to 10% below.
"This appreciation of some 30 percent in the exchange value of the greenback dollar is a measure of the pressure that the wartime disturbance of trade relations had imposed on the balance of payments."
After 1873, gold fluctuated upwards, back to levels approximating calculations of purchasing power parity. As U.S. bond yields declined, foreign investors abandoned them in favor of the higher yielding railroad bonds - until railroad bond defaults led to the banking failures and panic of 1873.
This was a period of remarkably disciplined government budgetary and monetary policies which played a major role in supporting confidence in the monetary system.
As resumption of specie payments at pre-Civil War parity neared, domestic demand for gold increased both on the part of the public and the Treasury. The greenback price of gold rose above purchasing power parity levels, exports were drastically curtailed, and production of gold increased 50% between 1875 and 1878.
Resumption became possible at pre-Civil War parity - at $4.86 per pound sterling - because the price decline retraced all the approximately 150% price inflation of the Civil War. This substantial decline in prices occurred despite a mild rise in money stock. The rapid growth in output - in real income - was the primary reason. A flexible and dynamic economy simply grew its way out of its wartime difficulties (exactly as the British economy had done repeatedly after each of the wars of the 150 year period ending after the Napoleonic wars).
On the whole, this was a period of remarkably disciplined government budgetary and monetary policies which played a major role in supporting confidence in the monetary system. The authors analyze these policies at some length. Resumption of specie payments did not take place until the gold premium had fallen to approximately 10% of its peak level - thus assuring the success of resumption.
Under the gold standard, the major channel of influence on the stock of money runs from "fixed rates of exchange with other currencies through the balance of payments to the money stock, thence to the level of internal prices that is consistent with those exchange rates."
"The forces making for economic growth over the course of several business cycles are largely independent of the secular trend in prices."
Domestic policies can produce sizable short term deviations, however, because the links are loose with plenty of play between them. Policies that impact trade or capital flows or levels of money balances held by the public can influence the system, but they ultimately have to be reversed or they will undermine the gold standard.
There were rapid increases in world output in the period from 1879 to 1897. Prices nevertheless declined in terms of gold into 1897 but rose thereafter. The period after 1897 was influenced by major increases in gold supplies flowing from new mines in Alaska, South Africa and Colorado, and advances in gold mining and refining. The price decline during the former period occurred "despite the rapid expansion of commercial banking and other devices for erecting an ever larger stock of money on a given gold base."
After resumption of gold payments, growth in the U.S. money stock accelerated, averaging about 6% per year between 1879 and 1897 and 7½% from 1897 to 1914. However, the rate of growth was uneven. It surged at over 19% from resumption in 1879 to 1881, and was essentially flat from 1892 to 1897. There were severe business contractions from 1882 to 1885, from early 1893 to the middle of 1894, and from 1895 to the middle of 1897. The period thereafter until 1914 saw only one sharp but short recession in 1907.
The period ending in 1897 was notable for unrest, protest movements, and periods of financial uncertainty. The period after 1897 experienced relative political stability and public confidence in the economic future. Yet, both periods enjoyed massive rates of capital expansion and economic growth at well over 3% per year. Per capita, net national income increased at about 1.5% per year.
There were declines in money income during the four sharpest business contractions, but recovery was quick after each of them. Prices, too, seemed to return to trend after each depression. The evidence, the authors note, reinforces the tentative conclusion "that the forces making for economic growth over the course of several business cycles are largely independent of the secular trend in prices."
The sharp increase in the money stock between 1879 and 1882 was accompanied by a sharp increase in prices which was more than reversed by 1886. Prices were roughly constant from there to 1891 and resumed their decline into 1897 with a brief rise from 1892 into 1893.
Resumption in 1879 was followed by an economic boom as monetary confidence was reinforced by a massive two year surge in crude foodstuff exports responding to major crop failures in other countries. Gold stocks more than doubled in these two years from $210 million to $439 million. This caused an expansion of the money stock that pushed up prices approximately 10% at a time when British prices remained constant. British gold reserves declined 40%, inducing an increase in its Bank rate in steps from 2½% to 6% - which reversed the gold flow.
The two year surge in U.S. crop exports and its ending resulted in an apparent seesaw reaction in international gold flows. The gold flows kept exchange rates steady and mitigated price fluctuations. However, the expansion of the U.S. money stock did lead to price increases in the U.S. and put downwards pressure on prices in the nations that paid in part in gold for imported food. The relative price swings ultimately brought the systems back to trade equilibrium and ended the need for large gold flows. "It would be hard to find a much neater example in history of the classical gold-standard mechanism in action," the authors note.
With the return of normal crops abroad, food exports declined back to normal - and the boom ended. Worse, Britain had not fully adjusted to its previous monetary contraction and experienced a 12% price decline between 1882 and 1885. To regain approximate purchasing power parity with Britain, U.S. prices had to declined even further. As gold flowed back to Britain, the growth of the U.S. money stock slowed sharply from 16% per year to 3%. Real output growth decline from 7% to 1%. The discipline of the balance of payments was the primary determinant of the adjustment process, but that process required at least some economic recession in the U.S.
There were, of course, other factors that contributed to the recession. There was another round of railroad bond defaults and a flight of foreign capital. The result was a financial panic in New York in 1884 with modest spillover elsewhere in the country. Confidence in the maintenance of the gold standard declined as the Treasury purchased silver at the expense of gold under the Bland-Allison Act of 1878.
Capital flight and gold exports were again evident from 1888 to 1891 due to another period of doubts about maintenance of the gold standard. However, prices declined only modestly - about 2% - because British prices were rising.
British investment interest shifted to Argentina in 1890, causing a loss of gold in the U.S. that put pressure on reserves in New York. Security prices fell and banks and brokerage houses failed and there was a panic towards the end of 1891. There were financial problems in England, too, and the start of a depression period. However, in New York, it was all over quickly, and stability was restored.
The Sherman Silver Purchase Act of 1890 doubled silver purchases, which were paid for with Treasury notes redeemable in either gold or silver at the discretion of the Treasury.
The financial troubles of the 1890s were marked by the waxing and waning of confidence in the maintenance of the gold standard - corresponding swings in capital flows - and several corresponding cyclical economic swings. World prices in terms of gold fell sharply between 1891 and 1897 and the Free Silver movement reached its political peak - further undermining confidence in the gold standard in the U.S. Changes in tariffs and increased spending for pensions, rivers and harbors threatened to reverse the budget surplus.
Money stock growth slowed or reversed during these economic contractions and adverse capital movements put pressure on prices which declined through most of the period. The authors speculate on how much the vacillations in confidence in the gold standard contributed to these events, and note some similarities with British experience immediately after WW-II.
The initial loss of confidence in the gold standard was largely offset by crop failures abroad that coincided with a record U.S. harvest and a 150% increase in food exports in the year ending June 30, 1892. This reversed a sharp outflow of gold and induced a short period of rising prices. It ended a mild recession which had been accompanied by the usual surge in bank and brokerage failures.
However, world prices continued falling as the purchasing power of gold increased, and capital inflows remained suppressed. Gold exports resumed at the end of 1892. Again, confidence in the gold backing for Treasury notes was undermined.
A variety of currency substitutes were created - factory pay checks, miscellaneous notes and certificates issued by corporations and individuals. The situation was short lived - ending when deposit withdrawal restrictions were lifted that September. The panic of 1893 is explained by the authors as running from the loss of confidence in the bimetallic gold/silver standard, causing an external drain as gold and capital flowed out. This in turn caused a decline in the money stock and declines in securities prices and general price levels. Soon, banks, brokerages and mercantile establishments were failing. However, bank failures were predominantly in the West and South due to an internal drain caused by defaults on loans that undermined confidence in bank solvency.
Efforts to repeal the Sherman Silver Purchase Act began in the summer of 1893 and brought the external drain to an end. Repeal came on November 1, 1893.
As the public sought currency, public currency holdings rose 6% in the year ending June, 1893, while deposits fell 9½%. The total money stock fell about 6% - the first substantial decline since 1875-1878. A second round of deposit withdrawals hit the South and West in July, 1893, draining reserves from New York. When the Erie Railroad went into receivership, the stock market tanked and bank failures hit the East as well.
Banks then imposed restrictions on cash withdrawals, bringing the string of bank failures to a close. While reserves proved inadequate in certain banks, total reserves in the banking system were adequate. But currency was suddenly rendered scarce by the restrictions on deposit withdrawals. Currency thus began selling at a premium to bank deposits. A variety of currency substitutes were created - factory pay checks, miscellaneous notes and certificates issued by corporations and individuals. The situation was short lived - ending when deposit withdrawal restrictions were lifted that September.
World prices continued to fall and the British price decline lasted into 1896 as gold continued to appreciate. Except for a modest 18 month rebound from the middle of 1894, the deflation in the U.S. dragged on to 1897. Treasury gold reserves fell below $45 million at the beginning of 1895. Speculative pressure on the dollar persisted as did political agitation. Various measures kept the money stock fairly constant and assured holders of dollar balances that the Treasury was determined to maintain the gold standard.
The Democratic Party nomination of William Jennings Bryan as its presidential candidate in 1896 accelerated the flight of capital and gold. A syndicate of big city banks put its credit on the line to support the dollar. It adopted a commitment to provide foreign currencies directly to purchasers without intermediate gold transactions. This brought capital flight to an end.
Seasonal agricultural exports resulted in gold inflows beginning towards the end of August that brought an end to the dollar crisis. Some internal accumulation of gold and foreign currencies continued until the Republicans won the election, and the crisis was over. The increase in world gold supplies was already making itself felt.
The perfervid politics of the greenback and Free Silver advocates during the last quarter of the 19th century are summarized by the authors. These forces succeeded in gaining passage of limited silver purchase and bimetal standard legislation in 1878 and 1890, with repeal coming at the end of 1893. The desired unlimited coinage of silver was never enacted. Limited silver coinage and issuance of silver certificates undermined confidence in U.S. currency, but was insufficient to stem the rapid decline in silver prices as copious supplies rolled in from the West and other sources around the world.
Good agricultural prices helped McKinley beat Bryan in 1896 in a heated, nasty campaign. The silver cause thereafter faded as new sources of gold came into production, and the purchasing power of gold declined. With the Gold Standard Act of 1900, the issue was settled in favor of the gold standard.
When nations adopt the gold standard, they (1) accept the disciplined economic policies required to maintain the gold standard and (2) in essence offer a guarantee of continuance of such prudent economic policy. The reward is increased public confidence and economic efficiency.
When political leaders violate this trust with imprudent undisciplined economic policies, it is they - not the gold standard - that has failed. The sooner they drop the charade and abandon the gold standard the better. The economy will need maximum flexibility to make the adverse adjustments needed as smooth as possible in response to those policies. Gaining and maintaining public confidence and economic efficiency under flexible exchange rates will require at least the same disciplined economic policies needed for maintenance of the gold standard.
The determinants of fluctuations in the money stock under the resumed gold standard up to 1897 are analyzed by the authors.
The initial 2½ year surge in the money stock to 1881 accounted for nearly half the total growth to 1897. Just over 80% was accounted for by growth in "high-powered money" - primarily coinage and currency backed by gold and silver and national bank notes. High-powered money growth accounted for 55% of money stock growth from 1881 to 1892, but high-powered money declined until the middle of 1897, after which it sharply recovered.
The deposit-to-currency-held-by-the-public ratio of the banking system vacillated as might be expected with fluctuations in public confidence in the banking system. It grew strongly with the successful resumption of the gold standard, thereafter flattening out or contracting during business contractions and dropping sharply during the panic of 1893. If monthly data were available, the authors note that the ratio would undoubtedly show sharp declines corresponding to the banking crises of 1884 and 1890. Growth after the 1893 crisis made up for much of the decline in high-powered money in that period and - along with growth in the deposit-to-reserve ratio after 1893 - kept the money stock essentially flat to 1897.
The deposit-reserve ratio of the banking system played only a minor role during this period due to little change in official reserve requirements or in the reserve levels thought prudent by bankers over and above requirements.
The ratio rose after resumption until 1883 with little overall change thereafter. Fluctuations corresponded with business cycles. Surviving banks visibly increased reserves during contractions and acted more aggressively during prosperous times. Typically, runs on banks drained reserves, which would thereafter be more than rebuilt before returning to normal levels after business conditions improved.
Nine more states imposed reserve requirements on their non-national banks for a total of 15. State requirements were mostly lower than national requirements. Their deposit-reserve ratios were in practice about twice as high as those of the national banks due to their lower reserve requirements. Their reserves accounted for about 1/3 of the total in the banking system.
Deposits tended to flow in favor of non-national banks during prosperous times, and towards the greater safety of the national banks during contractions. This had some impact on the total deposit-reserve ratio due to the higher average levels of reserves held by the national banks. Thus, the deposit-reserve ratio somewhat reinforced cyclical impacts on the money stock.
High-powered money levels were determined mainly by gold flows and silver purchases. However, there was considerable play in the system that permitted responses to policy decisions. There was no legal category of fiduciary currency during this period, so only the modest fiduciary element in minor coins existed.
Prior to resumption in 1879, the Treasury accumulated gold reserves, but when this was released after successful resumption, the levels of high-powered money stock soared - reinforced by the gold inflows from a 2 year surge in agricultural exports.
The Treasury also played a monetary role. Treasury cash increased due to revenue surplus and borrowing - both of which subtracted from high-powered money in circulation. Revenue deficits and debt repayments had the opposite effect.
Treasury cash levels changed little from 1879 to 1897, but shorter term fluctuations had some impact on gold flows. The authors find it impossible to determine whether on balance these minor fluctuations in Treasury cash were stabilizing or destabilizing because the impacts on the deposit ratios are unknowable.
The minimal fluctuations of Treasury cash were clearly the result of Treasury policy. Budget surplus was the norm during this period - mainly from customs receipts that by law had to be kept in the Treasury. Treasury cash reached a peak in one year equal to 10% of high-powered money. The Treasury redeemed debt and prepaid interest, and allowed revenues from other sources to accumulate as deposits in banks to prevent the Treasury surplus from forcing a contraction of the money stock. However, the redemption of government debt reduced the amount and raised the price of government bonds available as security for the issuance of national bank notes - which declined from $350 million in 1882 to $160 million in 1891.
The Treasury used its cash for open market operations at times of financial strain - playing a central banking role - but this activity was erratic and unpredictable.
The cyclical turmoil in the banking system was proof of the nation's lack of a real central bank and adequate banking regulation. Since the banking system is a part of the monetary system, these are clearly appropriate and necessary government functions in a capitalist system.
Treasury cash declined from 1888 to 1893 due to debt redemptions in excess of surplus revenues. This was a period of substantial growth of the money stock coinciding with larger gold exports or smaller gold imports than would otherwise have occurred. When silver monetization expanded in 1890, gold exports soared as capital fled the country. The Treasury borrowed extensively from 1893 to 1896 to restore its gold reserves, but this had the effect of contracting or preventing growth of the money stock and probably contributed to the economic problems of that period.
Silver legislation was intended to force inflation of the money supply (and to keep silver mines profitable).
The authors conclude that it was the bimetallist standard - rather than either a silver or gold standard - that was the primary source of instability, since the relative values of the two metals inevitably diverged on world commodity markets.
The silver component of high-powered money grew steadily, equaling about $500 million or about 1/3 of the total in circulation by 1893. However, the authors point out, instead of causing an expansion of the money stock as intended, it retarded growth prior to 1891 and played a major role in the lack of growth thereafter. It undermined confidence in the maintenance of the gold standard, adversely impacting capital and gold inflows and outflows. Even after repeal of the silver legislation in 1893, Treasury borrowing to acquire sufficient gold to restore confidence played a major role in monetary stock stagnation until 1897.
The authors conclude that it was the bimetallist standard - rather than either a silver or gold standard - that was the primary source of instability, since the relative values of the two metals inevitably diverged on world commodity markets. They speculate that a U.S. silver standard operating alone might have sufficiently altered the precious metal markets to avoid the rapid decline in the gold price of silver during this period.
The surge in gold supplies resulted in price inflation after 1897.
Prices rose between about 40% or 50% from 1897 to 1914 - depending on the index used. This brought prices back to about the levels reached in 1882 at the peak of the post-resumption expansion. This rate of price inflation is unprecedented for the U.S. in peacetime (until the Keynesian monetary policy inflation of the three decades after 1960). Inflation in the 1850s after the California gold discoveries had been sharper but lasted for less than half the length of time.
The inflation was worldwide, of course, because of the spread of the gold standard. British prices rose about 26%. Worldwide gold stocks more than doubled. They had risen only 40% during the preceding 24 years - and that was a period of rapidly rising demand for gold as many nations joined Britain on the gold standard.
The gold stock in the U.S. more than tripled between 1897 and 1914 - to almost $1.9 billion. This equaled almost 25% of the world total - up from about 14% in 1897.
With the exception of the 1907 panic year, the money stock grew steadily throughout this period. The increase in high-powered money was concentrated in gold and national bank notes as silver components grew very little. Continued increases in the bank deposit ratios contributed to the money stock increase which averaged about 7½% per year. Price inflation absorbed about 2% per year, and about 3% was absorbed by growth in real output. Money balances relative to real income continued to rise as during the previous period, continuing a decline in monetary "velocity," albeit at a slower pace. See, G) "The Velocity of Money" of Friedman & Schwartz, "Monetary History of U.S.(1867-1960)," Part III, "The Age of Chronic Inflation (1933-1960)."
Expansion was fastest in the first five years - to June, 1902 - as the system rebounded from the stagnant 1892-1897 period. It thus repeated the pattern of the period after resumption two decades earlier. Wholesale prices rose 32% - about 2/3 of the total price rise for the entire period to 1914. Real net national product rose more than 6% per year between 1896 and 1902 - 4½% per year per capita.
This expansion brought net national product growth back to trend - just as the post-resumption surge did two decades earlier. Like the earlier surge, it was reinforced by a 2 year surge in agricultural exports in 1897 and 1898 due to a 20% reduction in the European wheat crop. The sharp 1897 Dingle Tariff increase inhibited imports - the two factors leading to a massive increase in the nation's favorable balance of trade.
As agricultural exports returned to normal, there was a stock market panic and mild recession in 1899, with the usual banking and financial failures that mildly impacted financial trends. The reduction in imports reduced customs receipts, adversely impacting the federal budget (and increasing pressure for the enactment of an income tax amendment).
There was, however, a surge in capital outflows during the period to 1902 that the authors find most puzzling. The differing rates of price increases, immigration and immigrant remittances, tourist expenditures, the Spanish-American War and the Boer War, interest rate differentials and stock market movements all played a role, but don't seem to explain the scope of the outflows. The capital outflow doesn't seem to correlate with the differential changes in prices between the U.S. and Britain. However, the statistics for this period still leave much to be desired and that may account for much of the reported scope of the outflows.
Treasury intervention became more regular in this period, with actions to relieve monetary stringency at the end of 1899 and in 1901 - first to counter panic after a stock market collapse and later after President McKinley was shot. These interventions did not prevent mild cyclical contractions in 1899 to 1900 and for almost 2 years between 1902 and 1904, but the contractions might have been much worse. The Treasury intervened twice during the 1907 panic year.
Between 1903 and 1907, the economic expansion was both vigorous and protracted - the best business expansion since 1879 to 1882. Wholesale prices rose about 10% for the period as a whole, continuing to rise faster than British prices until 1905 - a differential now once again reflected in capital flows. In the 2 years to the first quarter of 1907, $143 million in gold flowed into the U.S. There had been little net movement from 1899 to 1904. The seesaw impact of gold flows produced monetary stringency in London in 1906.
Except for a flat period around 1903, net national product rose vigorously between 1897 and 1907 - about 30% in constant prices. Coal and iron and railroad traffic showed sharp increases. Immigrants flooded in - over 1 million per year for the last three years of the period.
The money stock rose about 45% in the 5 years to June, 1907 - a little over 7% per year - while prices rose about 2% per year. The authors speculate that 5% annual growth in the money stock would have been consistent with stable prices. The velocity of money continued to slow - but much less than in previous similar periods of prosperity.
In 1905, Panama Canal and other expenditures reduced Treasury balances and halted Treasury interventions, but they were resumed in 1906. In the absence of Treasury intervention, periods of monetary stringency saw short term call money rates soar - as high as 40% in September, 1906. Routine Treasury intervention now involved withdrawing funds in the slow summer economic periods and adding them for the spring and fall business upturns. In those days before air conditioning and before the relative shrinkage of the vast agricultural component, the economy had a definite seasonal rhythm.
In England, gold was flowing out. The discount rate was increased in steps from 3½% to 6% between September 13 and October 19, 1906. In Germany, the Reichsbank took similar steps. The seesaw impact then drew gold back out of the U.S.
By March, 1907, New York stock markets were in severe decline. Union Pacific - a leading stock used widely as collateral in finance bill transactions - dropped 30% in less than 2 weeks.
The stock market collapse "followed the separate attempts of the Morgan and Harriman interests to corner Northern Pacific stock, and the discovery on May 9 that more shares had been sold than were in existence." The panic involved loan and trust company banks in New York that had expanded exuberantly to take advantage of looser supervision and lower reserve requirements than other types of commercial banks.
By May, the economy had turned down. The decline was short but sharp. Net national product declined 11% in 13 months. It became especially sharp after the October banking panic, during which - as in 1893 - banks restricted payments on deposits. This lasted through January, 1908. Commercial failures soared.
Monthly banking data became available in this period, and the panic stimulated vast improvements in reporting and regulation at all levels. The money stock showed a mild 2½% decline from the previous peak until the panic, and a rapid one totaling 5% thereafter until February, 1908. Only 1920 to 1921, 1929 to 1933, and 1937 to 1938 showed similar severe rates of monetary contraction.
The initial decline reflected in part gold exports and a 1% decline in high-powered money. The deposit- reserves bank ratio fell as banks increased their high-powered money reserves about 5% despite the decline in the total of high-powered money. At this point, however, deposits declined only slowly, so the deposit- currency ratio rose slightly.
"These changes in the deposit ratios have the appearance of a fairly passive response to a business decline, with banks strengthening their reserve positions and holders of money showing no distrust of banks."
By September, 1907, however, the public and the banks were both striving for liquidity - an impossible goal. Even though high-powered money rose 10% in 5 months due to gold imports and Treasury intervention equaling $64 million by the end of October, the money stock declined 5% - similar to the 1893 experience. The banks were unable to increase their currency holdings in the panic month of October, but thereafter increased reserves by 8%, substantially reducing both deposit ratios - enough to produce a 14% reduction in the money supply but for the 10% rise in high-powered money.
The authors tell how the stock market decline - especially in copper stocks - undermined speculators, leading to widespread distrust of the loan and trust company banks that were financing their speculation. The troubled banks withdrew reserves they had deposited with the N.Y. clearing house banks. Soon, country banks began withdrawing their reserve deposits, joined by withdrawals by individual and business depositors as the panic became general. The stock market responded by collapsing.
Unease affecting country banks continued, however, and was met with $256 million in clearing house certificates issued on the basis of high grade ordinary assets. In the 1893 panic, $69 million of these certificates had been issued.
New York banks had to restrict the convertibility of deposits into currency. Country banks soon followed their example. After announcement of the restrictions, $31 million in currency drained out of the clearing house banks, but the drain was only $8 million in the following 3 weeks. Seasonal inflows then ended the currency shortage, and after October, currency began piling up in the banking system.
J.P. Morgan stepped in to organize a $25 million intervention pool which, along with a similar pool of $10 million, ended the panic. Unease affecting country banks continued, however, and was met with $256 million in clearing house certificates issued on the basis of high grade ordinary assets. In the 1893 panic, $69 million of these certificates had been issued.
As the country banks sought to withdraw their reserves from the clearing house banks, they were given these certificates instead. It was agreed that these certificates would be accepted for clearing house use, so they circulated as currency. They were supplemented by over $250 million in small clearing house checks and certificates, cashiers checks and manufacturer pay checks. All together, these substitutes made up for about half of the estimated decline in the money stock.
Again as in 1893, there was a premium for currency over deposits - as high as 4% - since deposits were no longer as good for transaction purposes. This led to an increase in gold imports, since gold in New York was now worth more than the standard $4.86 per pound sterling. The exchange rate rose as high as $4.88¾. $100 million in gold flowed in in November and December, 1907, during the period of bank withdrawal restrictions. High-powered money increased $239 million during the final quarter of 1907.
Restrictions began to be lifted early in December and were completely lifted by the beginning of January, 1908. Confidence in the banking system wasn't fully restored until February.
Many suspended banks were able to reopen later, and only unsound banks failed. Indeed, the total number of banks was probably higher at the end of 1907 than at the beginning. The measures taken to deal with the panic given the tools available seem to have been effective.
The dispute over whether more aggressive intervention by the big N.Y. clearing house banks could have prevented the panic is reviewed by the authors. They note the vast increase in the deposit to currency ratio since 1879 - from $1 in currency for each $2 in deposits to $6 dollars in deposits in 1907. The deposit- reserve ratio had doubled.
The Treasury interventions may have had the perverse effect of inducing banks to reduce their reserve requirements in reliance on Treasury assistance when needed. Their increased vulnerability to runs undoubtedly increased the urgency of their efforts to increase their reserves as the contraction unfolded. This added to the panic.
In the event, bank failure rates spiked upwards, but stayed well below 1% of the total of commercial banks. The loss to depositors spiked upwards even more, however. Many suspended banks were able to reopen later, and only unsound banks failed. Indeed, the total number of banks was probably higher at the end of 1907 than at the beginning. The measures taken to deal with the panic given the tools available seem to have been effective.
The 1908 Aldrich-Vreeland Act was a temporary effort to avoid such panics while more thoroughgoing reforms were studied. It relied on bank issuance of emergency currency based on usual bank assets with penalty provisions designed to force retirement of the emergency currency after the emergency.
"The prompt satisfaction of the public's demand for additional currency cut the [panic] process short at the outset."
This mechanism was employed just once - at the start of WW-I - and successfully met the bank runs at that time. $400 million in clearing house loan certificates were issued, with $364 million the most in circulation at any one time - equal to almost a quarter of circulating currency and 1/8 of high-powered money. There was no panic and no need to restrict payments on deposits.
The period 1908 to 1914 was characterized by generally sluggish growth with just two brief periods of buoyant expansion. Money stock, money income and prices rebounded sharply from 1907 to 1910, with prices rising faster in the U.S. than in Britain. The differential in price levels sent gold back to Britain, slowing the growth of high-powered money. The sharp rebound in the bank deposit ratios supported growth of the money stock. However, when that came to an end, money stock growth slowed and the general business upsurge came to an end.
Prices declined fairly sharply in 1910 and 1911, bringing them generally back into line with those of Britain - once again providing a good example of the international gold standard at work - both its strengths and its limitations.
The gold standard brings buoyant prices back into line by an outflow of gold that slows the growth of the money supply or contracts the money supply, thus slowing the growth or contracting economic activity - a limitation due to the rigidity of the system. However, the discipline of the system forces prudent policies upon economic policy makers and monetary authorities and, as soon as those policies are forthcoming, the maintenance of the gold standard helps in the rapid restoration of public confidence and normal business conditions - the strength of the system. The paper money and bank deposit money is, after all, "as good as gold" - far more convenient - and deposit money may even earn an interest return.
If prudence isn't - or cannot be - restored - typically during time of serious conflict or determined pursuit of inflationary and, lately, Keynesian policies - then the gold standard must fail. Flexible exchange rates become preferable so that the inevitable adverse adjustments can come smoothly rather than through a series of catastrophic devaluations. The inflation of fiat money may make devaluation necessary - but devaluation by itself is NEVER a remedy for such inflation. See, "Understanding Inflation."
Yet, political leaders obviously love inflation. As the authors point out, it is an implicit tax on the money stock - the easiest tax to impose and collect. The benefits are short term and the costs are long term. It forces people to provide valuable goods and services to the government in return for pieces of paper or digital entries in accounts. It also provides some relief from excessive borrowing and the smothering rigidities of excessive regulation. These are the real reasons why politicians love as much inflation as they can get away with - and why economists who seek positions in government service strive to find excuses for the practice.
The rapidity with which the public regains confidence in the banking system when effective actions are taken to deal with panics is demonstrated by the speed with which the deposit-currency ratio recovers back to trend.
Money stock and deposit ratios continued to increase, but at rates considerably slower than those from 1897 to 1907. The deposit- reserves ratio, however, didn't get back to its 1906 high during this period as banks reacted to the 1907 panic by maintaining more prudent levels of reserves.
The ratio of deposits to the public's currency holdings went right back up to trend and kept rising thereafter. This persistently rising trend demonstrates the public's growing faith - other than in panic periods - in the banking system. The rapidity with which the public regains confidence in the banking system when effective actions are taken to deal with panics is demonstrated by the speed with which the deposit-currency ratio recovers back to trend. This characteristic of the two bank deposit ratios can also be seen after other money crises - in 1884, 1890 to 1893, and 1933.
Gold coins and gold certificates accounted for 87% of the increase in high-powered money. Gold and national bank notes accounted for most of the growth in currency held by the public. The Gold Standard Act of 1900 encouraged monetary growth by liberalizing the requirements for issuing national bank notes and reducing to $25,000 the minimum capital for a national bank. The Comptroller of the Currency was now required to accept eligible securities at par rather than at 90% when issuing national bank notes to the banks.
The authors emphasize the impact of the increase in the bank deposit ratios on the growth of the money stock. Without those increases, the U.S. would have had to drain the world of over 60% of the worldwide increase in gold stocks to achieve equivalent monetary expansion. The banking system was indeed a vital part of the nation's monetary system.
The Treasury continued its seasonal interventions, and increasingly relied for that purpose on expansion or contraction of the deposits that it kept at commercial banks, which overall it built up substantially.
The authors compare two periods of relatively steady growth - each a decade long. One, from 1882 to 1892, occurred when prices were declining 2% per year, the other, from 1903 to 1913, occurred when prices were rising 2% per year. The periods show roughly similar growth in real output, and both begin just after a vigorous rebound from a monetary stringency episode.
"If these figures can be trusted, the rate of price change over several cycles had little or no connection with the associated rate of growth of output. May it be that the rate of change in prices has a stronger effect on what contemporaries regard as the rate of growth to be rather than on what the actual rate of growth is?"
The authors also speculate on long-swing theories of the business cycle.
The Federal Reserve Act of 1913 came into operation at the beginning of WW-I - a world it was not designed to deal with. Suddenly, major nations abandoned or loosened their ties to the gold standard as they sought flexibility to respond to the financial disruptions of wartime conditions.
The new Federal Reserve System (the "System") consisted of Federal Reserve Banks and a Federal Reserve Board (the "Board"), with policy making authority nebulously shared between the Board and the Federal Reserve Banks (the "Banks") - especially the influential N.Y. Federal Reserve Bank (the "N.Y. Fed."). The System was designed to assure sufficient "elasticity of currency" to avoid 1907 style panics. It was also (at last) intended to assure adequate supervision of its member banks, and to be able to rediscount eligible commercial paper to facilitate commerce. The System had an immediate impact on the money supply.
"Hitherto, high-powered money had consisted of gold, national bank notes, subsidiary silver and minor coin, and an assemblage of assorted relics of earlier monetary episodes -- greenbacks, silver dollars, silver certificates, and Treasury notes of 1890. Henceforth, Federal Reserve notes were available for use as hand-to-hand currency or as vault cash for banks; and deposits to the credit of banks on the books of Federal Reserve Banks were available to satisfy legal reserve requirements and were equivalent, from the point of view of the commercial banking system as a whole, to Federal Reserve notes or other currency as a means of meeting demands of depositors for cash."
"The Federal Reserve System therefore began operations with no effective legislative criterion for determining the total stock of money. The discretionary judgment of a group of men was inevitably substituted for the quasi-automatic discipline of the gold standard."
The Federal Reserve Act imposed a double requirement for issuance of Federal Reserve notes. There was a gold requirement and an eligible paper requirement. The latter involved the rediscount of "eligible" high grade commercial paper, the discounting of foreign trade acceptances, and open market purchases of government securities, bills of exchange and bankers acceptances. In 1917, member bank 15-day notes secured by paper eligible for discount or by government securities became eligible for the issuance of Federal Reserve notes. By 1920, 69% of high-powered money was Federal Reserve notes and member bank deposits in Federal Reserve Banks.
The amount of Federal Reserve money was supposed to be limited by a gold standard and by commercial rediscounting needs. The latter permitted flexible expansion of Federal Reserve money during times of monetary stringency. It permitted member banks to quickly increase their holdings of Federal Reserve money by rediscounting their eligible commercial paper - "notes, drafts, and bills of exchange arising out of actual commercial transactions" - with a Federal Reserve Bank. This was designed to increase liquidity during crisis periods to meet demands for cash withdrawals by depositors.
The authors note the result of this legislation.
"The Federal Reserve System therefore began operations with no effective legislative criterion for determining the total stock of money. The discretionary judgment of a group of men was inevitably substituted for the quasi-automatic discipline of the gold standard. Those men were not even guided by a legislative mandate of intent -- unless the purpose of the act described as 'to furnish an elastic currency, to afford means of rediscounting commercial paper' or the instruction to set discount rates 'with a view of accommodating commerce and business' can be so considered -- and were hardly aware of the enlarged powers and widened responsibilities the change in circumstances had thrust upon them. Little wonder, perhaps, that the subsequent years saw so much backing and filling, so much confusion about purpose and power, and so erratic an exercise of power."
The Federal Reserve Act imposed a 40% gold reserve requirement for issuance of Federal Reserve notes, but only a 35% gold reserve requirement for Federal Reserve Bank deposits.
Federal Reserve officials as yet did not understand the full impact on the money supply of many of their activities. The authors mention the increase in their holdings of bankers acceptances in the second half of 1928 while they were trying to restrict rediscounts - the former expanding the money stock while the latter contracted it. The authors also point out that member bank deposits in Federal Reserve Banks act like high-powered money just like Federal Reserve notes - yet had lower reserve requirements.
After 1917, member bank reserves were required to be kept as deposits at Federal Reserve Banks. Of course, banks still had to keep a certain amount of vault cash for transactions purposes - and this served to increase the actual amounts of total reserves. In 1959 and 1960, vault cash was increasingly accepted as official reserves until it was entirely accepted at the end of 1960.
This requirement for officially recognized reserves had the initial effect of enabling the Federal Reserve to meet the Federal Reserve Act's 40% gold reserve requirement for issuance of Federal Reserve notes. Federal Reserve Bank deposits had a lesser 35% gold reserve requirement. The requirement for eligible paper collateral for Federal Reserve notes was reduced in 1917 from 100% to 60%.
This centralization of legally required reserves had the effect of substantially lowering total reserve requirements. The deposit-reserves ratio rose significantly after 1918, as did the stock of money consistent with any given amount of high-powered money. The two deposit ratios indicate the extent that the banking system is expanding the total money stock on a given basis of high-powered money.
Reserve requirements were viewed at first as primarily a device for enhancing the convertibility of bank deposits into currency. Only much later was it understood as a tool for controlling the stock of money. Not until the 1920s was it recognized that the powers of the System could be used to undermine the disciplines of the gold standard by monetary manipulation to offset gold flows.
Both national and non-national banks could be member banks in the System and could thus be subject to Federal Reserve regulation. National banks were subject also to regulation by the Comptroller of the Currency, while non-national banks were subject also to regulation by state banking authorities.
Gold flooded into the U.S. as the Allies purchased their wartime needs. Both during the period of U.S. neutrality and during its period as a belligerent there were extraordinary levels of monetary and price inflation.
The money stock roughly doubled from September, 1915 to June, 1920. Prices almost doubled between the last quarter of 1915 and May, 1920. Real net national product rose sharply to 1919 - with a pause from 1916 to 1917 - before declining in 1919 and 1920. This wartime inflation is similar to experience in the Civil War and WW-II.
Differences between peacetime and wartime financial flows - under the gold standard and when that standard is no longer maintained - are explained by the authors. Capital flows in favor of the U.S. - both gold and sale back to the U.S. of U.S. securities - amounted to about $5.3 billion. After the U.S. became a belligerent, it extended credits to its allies. The U.S. went from being a net debtor - short and long term - of $3.7 billion, to being a net creditor in the same amount by the end of 1919.
However, the dollar exchange rates of the British pound and the French franc - after suffering an initial sharp fall at the beginning of the war - recovered almost all their losses by the time of the Armistice in November, 1918. After all, the U.S., too, was suffering monetary and price inflation.
During the almost three years as a neutral, the U.S. money stock rose 46%. Growth in high-powered money accounted for 90% of money stock growth, and gold accounted for 87% of the growth in high-powered money. "This was straightforward gold inflation," the authors note.
From the entry of the U.S. into the war until May, 1920 - during the period of its participation as a "belligerent" - the money stock rose another 49% - but the monetary gold stock was almost flat. Instead, there was a substantial rise in Federal Reserve Bank claims on the public and on the member banks against which Federal Reserve notes were issued. These claims included bills discounted, bills bought and other Federal Reserve credit other than government securities.
High-powered money was expanding primarily on the basis of Federal Reserve credit - primarily the discounting of bills secured by rapidly expanding supplies of government war obligations. At this time, the authors note, the Federal Reserve System was in "an asymmetrical position."
"It had the power to create high-powered money and to put it in the hands of the public or the banks by rediscounting paper or by purchasing bonds or other financial assets. It could therefore exert an expansionary influence on the money stock. At the same time, it had no effective power to contract the money stock. Under the circumstances, the most it could have done was to avoid creating any additional high-powered money. But even this required that the Federal Reserve Banks simply accumulate in their vaults the gold and other lawful money transferred to them as reserves by member banks, acquire no earning assets, and finance their expenditures solely by assessments on member banks. They were understandably reluctant to follow fully so ascetic a policy. They wanted to acquire portfolios to become independent of assessments on member banks."
At the time, the System still had not accumulated any substantial portfolio of government securities. It thus could not have withdrawn money from the system by open market sales of government securities even if it knew that that was possible - which it apparently as yet did not know.
Even though discount rates were lowered from around 6% at the end of 1914 to between 3% and 4% in September, 1916, the Fed could not attract much eligible paper - accounting for only 21% of the increase in high-powered money during the period of neutrality. By the end of that period, high-powered money consisted of 41% gold and gold certificates - up from 37% at the beginning of the period. High-powered money consisted also of 7% Federal Reserve notes and 14% Federal Reserve deposits, and 37% Treasury currency.
A variety of wartime transactions require increased flows of currency - some having to do with tax avoidance. However, currency is actually the cheapest form of government debt, so the reduction in the bank deposit- currency ratio served to help finance the war.
During the belligerency period - which for purposes of this monetary history lasted from March, 1917, until 2 years after the November, 1918, Armistice - the Treasury advanced $9.5 billion to its allies. Federal government deficits totaled $23 billion - nearly 75% of total expenditures. This was financed by borrowing and issuance of new money - both Federal Reserve notes and Federal Reserve deposits - which rose respectively to 38% and 21% of high-powered money by the time of the Armistice. Gold declined during this time of belligerency to 14% of high-powered money.
Both high-powered money and the total money stock continued rapid growth during the period of belligerency until 1920, albeit at a lower percentage rate than during the period of neutrality. The authors note that the rate of inflation was actually greatest towards the end of the period of belligerency - after the Armistice - from May 1919 to May 1920 - something that occurred after WW-II, also. This was after the end of deficit spending, but not after the end of monetary expansion.
Rising taxes and interest rates, bond drives and price control measures all played some role in price inflation fluctuations during the war, overall serving as restraints. (Price controls never constrain inflation, they just hide it and actually worsen the loss of purchasing power and the ultimate rate of inflation. See, Understanding Inflation.) A great increase in the currency in circulation relative to bank deposits - resulting in a sharp decline in the deposit- currency ratio - also served as a restraining factor on money and price inflation.
A variety of wartime transactions require increased flows of currency - some having to do with tax avoidance. However, currency is actually the cheapest form of government debt, so the reduction in the bank deposit-currency ratio served to help finance the war. A similar increase in currency in circulation occurred in WW-II.
From March 1917 through May 1919 - the federal government spent $32 billion and added $2 billion to Treasury cash balances. 25% was covered by explicit taxes plus non-tax receipts, 70% was borrowed, and 5% was financed by money creation - constituting "an implicit tax on money balances levied through the rise in prices." The total money stock increased $6.4 billion - 25% of it from an increase in high-powered money and 75% of it created by the banking system.
This increase in the money stock primarily matched an increase in government securities held by the banks and their customers - and so helped to finance the war.
The deposit to the public's currency holdings ratio reversed its course soon after the Armistice, rising sharply as the public no longer had need for so much currency.
Commodity speculation and accumulation of inventories marked the subsequent boom and would play a significant role in the 1920 to 1921 depression.
With the lifting of the WW-I embargo on gold payments in June, 1919, $300 million in gold quickly flowed out. Nevertheless, Federal Reserve credit outstanding soared. Discount rates of 3½% to 4% were considerably below market rates, permitting banks to profit handsomely from rediscounting their commercial paper at the Fed.
"Throughout the period, member banks could be regarded as operating entirely on borrowed reserves: from September 1918 through July 1921, the outstanding volume of bills discounted by Federal Reserve Banks exceeded member bank reserve balances."
The Federal Reserve Board was at a loss as to what to do. The Board hesitated as the money stock expanded vigorously and inflation roared on. An increase in the discount rate would have posed difficulties for Treasury funding operations. Rising interest costs always discomfort various powerful financial interests that lobbied hard against it. Moral suasion - "jawboning" in later terminology - was tried and - as always - failed miserably.
The Treasury was adamantly against rate increases that might increase the difficulty and expense of its funding efforts. Some feared the public might panic if rising interest rates hit 4¾% and depressed the price of their Liberty Bonds to 90. There were legal doubts over the Federal Reserve Board's independence from the Treasury.
With gold flowing out rapidly and Federal Reserve credit expanding exuberantly, the reserve position in the System plunged precipitously - perilously close to the 40% minimum. Reserves hit 42.7% in January, 1920, and 40.6% in March. Reserves in excess of requirements plunged from $569 million in June, 1919 to $234 million in January, 1920 and to $131 million in March, 1920. A discount rate increase to 4½% was advocated. The British discount rate was already 5½%.
The Treasury decided it had no further funding needs in December, 1919. It was flush with cash and it withdrew its opposition. Discount rates were quickly raised to 4¼% and to 4¾%. Then, as reserves plunged, a second increase all the way up to 6% came in the first two months of 1920 - "the sharpest single rise in the entire history of the System, before or since." Fear of being forced off the gold standard - of having to suspend gold payments - was a strong factor in the close vote to raise the discount rate by a whopping 1¼%. Now with access to the personal papers of some of the Board members, the authors recount the feverish deliberations.
A further discount rate hike to 7% came in June, 1920 - the highest rate imposed by the System before 1960. This actually coincided with the peak in wholesale prices - but collapse soon followed. Despite the collapse of prices and business, it wasn't until May, 1921, that the N.Y. Federal Reserve Bank lowered its rate to 6½%. Four more reductions brought the discount rate down to 4½% in November. By then, gold reserves to notes liabilities and to deposits had begun to climb up from the minimum requirement levels.
"The discount policy was apparently dominated by concerns over the Reserve System's own reserve position." There was also strong sentiment within the Board that money should remain tight until wages as well as prices were forced to give up much of their gains from the WW-I inflation. The authors note that the Board had the authority to suspend the reserve requirements in 30 day increments if necessary.
Although declining prices and contracting economic conditions brought gold flowing in as trade and payments balances reacted positively, a 1/6 reduction in lending by member banks and the corresponding sharp decrease in member bank borrowing from the Federal Reserve System resulted in an 11% drop in high-powered money from September, 1920 to the cyclical trough in July, 1921. The total fall was 17%.
Member banks had already borrowed more than their reserve balances. They at first reacted slowly to the contraction - but then sharply restricted further lending. Money was shifted from demand deposits - a major constituent of bank money - to time deposits. Money stock growth slowed - and then plunged 9% - one of the largest declines since the Civil War.
While bank failures rose significantly, there was no widespread runs on the banks. The post-war recovery of the ratio of deposits to currency-in-the-public's-hands slowed but the deposit-currency ratio recovery continued - helping to keep the decline in the total money stock to just 8%.
By June, 1921, wholesale prices had dropped to 56% of their May, 1920 level - 75% of the decline occurring in the 6 months after August, 1920. Net national product in current prices dropped 18%. The depression was short but sharp.
When the boom turned to bust, the Board received extensive criticism first for its tardy action - permitting the boom to get out of hand - and then for precipitating the sharp bust of 1920 to 1921. The authors agree with this criticism. The economy may already have begun contracting even before the rate hike took effect. Gold was already flowing into the U.S. - and the high discount rate accelerated the flow, causing worldwide economic distress. The Fed Governor was not reappointed in 1922 - introducing "an element of political instability" which inevitably impacted the operations of the Board.
Mild at first, the depression in the U.S. ultimately involved an unprecedented collapse in wholesale prices and a sharp drop in retail prices. Indeed, price levels would not recover to their 1919 highs until after WW-II. The rest of the 1920s - a period of prosperity - would be a period of slowly declining prices.
The U.S. was a substantial cause of the post WW-I disturbances - no longer a victim of external events. The authors concluded that some difficulties might have been unavoidable due to the dislocations of the Great War, but instead of acting as a stabilizing force, the new Federal Reserve Board clearly made matters worse.
The depression was worldwide. This was typical after a major war. The economic adjustments to peacetime production and absorption of wartime debts typically cause inflationary spurts followed by substantial reactions. After WW-II, however, the U.S. was in a massively strong financial position and suffered only a mild recession during the shift to peacetime production. But it did not avoid the inflationary surge.
The U.S. was suddenly a financial heavyweight after WW-I - with absolutely no experience in that role. The evidence from the gold and capital flows indicates that the U.S. was a substantial cause of the post WW-I disturbances - no longer a victim of external events. The authors concluded that some difficulties might have been unavoidable due to the dislocations of the Great War, but instead of acting as a stabilizing force, the new Federal Reserve Board clearly made matters worse.
"The contemporaneous gold reserve ratio was a simple easy guide; [the System goal of] economic stability, a complex, subtle will-o'-the-wisp."
The System was a destabilizing factor from its beginning, the authors conclude. Federal Reserve money and looser reserve requirements materially increased money stock growth and price inflation throughout the war - monetary expansion and price inflation would have ended sooner after the war but for System monetary expansion - and the 1920 to 1921 depression would certainly have been more mild but for Fed policy errors. Lack of experience was evident throughout this period.
"There was no strictly comparable American experience on which to base policy or judge the effect of actions designed to stimulate or retard monetary expansion. In particular, there was no evidence on the length of lag between action and effect. There was a natural, if regrettable, tendency to wait too long before stepping on the brake, as it were, then to step on the brake too hard, then, when that did not bring monetary expansion to a halt very shortly, to step on the brake again. The contemporaneous gold reserve ratio was a simple easy guide; [the System goal of] economic stability, a complex, subtle will-o'-the-wisp."
See, "Friedman & Schwartz, Monetary History of U.S.," Part II, "Roaring Twenties Boom - Great Depression Bust (1921-1933)," and Friedman & Schwartz, Monetary History of U.S.," Part III, "The Age of Chronic Inflation (1933-1960)." | 2019-04-25T12:40:47Z | http://www.futurecasts.com/Friedman,%20Monetary%20%20History%20of%20U.S.%20%28I%29.htm |
Case type: Application for review of Magistrate’s decision not to make a final family violence restraining order and application for stay of proceedings.
Facts: The applicant made an application for a family violence restraining order pursuant to s 24A of the Restraining Orders Act 1997 (WA) (‘Restraining Orders Act’) against her former partner (). The Court made an interim family violence restraining order (). The respondent objected to the interim order (). The next hearing was listed as a 'Restraining Order Final Order Directions Hearing'. The respondent did not attend at that hearing. The Magistrate did not make a final order, and adjourned the hearing (-).
The applicant applied for a review order under s 36 of the Magistrates Court Act 2004 (WA) (), to review the Magistrate’s decision not to make a final restraining order. The applicant also applied for a stay of the substantive hearing.
Issues: Whether the applications should be granted.
Decision and Reasoning: Tottle J granted the review order and the stay of proceedings.
Tottle J set out the principles governing judicial review under s 36of the Magistrates Court Act 2004 (WA) at -. His Honour set out the principles governing when a final order must be made under s 42 of the Restraining Orders Act at -. Tottle J held that it was irrelevant that the hearing was described as a 'Restraining Order Final Order Directions Hearing' even though no hearing of that nature is contemplated or provided for by the Restraining Orders Act (discussing Kickett v Starr WADC 52) (-). Tottle J was satisfied that the Magistrate made a jurisdictional error by not exercising the jurisdiction conferred on him by the Restraining Orders Act ().
Tottle J set out the principles governing when a stay ought to be granted at . Tottle J granted a stay of the proceedings on the grounds that the applicant’s medical conditions and stress would be exacerbated by having to face the respondent in a contested hearing (-). Tottle J noted that s 10B of the Restraining Orders Act requires courts to have regard to the possibility of re-traumatisation during the proceedings ().
Charges: Obstructing a police officer x 1.
Other information: [the appellant] has grabbed [the complainant] by the throat in Dec 2014 and has tried to strangle one of the two dogs in the past’ ().
Decision and Reasoning: Justice Tottle concluded that the officer’s ‘suspicion of a breach of the order by the appellant was reasonable. The narrative section of the incident report read in the context of the DVIR section of the report (that is the allegation of breach assessed against what had allegedly taken place in the past) provide a basis for a suspicion that the appellant had breached the order’ ().
Charges: Breach of violence restraining order (VRO) x 20.
Facts: The appellant and the victim were married for 14 years but were separated at the time of the offences (). A VRO was granted with the victim as the protected person (). The appellant was prohibited from contacting the respondent except to arrange for contact with his son (). The appellant breached the VRO over a period of 7 months by making a significant number of phone calls to the victim and sending text messages and letters beyond the bounds of the VRO (-). In some instances, the messages included threats to kill the victim and himself. The Magistrate imposed an aggregate sentence of 18 months’ imprisonment.
there was an error in recording the appellant's aggregate sentence as 18 months' imprisonment rather than 15 months' imprisonment ().
Error made out. Jenkins J held that the Magistrate failed to correctly apply s 9AA(5) of the Sentencing Act 1995 (WA) by failing to state the extent of reduction given to the pleas of guilty for each head sentence (-).
Not possible to decide because part of the proceedings in the Magistrates Court had not been recorded. Jenkins J did not take this fact into account in deciding the appeal (-).
Dismissed. It was clear that the Magistrate meant to impose an aggregate sentence of 18 months’ imprisonment (-).
While Jenkins J accepted that ground 2 was made out, the appeal was dismissed because the error did not result in a substantial miscarriage of justice ().
The long title of the Restraining Orders Act reflects Parliament's intention for the Act to provide for orders to 'restrain people from committing acts of family or domestic or personal violence by imposing restraints on their behaviour and activity'. In order for the Act to be effective, offenders must appreciate that if they breach a VRO they will receive a significant penalty. The community and the courts have [an] intolerance and abhorrence of violence and threatened violence in domestic and former domestic relationships. The penalties imposed for breaches of VROs must reflect that intolerance and abhorrence, in the hope that the penalties deter offenders and protect victims.
Charges: Breach of violence restraining order (‘VRO’) x 1.
Facts: There was a final VRO in place protecting the applicant’s partner. The applicant’s partner applied for a variation of that order. The applicant was not served with notice of the application to vary the VRO (). The Magistrate granted the application to vary the VRO even though the appellant was not present (). The appellant pleaded guilty to breaching the VRO ().
Issues: Whether the appellant’s conviction upon his own plea was a miscarriage of justice.
Decision and Reasoning: The appeal was allowed (). The variation to the restraining order was a nullity (, ). It was an essential condition of the jurisdiction to hear the application to vary the VRO under s 48(2) of the Restraining Orders Act 1997 (WA) that the Court be satisfied that the appellant was served with the summons (). Since the Court was not so satisfied, the VRO had no legal force. It was a miscarriage of justice for the appellant to be convicted of breaching the order ().
Case type: Application for leave to appeal against Magistrate’s decision not to grant final violence restraining order (FVO).
Facts: The appellant, BV, and the respondent, TP, were married but separated. BV obtained an interim FVO against TP in the Children’s Court. The FVO was to protect BV and TP’s three daughters, M, N and O (-). At the final order hearing, after BV had given her evidence in chief, the Magistrate interrogated TP’s counsel about the likely content of further evidence proposed to be given by the children. The Magistrate expressed a strong disinclination against exposing the children to cross-examination by the respondent’s counsel. The Magistrate summarily dismissed BV’s application for a final order VRO on the basis that even if their evidence was accepted, it would not be enough to justify an FVO being granted (-, ).
Issues: Whether the Magistrate erred in law by summarily dismissing the proceedings.
Decision and Reasoning: The appeal was dismissed. Kenneth Martin J held that the Magistrate was correct in expressing concern for the children’s welfare if they were cross-examined (). His Honour held that the Magistrate had the power to summarily dismiss the final order VRO application (-) and that the Magistrate’s discretionary exercise of power to dismiss the proceedings was justifiable (-).
His Honour discussed the Supreme Court’s appellate jurisdiction in the circumstances that the interim order was made in the Children’s Court at , - and -. His Honour discussed the principles applicable to children giving evidence in VRO proceedings at -.
Charge/s: Breach of violence restraining order.
Facts: The appellant pleaded guilty to breaching a violence restraining order in favour of his wife and was fined $500 with costs. The breach arose out of the appellant’s attendance at his wife’s home to retrieve some of his property. He claimed he had misunderstood the terms of the violence restraining order and that if he had known that the order did not permit him to attend the house, he would have attended the police station and asked officers to accompany him while he retrieved the property. The appellant had previously been diagnosed with bipolar disorder and had tendered medical records to the Magistrate.
Issue/s: Whether there was a miscarriage of justice because when the appellant pleaded guilty he was unaware he had an arguable defence of unsoundness of mind.
Decision and Reasoning: The appeal was upheld and a retrial was ordered. The appellant’s affidavit on appeal stated that he was suffering a relapse of his bipolar disorder when he pleaded guilty to the charge. A psychiatrist’s affidavit indicated that it was more likely than not that the appellant was, ‘in such a state of mental impairment so as to deprive him of the capacity to know that he ought not to assault someone or return to his house’ (see at ). However, at the time he pleaded guilty, he was not aware that his mental state was not normal. As such, the evidence indicates that he may have had an arguable insanity defence at the time of the guilty plea. Furthermore, when the appellant consulted with a solicitor, there was no discussion in relation to a possible insanity defence, even though the solicitor knew of the appellant’s history of mental illness. There was no available evidence at the time that the lawyer should have considered the availability of a mental impairment defence. Nevertheless, Beech J held that, ‘through no fault of his own, Mr Bacchelli had no practical opportunity to raise the possible defence of insanity, or the facts relevant to it, with his lawyer’ (see at ). The appellant had an arguable defence but had no way of knowing of that defence, such that his plea was fundamentally not an informed one. Beech J noted that this does not mean a plea will always be set aside in these circumstances but in this case, the nature of the appellant’s ignorance of the defence resulted in a miscarriage of justice.
Facts: The appellant pleaded guilty to two breaches of a violence restraining order. He breached the order by living with the protected person and by being within a hundred metres of the protected person (in the same house as her). At the same time, the appellant was also dealt with for an earlier breach alleging that he was within a hundred metres of the protected person (attending and remaining at the protected person’s address). This was a ‘third strike’ case in which the magistrate was required to impose a penalty that is or includes imprisonment. The magistrate imposed a term of imprisonment for six months for each offence. A sentence of six months or less may not be imposed (Sentencing Act 1999 (WA) s86). The day before the hearing of this appeal, the Magistrates Court recalled the sentence and imposed a sentence of 6 months and 1 day.
Issue/s: One of the issues was that the sentence contravened the Sentencing Act.
Decision and Reasoning: The appeal was allowed. If it was not for the error in imposing a sentence of six months, the decision of the magistrate to impose a sentence that included imprisonment would have been within the sound exercise of sentencing discretion. The appellant had breached a VRO repeatedly (See Pillage v Coyne WASCA 135 at -). The correction of the sentence to 6 months and 1 day was not made in compliance with s 37(2) of the Sentencing Act as the magistrate did not give the appellant the opportunity to be heard. The appellant fell to be resentenced.
Charge/s: Breach of restraining order.
Facts: The applicant was subject to a violence restraining order (VRO) in favour of his former partner which prevented him from approaching her and from being within a nominated distance of her premises. He attended her premises in breach of the order. He claimed that he and the protected person were ‘back in a relationship’. His had a history of breaching restraining orders in place against the same protected person. He was sentenced to 8 months’ imprisonment.
Whether it was reasonably open for the Magistrate to conclude that a sentence of immediate imprisonment was the only appropriate sentencing option.
In this case, there had been no threatening or intimidatory behaviour. While an adverse inference could be drawn from the apparent fact that the applicant was hiding when police arrived, the applicant’s actions cannot be seen as a ‘calculated and flagrant’ contempt of the VRO – ‘Ignorance about the strict workings of a VRO, in the face of periods of separation and reconciliation and then heavy alcohol consumption at the end of a long-term relationship, are a more viable explanation for his misconduct, in my view’ (see at ).
His Honour expressly stated that he was not meaning to convey that for some VRO breaches which include a ‘flagrant disregard’ for court orders, ‘a term of immediate imprisonment will not present as the only appropriate sentencing option’ (see at ). However, in this case the circumstances (including that the penalties imposed upon him for his prior breaches were only fines and the benign nature of the breach) meant that an escalation in punishment from these pecuniary penalties up to a term of 8 months’ imprisonment, was not within the discretion open to the Magistrate. (Note: this position would be altered if s 61A of the Restraining Orders Act 1997 (WA) applied, which provides for a requirement of imprisonment after 2 discrete offences within a 2-year period).
2. This argument was also upheld.
Charge/s: Breach of police order.
Facts: The appellant was at a caravan park with his wife and two-year-old child. The appellant and his wife were drinking heavily when a disagreement occurred and police attended. Police issued a 72-hour order under the Restraining Orders Act 1997 (WA) which prevented the appellant from communicating with his wife or approaching within 100 metres of her. The next day, police attended to check on the appellant’s wife and discovered the appellant hiding in the house. The appellant had a minor but relevant criminal history involving two breaches of prior police orders made in favour of his wife. He pleaded guilty, was granted bail and was placed on a ‘domestic violence behaviour change programme’ under the supervision of a Family Violence Court. He completed the majority of the program but was unable to complete it because he was remanded in custody after attending his wife’s home in breach of bail. A progress report about his participation in the program was provided to the Magistrate, which stated that he generally ‘reported as directed and engaged well’ but that he ‘had made no identifiable treatment gains during the programme and was not considered suitable for a further community based disposition’ (see at ). He was sentenced to seven months’ imprisonment.
Whether the Magistrate erred in sentencing the appellant to a term of imprisonment.
Whether the Magistrate erred in failing to suspend the term.
Whether the Magistrate erred in failing to backdate the sentence of imprisonment.
Decision and Reasoning: The appeal was upheld in respect of ground 3 – the Magistrate erred by not backdating the sentence to give credit for time already spent in custody.
The Court held that it was within the Magistrate’s discretion to refuse to suspend the sentence.
Given error was demonstrated by the failure to backdate the sentence, it was appropriate to resentence the appellant. In that regard, Justice Hall took into account some further steps that the appellant had taken towards rehabilitation, including drug and alcohol programs. Given these circumstances and the time already spent in custody, the prison sentence was set aside and the appellant was fined $1500.
Charge/s: Trespass, Breach of bail (numerous counts).
Facts: The appellant’s marriage with his wife (the complainant) ended. The complainant had purchased a new house and the appellant climbed the fence and walked around the property for some time. He had some property including vehicles at the house. The appellant then forced entry and was restrained by the complainant’s male friend who was at the home before police arrived. After being released on bail with conditions that he not contact or attempt to contact the complainant, he breached this bail by attempting to contact her via email 153 times. He also made 126 phone calls or text messages. These communications occurred while the appellant was living in New Zealand. The appellant and the complainant had shared business interests. The appellant also had an interest in the complainant’s home because part of the deposit for the home had been paid from a bank account in which the appellant had an interest. The prosecution accepted that many of the communications related to these business matters. A total effective sentence of 16 months’ imprisonment was imposed.
Issue/s: Whether the total effective sentence did not bear a proper relationship to the overall criminality.
Decision and Reasoning: The appeal was upheld. The appellant submitted that the sentence should have been suspended.
Furthermore, the evidence indicated that the conduct was out of character. The appellant had previous good character, a solid employment history, surrendered himself to police and fully cooperated. This indicated an acceptance of responsibility and remorse. He was at minimal risk of re-offending so specific deterrence was not significant. While general deterrence is important in sentencing breaches of bail and ‘Compliance is likely to be undermined if breaches are dealt with by derisory penalties’ (see at ), this did not mean that the term of imprisonment could not be suspended in this case. As such, the total effective sentence was suspended for 12 months.
Charge/s: Aggravated common assault, breach of a protective bail condition.
Facts: The appellant, a male Aboriginal man, was in a domestic and family relationship with the female victim. The appellant and the victim had been drinking alcohol with three friends. Their two children were also present. The appellant took exception to a comment made by the victim about his behaviour towards one of her female friends. He grabbed the victim by the T-shirt, causing scratches to the side of her neck. They continued shouting at each other. The appellant punched the victim in the face, causing bruising and swelling to her left eye. The victim moved away but was followed by the appellant and he delivered a further blow to the side of her head. The appellant stopped hitting the victim after their two children told him to stop. The appellant was arrested and entered into a bail undertaking with protective conditions. He breached those bail conditions by attending and remaining at the home of him and the victim. The appellant was sentenced to 15 months’ imprisonment for the aggravated assault and 2 months’ imprisonment for the breach of protective bail condition, served cumulatively.
Issue/s: One of the grounds of appeal was that the sentences imposed for the aggravated assault and breach of protective bail conditions were manifestly excessive.
‘The fact that the aggravated assault occurred in a domestic setting is a significant aggravating factor of the offence. An offence of this nature generally involves an abuse of the trust which one partner places in another, often where the victim is in a vulnerable position by reason of greater physical strength of the offender. The vulnerability of the victim is generally increased by the difficulty which she (it is usually a she) may have in extricating herself from the situation. As McLure P has noted, the readiness of many victims to return to, or remain in, a relationship with the perpetrator is a hallmark of domestic violence. Recognising that common feature, it remains important for a court sentencing an offender for that kind of offence to take account of the need to protect persons in that vulnerable position, so far as the courts can do so by the imposition of a sentence, bearing a proper relationship to the overall criminality of the offence, which has a deterrent effect and, in an appropriate case, removes the offender to a place where there is no opportunity to violently attack their partner’ (See ).
‘The facts of this case illustrate a tragic cycle of violence with which the courts are depressingly familiar. A person exposed to domestic violence in his early life goes on as an adult to perpetrate the violence to which he was exposed as a child, damaging members of his community in the same way he was damaged as a child. For that reason, the fact that the appellant's offence was committed in the presence of children was a significant aggravating factor’ (See ).
However, following an examination of cases, Mitchell J held that cases where a sentence of 15 months’ imprisonment had been imposed involved a significantly greater level of violence than committed by the appellant here. The sentence was manifestly excessive (See , -36]). The appellant was resentenced to an intensive supervision order.
Proceeding: Application to adduce certain expert evidence.
Facts: The accused and the deceased were both male. They lived together, but it was not a sexual relationship. The accused was the deceased's assistant and helped with the deceased's drug dealing activities. The accused admitted killing the deceased by shooting the deceased to the head while the deceased was sleeping. The main issue at trial was to be whether he acted in self-defence. The accused sought to call evidence of a psychologist regarding his state of mind. The psychologist was to give evidence, ‘that the accused was in a compromised mental state at the time as a result of being in an abusive relationship with the deceased. The accused is said to have felt powerless in relation to (the deceased), and to have thought that the only way out of the relationship was to kill (the deceased)’ (see at ). The State objected to the admission of this evidence on the basis that it was not a recognised psychological condition and that it was not analogous to cases falling within the ‘battered woman syndrome’ (BWS). The state further submitted that the matters to be the subject of the evidence from the psychologist were not outside the ordinary experience of jurors.
The accused described himself as a ‘lackey’, the deceased as ‘possessive’ and that the deceased would threaten violence and control his ‘movements, communications and finances’. The psychologist’s evidence was that the relationship was consistent with the learned helplessness associated with BWS. The psychologist also stated that the syndrome was not confined to females or sexual relationships, and that this relationship was of a sufficient duration to be consistent with the syndrome.
Issue/s: Whether the evidence of the psychologist should be admitted.
Decision and Reasoning: The application was refused. This did not preclude a claim to self-defence, but was relevant to the issue of whether the accused believed his actions were necessary. Hall J held that the psychologist’s evidence was opinion evidence and admissible only if it met the requirements of expert evidence (see at ). His Honour noted that BWS is widely accepted as an area of specialised knowledge, but that it is important to pay close attention to what is actually recognised as BWS. He referred to Osland v The Queen (1998) 197 CLR 316 where Kirby J stated that the syndrome should extend beyond females as victims. Hall J held that this relationship differed from a typical ‘battering’ relationship – it was not a long term marriage relationship and was not characterised by ‘recognisable cycles of tension, violence and reconciliation’ (see at ). While there were similarities in the ‘assertion of increasing control, emotional volatility and increasing feelings of helplessness’ (see at ), his Honour held that the differences between these circumstances and other BWS cases required that, ‘the application of the syndrome to a situation like this is accepted by the majority of experts in the field of psychology’ (see at ). There was no evidence of majority acceptance of experts. As such, the evidence was inadmissible. Evidence of the violent and controlling behaviour of the deceased could still be considered by the jury in order to assess whether the accused’s actions were necessary to prevent the deceased from harming him (see at ).
Facts: On 4 October 2013, the applicant was charged with assaulting his former de facto partner. He was released on bail. The bail undertaking included a condition that he was not to contact or attempt to contact the victim by any means. While on bail, the applicant committed a further assault on the victim causing her bodily harm. He was arrested and charged with that assault and with failing to comply with a protective bail condition. Bail could not be granted again unless the applicant showed there were exceptional reasons he should not be kept in custody. The applicant’s criminal history showed that he had two prior convictions for breach of protective bail conditions in 2012 and 2013. The applicant was also alleged to have breached protective bail conditions on another occasion but this had not been the subject of prosecution.
Issue/s: Whether there were exceptional reasons why the applicant should not be kept in custody.
Decision and Reasoning: The application for bail was refused. There were not exceptional reasons why the applicant should not have been kept in custody. The applicant had breached protective bail conditions on multiple occasions in the past. While the victim had a conviction for assaulting the applicant, this did not justify the applicant’s failure to comply with protective bail conditions (See -). Although the prosecution case against the applicant could not be said to be overwhelming, it could not be said to be particularly weak. ‘A less than overwhelming case does not provide exceptional reasons to grant bail. If the prosecution case was particularly weak one or there was a high probability of acquittal the position might be different: Bertolami v The State of Western Australia WASC 269’ (See ). Based on the offending conduct, the judge could not accept the applicant’s argument that if he was convicted and imprisoned, the minimum term of any such sentence would be likely to be equal to or less than the time already spent in custody (See ). There was a risk that the applicant would commit further offences if released on bail, in particular by breaching any protective bail condition in regard to contacting the victim (See ).
Charges: Breach of violence restraining order x 1.
Facts: The appellant was subject to a violence restraining order which provided that the appellant must not approach within 20 metres of the protected person (). The evidence was that the protected person walked up to the appellant (-).
The magistrate convicted the appellant on the basis that even though the appellant did not ‘approach’ the protected person, it was incumbent upon the appellant to immediately walk away ().
Issues: Whether the verdict was unreasonable and could not be supported.
Decision and Reasoning: The appeal was upheld, and the conviction quashed. Beech J held that the charge should have been dismissed once the Magistrate was satisfied that the appellant did not approach the protected person (). The word “approach” should be construed in its ordinary meaning: “to come nearer or near to (someone or something) in distance or time” (). An obligation to walk away from a protected person cannot be implied into a violence restraining order ().
Facts: The appellant had previously been in a relationship with the protected person and they had a 2-year-old child. He sent about 49 text messages and made 31 phone calls on a daily basis in breach of a violence restraining order (VRO). He claimed he was attempting to make arrangements to see his child. He had one prior conviction for breaching the same VRO. The prosecution accepted that the text messages were not threatening and the phone calls were not answered. However, the seriousness of the offence was increased because it occurred immediately after he had been dealt with by the Court for the previous breach. The appellant pleaded guilty to a charge of breaching a VRO. He was sentenced to 7 months’ imprisonment, suspended for 12 months.
Issue/s: Whether the Magistrate erred in imposing a sentence of imprisonment and failing to reduce the sentence to take account of the appellant’s early plea of guilty.
Under s 61A of the Restraining Orders Act 1997 (WA), ‘if a person has committed and been convicted of at least two offences within the period of two years before the conviction of the offence for which he or she is to be sentenced, the person is to be sentenced for a 'repeated breach'’ (see at ). This did not apply to the appellant. As such, under s 6(4) of the Sentencing Act 1995 (WA) the Court cannot impose a sentence of imprisonment unless it concludes that it is justified by the seriousness of the offence or the protection of the community. This offence was serious (see at ). However, Allanson J concluded that a sentence of imprisonment was not the only appropriate penalty. His Honour noted (at ) various mitigating factors including the appellant’s youth () and the fact that no violence nor threats of violence were involved in the offending. Therefore, it could not be said that the protection of the community or the protected person required a sentence of imprisonment. The Magistrate also did not refer to the plea of guilty as a mitigating factor. The sentence was set aside and sent back to the Magistrates’ Court for re-sentencing and his Honour stated at that a community based order may be appropriate.
Charge/s: Aggravated assault causing bodily harm, breach of violence restraining order (x 3).
Facts: A violence restraining order was obtained by the female victim against the male, Aboriginal appellant. This included conditions prohibiting the appellant from communicating or attempting communication with the victim, from remaining on premises where the victim lived or worked and from remaining within 10 metres of the victim. The first breach of the restraining order occurred at a Native Title meeting where the appellant spoke to the victim. He also assaulted her by hitting her on the back of the head with a jaffle iron. The second breach occurred when the appellant went to the victim’s home and persuaded her to take him to Meekatharra. Finally, the appellant breached the order by ringing the victim on 52 occasions and also by persuading the victim to drive him to Bondini Reserve. In sentencing, the magistrate noted that the appellant had pleaded guilty immediately and was entitled to a reduction of a maximum of 25% as provided for by s 9AA of the Sentencing Act. Her Honour took the maximum penalties as a starting point and reduced these by 25% in imposing sentences. This resulted in a head sentence of 27 months’ imprisonment.
Issue/s: The magistrate erred in the application of the Sentencing Act in particular by construing it as requiring a (potentially) significant increase in the sentence that would otherwise have been imposed and a starting point being the maximum penalty open to the court.
Decision and Reasoning: The appeal was allowed. The respondent conceded that the magistrate's interpretation of s 9AA was erroneous and that the appeal ought to be allowed. That concession was properly made. The magistrate’s application of the Sentencing Act was erroneous and the error resulted in a sentence beyond the range of sentences customarily imposed for offences of this type. The appellant was resentenced.
‘The law is limited in the manner in which it can respond to domestic violence. One important part of that response is by the issue of violence restraining orders. It is essential that those orders are not ignored. When they are repeatedly breached, the need for general and individual deterrence will ordinarily outweigh subjective and other mitigating considerations’ (See ).
The offence of assault was a serious example of its kind as it involved a blow to the victim’s head and was committed with an object capable of causing serious injury (See -). The breaches of the restraining order did not in themselves involve acts of violence but it was particularly serious that in each of the last two offences the appellant was breaching the order soon after appearing in court in relation to the first breach (See ). The appellant had made some attempt to turn his life around but the mitigating weight of this factor was limited by the nature of the offending and the need to emphasise the importance of complying with the restraining order (See -). Taking these factors into account and with the full benefit of the 25% reduction, Allanson J imposed a head sentence of 12 months’ imprisonment.
Charge/s: Breach of bail (x 2), breach of protective conditions.
Facts: The appellant was on bail for a charge of common assault in circumstances of aggravation namely, that the appellant was in a domestic relationship with the female complainant. The appellant’s bail was subject to a number of conditions including that he was not to contact or attempt to contact the complainant, he was not to approach within 20 metres of an address at which the complainant was living, and he was not to behave in a provocative or offensive manner to residents at that house. The applicant was subsequently charged with breach of protective bail conditions when he verbally abused and threatened the complainant at Centrelink offices. He was further charged with a number of offences of stealing and aggravated burglary and failed to appear in Court after being released on bail. He was charged with two breach of bail offences.
The appellant pleaded guilty to the breach of protective bail conditions and the two other charges of breach of bail. In sentencing, the magistrate noted: ‘Protective bail is placed on people for a purpose and that is to protect the victim, the person who is protected by the protective bail; and people who breach protective bail, like people who breach restraining orders, in a manner that you did, that is, actually threatening the protected persons, in my view ought be sentenced to a term of imprisonment […] These three offences, in my view, show a total disregard for court orders. There really is nothing that can be said by way of mitigation in relation to this offending. Ms Svanberg has pressed upon me that when you breached your protective bail you were intoxicated, but being intoxicated may explain why you breached your protective bail and why you breached your normal bail undertakings but it doesn't excuse your behaviour. The fact of the matter is you were on protective bail for a reason and you breached it’ (See ). The appellant was sentenced to a total effective sentence of 6 months and 1 day.
Issue/s: The appellant did not suggest that the 4-month sentence for the breach of protective bail conditions was excessive. The sentences of imprisonment for the other two offences were manifestly excessive. Further, the total effective sentence was disproportionate to the total criminality and therefore offends the totality principle.
Decision and Reasoning: The appeal was refused. In light of the maximum penalties available, the seriousness of the offences, and the personal circumstances of the appellant the sentence imposed was not manifestly excessive. The total effective sentence was also not disproportionate to the total offending (See ).
Facts: An interim violence restraining order was granted which prohibited the appellant from approaching within 5m of any premises where the protected person lived or worked. This order was later made final. The appellant was charged with breaching the order by going to the house of the protected person and placing a letter in the letterbox. She pleaded guilty and was convicted. However, the police later became aware that the order had expired when the offence occurred.
Issue/s: Whether the conviction should be set aside.
Despite those observations, his Honour considered that the 8 month term of imprisonment could be suspended for 12 months for a number of reasons. Firstly, it was in the best interests of the complainant and her child, cohabiting with the appellant, that he not be imprisoned: . Secondly, the appellant had attended eight sessions of a family violence programme: . His Honour stated that the offence was not in the upper range of seriousness: .
Charge/s: Aggravated assault occasioning bodily harm.
Facts: The appellant was in a relationship with the complainant for about four months. The appellant was intoxicated and following a dispute, he was arrested and ordered not to approach the caravan park where the complainant was residing. After being released, he knocked on the door of the complainant’s caravan and verbally abused her, threatened her and punched her to the face multiple times. He then knocked her to the ground. He stopped her from escaping. She was left with serious injuries. He was sentenced to two years’ imprisonment and was made eligible for parole.
Issue/s: Whether the sentence was manifestly excessive.
McKechnie J acknowledged the seriousness of the offence especially considering it amounted to a deliberate breach of a police order. This type of violence to women cannot be condoned and as such a sentence of immediate imprisonment was appropriate. However at -, his Honour considered various comparable cases and came to the conclusion that the sentence was manifestly excessive. His Honour especially had regard to Messiha v Plaucs WASC 63 where it was held that an 18-month sentence for aggravated assault occasioning bodily harm (including other charges) was disproportionate to the overall criminality of the offending. Nevertheless, general and specific deterrence and the significant injuries that the complainant suffered remained important considerations. The appellant was re-sentenced to 15 months’ imprisonment with parole eligibility.
Charge/s: Aggravated assault, threat to injure, three counts of aggravated assault occasioning bodily harm (circumstances of aggravation: that the appellant was in a family or domestic relationship with the victim).
Facts: The appellant engaged in a verbal argument with his wife. The appellant punched and grabbed the side of her face. She attempted to escape, at which point he threatened to kill her, grabbed her around the neck and stabbed her with a screwdriver. She feared for her life. The appellant then bit her twice and told his son who was attempting to stop the assault to get away several times. The appellant had a serious drug problem and the offending occurred while he was under the influence of drugs. He had prior convictions for violent offences but they did not involve domestic violence. He was sentenced to an aggregate term of 18 months’ imprisonment for all offences.
Issue/s: One of the issues concerned whether the total aggregate sentence infringed the totality principle.
The Court firstly noted that the offending was sustained, premediated and ferocious. It occurred in the family home in the presence of two young children.
The appellant submitted inter alia that the sentences should have been made concurrent because they constituted a single course of conduct. The Court rejected this argument and held that the so called ‘one transaction rule’ is a general rule and the operative question is whether the total effective sentence properly reflects the overall criminality involved. In this case, the course of conduct had distinct features which increased in seriousness over time so it was open to the Magistrate to impose some cumulative penalties.
The appellant also submitted that the Magistrate erred by giving the appellant’s criminal record undue weight, given it did not involve domestic violence. This argument was rejected – the Magistrate correctly stated that the record showed a lack of mitigation in that the appellant did not have past good character. Hall J was of the view that there is little merit in distinguishing past violent offending as irrelevant if it is not committed in domestic circumstances. These offences do have relevance, not necessarily as showing a tendency but in showing ‘an absence of mitigation as to past good character’ (see at ).
Another issue concerned whether the Magistrate erred by not having sufficient regard to the appellant’s longstanding relationship with his wife, the fact they have dependent children as well as his wife’s wishes. His wife filed an affidavit on appeal indicating that the appellant’s imprisonment was causing her extreme hardship. Her mortgage was in arrears. If the appellant was released, she claimed that there would be the prospect that the appellant would obtain employment so the arrears could be paid. The appellant and his wife were migrants and she had no wider family in Australia. The Court referred to McLure P’s remarks in The State of Western Australia v Cheeseman WASCA 15 (19 January 2011) and held that the wishes of victims of domestic violence for reconciliation has to be seen in context. Offenders cannot expect leniency because their punishment impacts others. While this issue could be relevant in some cases, it should not have been given much weight in this case.
The appellant also submitted that the fact he had successfully completed three community based orders should have been afforded more weight by the Magistrate. This argument was rejected – the Court held that the mitigatory effect of past completion of community orders can be diminished by reoffending. Reoffending can put into doubt whether the order was successful in bringing about attitudinal and behavioural change (see at ).
In relation to the presence of the children at the time of the offending, while it was not included as a formal circumstance of aggravation, it was open to take these facts into account (see at ).
The Court then noted that there was no history of domestic violence but the offending was serious and justified immediate imprisonment. In applying comparable cases, the Court concluded that the aggregate sentence was particularly high and did not bear a proper relationship to the overall criminality of the offending. In noting that the appellant had apologised, expressed remorse, expressed a wish to assist his wife with the mortgage and children and that he had his wife’s support, the total aggregate sentence was reduced to 15 months’ imprisonment with eligibility for parole.
Charge/s: 113 offences including: Stalking, unlawful installation of a tracking device, breach of violence restraining order (104 counts), breaching a protective bail condition (7 counts).
Facts: The applicant was served with an interim restraining order prohibiting him from communicating with his former partner in any way. In breach of this order, he attended her address and/or workplace, sent her a number of text messages and unlawfully installed a tracking device on her vehicle. This conduct also comprised the stalking offence. Later, the applicant called his for partner 80 times. The Magistrate noted that there were a significant number of offences committed over an extended period which had a considerable impact on the victim. A total effective sentence of 16 months’ imprisonment was imposed which comprised of 8 months’ imprisonment for stalking, 4 months’ imprisonment for unlawfully installing the tracking device (to be served cumulatively on the sentence for stalking) and 4 months’ imprisonment for 15 convictions including breaching bail conditions and the restraining order. All the other convictions for breaching the restraining order were to be served concurrently for the stalking offence.
Issue/s: Whether the Magistrate erred in making the sentence for unlawfully installing a tracking device cumulative upon the sentence imposed for stalking - the conduct which formed the basis of the stalking charge including the installation of the tracking device, such that a cumulative sentence resulted in the applicant being punished twice for the same conduct.
Decision and Reasoning: Leave was granted and the appeal was upheld.
The Court noted the ‘complexities’ involved in this issue and found it was not necessary to be resolved directly because of the application of the ‘common elements principle’ which states ‘when two offences of which an offender stands convicted contain common elements… it would be wrong to punish that offender twice for the commission of the elements that are common’ (see, for example Pearce v The Queen (1998) 194 CLR 610). This principle applied directly to this case. The facts indicated that the conduct which formed the basis of the tracking device charge was the same conduct, ‘which was part of the conduct relied upon to support the stalking charge’ (see at ). This falls directly within the common elements principle.
The Court found that there was a substantial miscarriage of justice caused by this error. The application of the common elements principle means that there could have been no additional punishment for the unlawful installation of the tracking device. As such, the 4-month sentence for the surveillance device offence was made concurrent, which resulted in the overall sentence being reduced to 12 months.
Facts: The appellant, (an Aboriginal man) engaged in an argument with his de facto partner. He punched her in the head multiple times until she fell over. He dragged her by the hair to a nearby tap to wash the blood off her. The appellant was very intoxicated at the time. He had a significant history of alcohol and drug abuse and violence including prior convictions for violent offences against the complainant. In fact, the offending was committed while he was subject to three suspended sentences relating to offences committed against the complainant. The complainant wished to continue her relationship with the appellant and at one stage indicated that she did not want to proceed with the charges. However, the appellant pleaded guilty at an early stage and was sentenced to 16 months’ imprisonment. He was also re-sentenced for the suspended sentences which resulted in a total effective sentence of 22 months’ imprisonment.
Whether the plea of guilty was made under duress and did not reflect his acceptance of the facts alleged by the prosecution.
Whether the sentence of 16 months for the latest assault was manifestly excessive and whether the total effective sentence was disproportionate to the overall criminality of the offending.
Decision and Reasoning: The appeal against conviction and sentence was dismissed.
This argument was dismissed – see at -.
Hall J accepted the Magistrate’s conclusion with respect to the seriousness of the appellant’s conduct. His Honour then noted that the attack was ‘prolonged’, instigated by the appellant and aggravated by the fact that it was committed notwithstanding previous court orders imposed for similar offending. This showed a disregard for the law and a need for a personal deterrent. Hall J noted that other than the early plea of guilty, there was little by way of mitigation. Furthermore, the fact that the appellant was intoxicated when the offence was committed was not mitigatory, as the appellant was ‘acutely aware that alcohol was a risk factor in respect of his past offending behaviour’ (see at ). In relation to the complainant’s wishes for reconciliation, his Honour noted McLure P’s remarks in The State of Western Australia v Cheeseman WASCA 15 (19 January 2011) and held that, ‘An otherwise appropriate penalty should not be reduced on account of an expression of willingness on the part of the complainant, for whatever reason, to forgive the offender and continue a relationship with him’ (see at ).
As such, the Court held that while the one-month sentence was at the higher end of the range for offences of this kind, it was within the Magistrate’s discretion, having regard to the seriousness of the offence and the need for personal and general deterrence. In relation to totality, the Court held that the earlier offences were separate and unrelated to the latest assault. It was appropriate to activate these suspended sentences and orders of cumulation did not make the total effective sentence disproportionate to the overall criminality of the offending.
Charge/s: Aggravated commons assault, breaches of violence restraining orders, breaches of protective bail conditions.
Facts: The offences related to a female complainant, with whom the appellant had been in a domestic relationship with. The appellant committed 29 breaches of a violence restraining order which prohibited the appellant, amongst other things, from communicating with the complainant. He did so by communicating with her by mobile phone (the ‘VRO offences’). He also committed four offences of breach of protective bail conditions by being 50-100 metres of the complainant on three occasions and by sending her a text message on one occasion (the ‘bail offences’). Finally, the applicant committed one offence of common assault in circumstances of aggravation at the same time as one of the bail offences. The magistrate sentenced the appellant to a total effective term of 12 months’ imprisonment, made up as follows: on aggravated assault 8 months’ imprisonment, one of the bail offences 4 months’ imprisonment (concurrent), 2 of the bail offences 4 months’ imprisonment (cumulative), one of the bail offences 2 months’ imprisonment (concurrent), and VRO offences 6 months’ imprisonment concurrent.
Issue/s: One of the issues was whether the total sentence was contrary to the first limb of the totality principle.
Decision and Reasoning: The appeal was allowed. The total effective sentence in this case was disproportionate to the overall criminality of the offending behaviour. The aggravating circumstances in respect of the assault offence, i.e. the breaches of the VRO and protective bail conditions, called for concurrency between the sentence on that offence and all other sentences. There should have been partial concurrency or a reduction in the length of sentence to avoid multiple punishment for these acts (See -).
Charge/s: Breach of violence restraining order, making threats to injure.
Facts: The complainant was the ex-partner of the appellant’s current partner. There was one daughter of that relationship. The appellant’s partner remained principally responsible for the welfare of the daughter. This meant that the appellant and the complainant often had contact with each other. Events at the complainant’s home prompted the complainant to seek a violence restraining order (VRO) on behalf of his daughter against the appellant, to prevent the appellant from committing an act of abuse against his daughter and from ‘behaving in a way that could reasonably be expected to cause fear that the child will be exposed to an act of family and domestic violence’ (see at ). The complainant then later obtained another VRO which prevented the appellant from communicating in any way with him. The appellant then made repeated telephone calls to the complainant and threatened to kill him and his daughter, which constituted both the breach and threat to injure charges. He was sentenced to 12 months’ imprisonment on each of the charges, to be served concurrently.
Whether the Magistrate erred by taking into account hearsay and irrelevant material in the victim impact statement.
Whether the Magistrate erred by taking into account prior property damage offences in concluding that the appellant has the potential to act violently in the future.
Decision and Reasoning: The appeal was upheld in respect of issues one and two.
Firstly, Jenkins J noted that the breach offence was not at the upper range because it did not involve any physical contact or actual violence. However, it was not trivial and included a threat of actual violence. Furthermore, there were no significant mitigating factors – the appellant had six prior convictions for breaching a VRO, was not remorseful and the previous penalties imposed had clearly not been effective as a personal deterrent. Notwithstanding, there were no attempts to carry through with the threats and no indication that the appellant intended to do so. Also, the appellant was no longer in a relationship with his partner and had ceased contact with the complainant’s daughter.
The victim impact statement detailed the history of the dispute between the appellant and complainant from the complainant’s point of view. The appellant described it as ‘inflammatory’ and Jenkins J agreed with that description. The appellant was not given an opportunity to respond to the matters in the statement. The respondent conceded that the Magistrate should not have taken these matters into account. The Magistrate needed to make clear that these matters were not taken into account.
Jenkins J held that it was ‘drawing too long a bow’ to suggest that the appellant’s violent attack on an ATM machine was reason to believe that he may attack people in the future. However, this of itself was not cause to allow the appeal as no substantial miscarriage of justice occurred.
The appellant was re-sentenced to a 12-month intensive supervision order which included programs to address anger management and alcohol abuse.
Charge/s: Aggravated assault causing bodily harm (x 2).
Appeal type: Appeals against conviction and sentence.
Facts: One of the appeals concerned two occasions where the appellant, an aboriginal man, unlawfully assaulted the victim who he was in a family and domestic relationship with. They were living at the Oombulgurri Aboriginal Community, and the victim was pregnant to the appellant. On both occasions, the victim, bleeding, with multiple injuries to her face and head, sought assistance from the police at the police facility. The victim told the police she was afraid of the appellant and wanted to get away from Oombulgurri. The police arranged for an aeroplane to take the victim to another centre for a time. The appellant was sentenced to 8 months’ imprisonment and 15 months’ imprisonment on each charge respectively. In light of the nature and seriousness of the offences, the Magistrate determined an immediate sentence of imprisonment was required.
a suspension of the sentence was open in all of the circumstances.
Decision and Reasoning: The appeal was dismissed. These were serious offences committed by the appellant, who had two recent convictions of aggravated assault causing bodily harm. The violent conduct towards the victim was repeated less than five weeks later and the victim had a well-founded fear of the appellant. The victim was vulnerable as she was much younger than the appellant, had been in a relationship with him and was pregnant (see at , ).
‘Violent treatment of women in this fashion cannot be tolerated anywhere in the State, but it is of particular importance that in isolated communities such as Oombulgurri that the punishment of an offender who commits such offences in a short space of time should be such as to demonstrate to all members of the community that that conduct is unlawful and that effective punishment will be imposed in order to deter the general community from the use of violence. Specific deterrence of the individual offender was, in this case, also a necessary and essential ingredient of the sentence’ .
A longer term of imprisonment was warranted on the second offence because it was more serious in that it was a repetition of the same unlawful conduct, and it was an unrelated offence.
Charge/s: Breach of violence restraining order, breach of suspended imprisonment order.
Facts: The appellant (aged 24) was the subject of a violence restraining order (VRO) in favour of the protected person (aged 52). They had been living together in an ‘off and on’ de facto relationship for about 18 months. The protected person had unsuccessfully applied to the Magistrates’ Court to have the order withdrawn. The breach occurred when the appellant had been living with the protected person for three days. An argument occurred, the police were called and the appellant was arrested. There was a history of violence in the relationship and the order had been breached four times in the past. According to a psychiatric report, the appellant presented with a ‘schizo-affective disorder, an ADHD history, personality disorders and mental retardation’ (see at ). Despite the orders being in place, it was the protected person who repeatedly invited the appellant back to live with her which constituted the repeated breaches. The breach of the VRO also constituted a breach of a suspended imprisonment order which had been imposed in relation to a prior breach in respect of the same protected person. He was sentenced to 7 months’ imprisonment for both offences, to be served concurrently.
Issue/s: Whether the Magistrate erred in imposing immediate sentences of imprisonment.
At trial, the Magistrate concluded that the psychiatric evidence did not support a conclusion that the appellant’s mental illness or disturbance led to the commission of the offences. She concluded that the ‘non-aggressive resumptions of cohabitation’ (by the appellant) were ‘part of a course of conduct over which the appellant could and should have exercised restraint and control in obedience to the VRO’ (see at ). Em Heenan J held that this amounted to an error of fact and that his breaches could ‘to a material degree’ be explained by his history of mental illness (see at ). The appellant’s mental health problems, in combination with significant personal stress related to his relationship with the victim ‘impaired his ability to exercise appropriate judgment and his ability to appreciate the wrongfulness of his conduct, so contributing causally to the commission of the offence’ (see at ). This reduction in culpability could lead to a reduction in the severity of the sentence and this was not sufficiently taken into account by the Magistrate. The appellant was re-sentenced as follows – no punishment was imposed in relation to the earlier breach. A conditional period of suspended imprisonment for 7 months (wholly suspended for 9 months) was imposed for the later breach.
Charge/s: Breach of a violence restraining order (VRO).
Facts: The appellant pleaded guilty to three counts of breaching a VRO. Only the second count was the subject of the appeal. The appellant’s relationship with the complainant had recently ended. He was served with a VRO which prohibited him from contacting her by any means and from entering or being within 200m of any place where she lived or worked. The second breach of the order (the subject of the appeal) occurred when the appellant attended the Karratha Women’s Refuge (where the complainant was staying) and wrote in the dust on the rear window of her car – ‘I am a dead man walking’. He later returned to rub the message off. The appellant had no relevant criminal history. He was sentenced to 8 months’ imprisonment, suspended for 2 years.
Whether the Magistrate erred by failing to adequately consider sentences other than imprisonment.
Decision and Reasoning: The appeal was upheld in respect of issue 2.
The Court held that the Magistrate did sufficiently have regard to the possibility of other sentencing options, such as an intensive supervision order or a fine.
However, this does not mean that a custodial sentence will be appropriate in all cases. Simmonds J found that there are various circumstances which made this offence of a less serious kind. The appellant was surprised that the relationship had ended. There was no indication of any ‘offence or serious misconduct’ that led to the making of the VRO. Furthermore, the appellant made no attempt to enter the refuge and there was no threatening or intimidatory conduct. However, the complainant had recently been hospitalised for heart treatment. The respondent submitted that this as well as the fact that she was living in a refuge was relevant to assessing the seriousness of the offence. Simmonds J found that while these factors would make the offence more serious, evidence of the subjective impact on the complainant would be needed (see at ).
The respondent also submitted that the message left on the car might indicate a potential for the appellant to self-harm. His Honour then referred to the equivalent Victorian legislation which defines ‘emotional abuse’ (see at ) and accepted that a threat of self-harm intending to or producing the effect of causing distress or hurt to someone is a factor capable of aggravating the offence of breaching a VRO. However, in this case there was no evidence pointing to a threat of self-harm made with that intention or effect. Furthermore, the fact that the appellant’s counsel referred to the protected person as the ‘complainant’ at trial did not of itself show that she suffered distress or hurt (see at ). In fact, the Court accepted that this potential for self-harm indicated the presence of a mental condition which contributed to the offending, notwithstanding the absence of a report from any mental health professional. This lessened the weight to be assigned to general and specific deterrence (see at – ).
This could result in the offence being viewed more seriously than otherwise. However, given that there was no element of physical threat or intimidation, the offence remained less serious (see at ). The Court held that the main mitigating factor was the appellant’s plea of guilty. Given this and the mental condition as discussed above, the Court concluded that the sentence was manifestly excessive and stated that a community based order was likely to be appropriate.
Charge/s: Aggravated stalking (circumstance of aggravation – that the offence was committed in breach of a violence restraining order), breach of violence restraining order (12 counts), possession of firearm with circumstances of aggravation.
Facts: The appellant was in a relationship with the complainant for three years which ended. The appellant then continually sent emails and text messages to the complainant (including at her workplace) and made threats to kill her. The complainant obtained a violence restraining order (VRO) which prevented the appellant from communicating with her by any means. His conduct then continued in breach of the order. He was arrested and Police found a firearm and ammunition at his home. The appellant was sentenced to 12 months’ imprisonment for the stalking charge, a global sentence of 12 months’ imprisonment for the breach offences (cumulative on the sentence for stalking) and 7 months and 2 weeks’ imprisonment for the possession of firearm offence.
Concurrency: Whether the sentence imposed for the breach offences should have been made concurrent with the sentence for the stalking offence because both offences involved the same acts.
Totality: Whether the Magistrate failed to have proper regard to the totality principle.
Whether the sentences were manifestly excessive.
Whether the sentence should have been suspended.
Decision and Reasoning: The appeal was upheld in respect of issue 1.
The prosecution conceded that the appeal on the issue of concurrency must succeed. Section 11(1) of the Sentencing Act 1995 provides that a person is not to be sentenced twice on the same evidence. Simmonds J stated at – ‘Here the offence of aggravated stalking was constituted by the course of conduct whose constituents were the 12 breaches of the violence restraining order. The sentences for the 12 breaches of violence restraining order, globally, are the same as the sentence for the aggravated stalking.’ As such, the global sentence for the breach offences was set aside.
The appellant submitted that a total effective sentence (without the sentence for the breach offences) of 19 months and 2 weeks was a crushing sentence and was not a just measure of the criminality involved. Simmonds J acknowledged that the Magistrate failed to recognise an overlap in the criminality between the stalking and breach offences, in that he did not have regard to the issue of double punishment, as noted above. However, this did not result in the sentence infringing the totality principle.
An argument that the sentences for the aggravated stalking and firearms offences were manifestly excessive was dismissed. The appellant had some modest criminal history which did not involve violence. While he pleaded guilty, he showed minimal insight into his actions or empathy towards the victim. Simmonds J also noted the seriousness of the offending. In comparing analogous cases (see - for summaries) his Honour concluded that the sentence was within range.
The Magistrate did not suspend the sentence because he was concerned that a suspended sentence would act as a sufficient deterrent to the appellant and would not provide adequate protection for the victim, as well as other matters. This approach was appropriate and this ground was dismissed.
Charge/s: Two counts of aggravated assault occasioning bodily harm (aggravating factor: that the applicant was in a domestic relationship with the victim), escaping from lawful custody, failure to comply with bail conditions.
Facts: The applicant had an argument with the complainant (his de facto partner). The applicant then pushed the back of her head into a window which caused the window to smash and the complainant to fall on the ground. He then dragged her out of a door and kicked and punched her multiple times which caused her head to hit a railing, at which point she passed out. The applicant then evaded arrested for some days. After being granted bail, he phoned the complainant in breach of protective bail conditions. The second assault occurred 6 months later. The applicant became aggressive and dropped the complainant onto the ground and kicked her repeatedly in the rib area. He also used a ring on his left hand to gouge her left eye, resulting in a bruised and swollen eye and a cut to the eyeball. He had long standing problems with drug and alcohol abuse. His criminal history included a violent offence in a previous de facto relationship. He was sentenced to an effective term of 2 years and 2 months’ imprisonment. The sentences for the escaping custody and second aggravated assault offences were made cumulative.
Whether the Magistrate erred in making the sentences for the second count of aggravated assault occasioning bodily harm and escaping custody cumulative because the offences occurred on the same day.
Decision and Reasoning: Leave to appeal was refused.
Hasluck J noted that the offences were particularly serious. The Magistrate gave appropriate consideration to this as well as to personal and general deterrence. This was, ‘apt in respect of a severe attack on a defenceless woman who was in a relationship with the applicant, especially when the attacks were sustained and persistent’ (see at ). As such, the sentences could not be described as manifestly excessive.
The Court held that there was a separation in time between the offences and they were of a different kind. Hasluck J referred to the ‘common elements principle’ and acknowledged that it would be wrong two punish an offender twice where ‘there is essentially one transaction or commonality is evident’ but that this did not arise on the facts (see at ).
Charge/s: Aggravated assault occasioning bodily harm (circumstance of aggravation: that the appellant was in a family and domestic relationship with the victim).
Facts: The appellant was in an intimate personal relationship with the complainant after meeting on the internet. The appellant was intoxicated. An argument occurred and the appellant verbally abused the complainant. He then pushed her into a chair, threatened to kill her and grabbed her around the throat almost to the point of making her lose consciousness. He repeatedly slapped her face and choked her for several minutes. He threw her into a bed before dragging her by the arms into another room. The appellant then calmed down and stated that the complainant was free to leave but informed her that he was in possession of two firearms. The complainant made him dinner to pacify him and eventually managed to escape. The appellant later left a message on her phone in which he apologised for hitting her. She sustained various injuries including bruising and swelling. The appellant pleaded guilty and was sentenced to 12 months’ imprisonment with parole eligibility.
Issue/s: One of the issues concerned whether the sentence was manifestly excessive.
Decision and Reasoning: The appeal was upheld in respect of other issues such as the weight given to the plea of guilty and the time already spent in custody and the sentence was reduced by 1.5 months. In relation to the issue of manifest excess, the appellant emphasised the effect of alcohol and prescribed medication which he was taking as well as his prior good character, remorse and progress in rehabilitation. However, McKechnie J held that the Magistrate was not in error. While this was the appellant’s first violent offence, he had a number of previous offences of driving while intoxicated and on the day of the offending he had been fined $8000 for other offences which he had committed while intoxicated. The Magistrate did sufficiently take the appellant’s remorse into account. His Honour also noted that there is no offence of domestic violence. It is a term which ‘euphemistically describes serious criminal conduct’ (see at ). In this case, the offending was particularly serious. The sentence was appropriate, taking into account the public interest in general deterrence and just punishment.
Charge/s: Aggravated stalking, breach of violence restraining order, attempt to pervert the course of justice.
Appeal type: Appeal against refusal of bail.
Facts: The decision concerned a bail application arising from three charged offences following the estrangement of the applicant from his second wife. The first alleged offence was the theft of mail from the complainant by the applicant. The second alleged offence was the commencement of a series of events said to amount to stalking. Some of these events included the applicant damaging the property of the complainant’s male friend, and the male friend obtaining a violence restraining order which the applicant subsequently breached. The applicant also became involved in an altercation with the complainant and she obtained a violence restraining order against him. The applicant stole items of women’s clothing from the complainant’s home, stole a security camera the complainant had installed, and was seen in the complainant’s backyard disguised with a mask and carrying a knife. The third offence occurred when the applicant asked his neighbours to provide him with a false alibi for the evening he was seen in the complainant’s yard wearing a mask and carrying a knife.
Decision and Reasoning: The appeal was dismissed. The applicant had not made out exceptional reasons for the grant of bail in this case. The character of factors pointing towards the grant of bail, namely, hardship to the applicant, the applicant’s antecedents, and the likely time before trial, were not sufficient to establish exceptional reasons. This was particularly so when weighed against the strength of the State’s case, the adverse effects on protected persons of a release on bail, the concern for the failure of achievement of the purposes of protection orders in this case, and any difficulties in proving any future breach of a protective order (See ). See also Gilmour v The State of Western Australia WASCA 42 (28 February 2008). | 2019-04-26T00:15:49Z | http://dfvbenchbook.aija.org.au/wa/supreme-court/ |
Loopy Loyalty is owned and operated by PassKit, Inc.
PLEASE READ THE FOLLOWING CAREFULLY BEFORE USING PASSKIT. THESE TERMS AND CONDITIONS CONSTITUTE A LEGAL AGREEMENT BETWEEN YOU AND PASSKIT, INC.
You would like to use Loopy Loyalty (as defined below) to generate Digital Stamp Card(s) for use by Passbook and any other OS and devices supported. PassKit, Inc. is willing to grant You the use of Loopy Loyalty to generate Digital Stamp Cards on the terms and conditions set forth in this Agreement.
In order to use Loopy Loyalty software and related services, You must first agree to this Agreement. If You do not or cannot agree to this Agreement, You are not permitted to use Loopy Loyalty.
- by using the Loopy Loyalty software.
“Agreement” means the PassKit License Agreement, including any attachments and any exhibits thereto which are hereby incorporated by this reference.
“Documentation” means any technical or other specifications or documentation that PassKit, Inc. may provide to You for use in connection with Loopy Loyalty.
“Pass(es)” means one or more digital stamp cards developed by You under this Agreement.
“Pass ID” means the combination of an Apple-issued certificate and Push Application ID that is used by You to digitally sign Your Passes and to send Push Notifications to Pass(es) using both PassKit and Apple services.
“Passbook” means Apple’s installed iOS feature that has the ability to store and display Passes for use on iOS Products.
“PassKit” means the online service(s) provided by and maintained by PassKit, Inc. for the design, production, distribution, management and analysis of Pass(es) for Passbook. For purposes of Schedule 1, PassKit means PassKit, Inc..
“Push Notification” means a message, including any content or data therein, that You transmit to end-users and that is delivered in Your Pass within Passbook.
“You” and “Your” means and refers to the person(s) or legal entity (whether the company, organisation, educational institution, or governmental agency, instrumentality, or department) using Loopy Loyalty or otherwise exercising rights under this Agreement. For the sake of clarity, You may authorize contractors to use Loopy Loyalty on Your behalf.
You certify to PassKit, Inc. and agree that: (a) You are of the legal age of majority in the jurisdiction in which You reside (at least 18 years of age in many countries) and have the right and authority to enter into this Agreement on Your own behalf, or if You are entering into this Agreement on behalf of Your company, organisation, educational institution, or agency, instrumentality, or department of the federal government, that You have the right and authority to legally bind such entity or organisation to the terms and obligations of this Agreement; (b) All information provided by You to PassKit, Inc. or Your end-users in connection with this Agreement or Passes, including without limitation Pass Information, will be current, true, accurate, supportable and complete and, with regard to information You provide to PassKit, Inc., You will promptly notify PassKit, Inc. of any changes to such information. Furthermore, You agree that PassKit, Inc. may share such information (including email address and mailing address) with third parties who have a need to know for purposes related thereto (e.g., intellectual property questions, customer service inquiries, etc.); (c) You will comply with the terms of and fulfill Your obligations under this Agreement, and You agree be fully responsible for any actions undertaken by You in relation to Your Pass and their compliance with the terms of this Agreement; (d) You will be solely responsible for all costs, expenses, losses and liabilities incurred, and activities undertaken by You in connection with PassKit, Your Passes and Your related development and distribution efforts, including, but not limited to, any related development efforts, network and server equipment, Internet service(s), or any other hardware, software or services used by You in connection with Your use of any services; (e) For the purposes of Schedule 1, You represent and warrant that You own or control the necessary rights in order to appoint PassKit, Inc. as Your worldwide agent for the delivery of Your Passes, and that the fulfillment of such appointment by PassKit, Inc. shall not violate or infringe the rights of any third party; and (f) You will not act in a manner which conflicts or interferes with any existing commitment or obligation You may have and no agreement previously entered into by You will interfere with Your performance of Your obligations under this Agreement.
As a condition to using PassKit, You agree that: (a) You will only use the PassKit for the purposes and in the manner expressly permitted by this Agreement and in accordance with all applicable laws and regulations; (b) You will not use PassKit for any unlawful or illegal activity, nor to generate a Pass which would commit or facilitate the commission of a crime, or other unlawful or illegal act; (c) To the best of Your knowledge and belief, Your Pass and Pass Information do not and will not violate, misappropriate, or infringe any third party copyrights, trademarks, rights of privacy and publicity, trade secrets, patents, or other proprietary or legal rights (e.g. photography or image rights, logo rights, third party data rights); (d) You agree that all development of Passes must be in accordance with the terms of this Agreement.
Subject to the terms of this Agreement, You may distribute Your Passes to end-users by the web, email, or an Application. You understand and agree that Your end-users must accept Your Passes before they will be loaded into Passbook or any other device and can remove Your Passes from Passbook or any other device at any time.
By distributing Your Passes in this manner, You represent and warrant to PassKit, Inc. that Your Passes comply with the terms of this agreement. PassKit, Inc. and Apple shall not be responsible for any costs, expenses, damages, losses (including without limitation lost business opportunities or lost profits) or other liabilities You may incur as a result of distributing Your Passes in this manner. You also indemnify PassKit, Inc. and Apple from any costs, expenses, damages, losses (including without limitation lost business opportunities or lost profits) or other liabilities You may incur as a result of distributing Your Passes in this manner.
You will be responsible for attaching or otherwise including, at Your discretion, any relevant end-user usage terms with Your Passes. PassKit, Inc. will not be responsible for any violations of Your end-user usage terms. You will be solely responsible for all user assistance, warranty and support of Your Passes.
By distributing Your Passes as permitted in this Agreement, You hereby permit PassKit, Inc. and Apple to use (i) screen shots of Your Pass; (ii) trademarks, logos and images associated with Your Pass; and (iii) Pass Information, for promotional purposes in marketing materials and gift cards, excluding those portions which You do not have the right to use for promotional purposes and which You identify in writing to PassKit, Inc..
You understand and agree that PassKit, Inc. reserves the right to review and approve or reject Your Pass(es) at any time during the Term of this Agreement.
PASSKIT AND APPLE SHALL NOT BE LIABLE FOR ANY DAMAGES OR LOSSES ARISING FROM ANY USE, MISUSE, RELIANCE ON, INABILITY TO USE, INTERRUPTION, SUSPENSION, OR TERMINATION OF PASSKIT, PASSBOOK, YOUR PASS ID, YOUR PASSES, OR ANY SERVICES PROVIDED IN CONNECTION THEREWITH, INCLUDING BUT NOT LIMITED TO ANY LOSS OR FAILURE TO DISPLAY YOUR PASS IN PASSBOOK OR ANY END-USER CLAIMS ARISING FROM ANY USE OF THE FOREGOING BY YOUR END-USERS.
To the extent permitted by applicable law, You agree to indemnify and hold harmless, PassKit, Inc., its directors, officers, employees, independent contractors and agents (each an "PassKit, Inc. Indemnified Party") from any and all claims, losses, liabilities, damages, taxes, expenses and costs, including without limitation, attorneys’ fees and court costs (collectively, "Losses"), incurred by a PassKit, Inc. Indemnified Party and arising from or related to any of the following: (i) Your breach of any certification, covenant, obligation, representation or warranty in this Agreement; (ii) any claims that Your Pass or Pass Information violate or infringe any third party intellectual property or proprietary rights; (iii) PassKit, Inc.’s permitted use, promotion or delivery of Pass, Pass Information, metadata, related trademarks and logos, or images and other materials that You provide to PassKit, Inc. under this Agreement; (iv) any claims, including but not limited to any end-user claims, regarding Your Pass, Pass Information, or related logos, trademarks, content or images; or (v) Your use Pass, Pass Information, metadata or Your development and distribution of any Application or Pass.
To the extent permitted by law, You hereby agree to indemnify, defend and hold harmless each PassKit, Inc. Indemnified Party from any Losses incurred by such PassKit, Inc. Indemnified Party by reason of any such use.
As consideration for the rights granted to You under the Agreement, You agree to pay PassKit, Inc. the requisite monthly fees as set forth on PassKit website. The fees are non refundable. Any taxes that may be levied on the PassKit software or Your use of it shall be Your responsibility.
PassKit, Inc. reserves the right to modify the fees and other charges for the subsequent Renewal Subscription Term upon notice to You no less than sixty (60) days prior to the beginning of such Renewal Subscription Term.
The Term of this Agreement shall extend until the one (1) year anniversary of the original activation date of Your subscription account (“Effective Date”). Thereafter, subject to Your compliance with the terms of this Agreement, the Term will automatically renew for successive one (1) year terms, unless sooner terminated in accordance with this Agreement.
This Agreement and all rights granted by PassKit, Inc. hereunder and any services provided hereunder will terminate, effective immediately upon notice from PassKit, Inc.: (a) if You fail to comply with any term of this Agreement and fail to cure such breach within 30 days after becoming aware of or receiving notice of such breach; (b) if You become insolvent, fail to pay Your debts when due, dissolve or cease to do business, file for bankruptcy, or have filed against You a petition in bankruptcy; or (f) if You engage, or encourage others to engage, in any misleading, fraudulent, improper, unlawful or dishonest act relating to this Agreement, PassKit, Inc. may also terminate this Agreement, or suspend Your rights to use PassKit, if You fail to accept any new Agreement terms.
The PassKit services may contain inaccuracies or errors that could cause failures or loss of data. PassKit, Inc., or its licensors, may provide or make available through PassKit certain web based applications, service related software, certificate issuance services, or other services for Your use (collectively the “Services” for purpose of section 6 and 10). PassKit, Inc. and its licensors reserve the right to change, suspend, remove, or disable access to any Services (or any part thereof) at any time without notice. In no event will PassKit, Inc. or its licensors be liable for the removal of or disabling of access to any such Services. PassKit, Inc. or its licensors may also impose limits on the use of or access to certain Services, or may remove the Services for indefinite time periods or cancel the Services at any time and in any case and without notice or liability.
YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT THE USE OF PASSKIT SOFTWARE, SECURITY SOLUTION AND ANY SERVICES IS AT YOUR SOLE RISK AND THAT THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY AND EFFORT IF WITH YOU. THE PASSKIT SOFTWARE, SECURITY SOLUTION AND ANY SERVICES ARE PROVIDED “AS-IS” AND “AS AVAILABLE”. WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND, AND PASSKIT, PASSKIT’s AGENTS AND PASSKIT’S LICENSORS HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH RESPECT TO THE PASSKIT SOFTWARE, SECURITY SOLUTION AND SERVICES EITHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, TIMELINESS AND NON INFRINGEMENT OF THIRD PARTY RIGHTS. PASSKIT DOES NOT WARRANT AGAINST INTERFERENCE WITH YOUR ENJOYMENT OF THE PASSKIT SOFTWARE, SECURITY SOLUTION OR SERVICES, THAT THE OPERATION OF THE PASSKIT SOFTWARE, SECURITY SOLUTION, OR THE PROVISION OF SERVICES WILL BE UNINTERRUPTED, TIMELY, SECURE OR ERROR FREE, THAT DEFECTS OR ERRORS IN THE PASSKIT SOFTWARE, SECURITY SOLUTION OR SERVICES WILL BE COMPATIBLE WITH FUTURE APPLE PRODUCTS, SERVICES OR SOFTWARE OR ANY THIRD PARTY SOFTWARE, APPLICATIONS OR SERVICES, OR THAT ANY INFORMATION STORED OR TRANSMITTED THROUGH ANY PASSKIT SOFTWARE OR SERVICE WILL NOT BE LOST, CORRUPTED OR DAMAGED. YOU ACKNOWLEDGE THAT THE PASSKIT SOFTWARE AND SERVICES ARE NOT INTENDED OR SUITABLE FOR USE IN SITUATIONS OR ENVIRONMENTS WHERE ERRORS, DELAYS, FAILURES OR INACCURACIES IN THE TRANSMISSION OR STORAGE OF DATA OR INFORMATION BY OR THROUGH THE PASSKIT SOFTWARE OR SERVICES COULD LEAD TO DEATH, PERSONAL INJURY, OR FINANCIAL, PHYSICAL, PROPERTY OR ENVIRONMENTAL DAMAGE. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY PASSKIT OR A PASSKIT AUTHORISED REPRESENTATIVE WILL CREATE A WARRANTY NOT EXPRESSLY STATED IN THIS AGREEMENT. SHOULD THE PASSKIT SOFTWARE, SECURITY SOLUTION OR SERVICES PROVDE DEFECTIVE YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
Location data as well as any maps data provided by any Services or software is for basic navigational purposes only and is not intended to be relied upon in situations where precise location information is needed or where erroneous, inaccurate or incomplete location data may lead to death, personal injury, property or environment damage. Neither PassKit, Inc. nor any of its licensors guarantees the availability, accuracy, completeness, reliability, or timeliness of location data or any other data or information displayed by any Services or software.
Any notices relating to this Agreement shall be in writing. Notices will be deemed given by PassKit, Inc. when sent to You at the email address or mailing address You provided during the registration process. All notices to PassKit, Inc. relating to this Agreement will be deemed given when sent by you at the email [email protected]. You consent to receive notices by email and agree that any such notices that PassKit, Inc. sends You electronically will satisfy any legal communication requirements. A party may change its email or mailing address by giving the other written notice as described above.
PassKit, Inc. may change the terms of this Agreement at any time. In order to continue using the PassKit, You must accept and agree to the new terms of this Agreement. If You do not agree to new terms, Your use of the PassKit will be suspended or terminated by PassKit, Inc.. You agree that Your acceptance of such new Agreement terms may be signified electronically, including without limitation, by Your checking a box or clicking on an “agree” or similar button.
1.1 You hereby appoint PassKit as Your worldwide agent for the delivery of the Passes to end-users, during the Delivery Period. You hereby acknowledge that PassKit will deliver the Passes to end-users for You and on Your behalf. For purposes of this Schedule 1, the term "Passes" includes any additional permitted functionality, content or services provided by You.
1.3 The parties acknowledge and agree that their relationship under this Schedule 1 is, and shall be, that of principal and agent, and that You, as principal, are, and shall be, solely responsible for any and all claims and liabilities involving or relating to, the Passes, as provided in this Schedule 1. The parties acknowledge and agree that Your appointment of PassKit as its agent under this Schedule 1 is non-exclusive.
1.4 For purposes of this Schedule 1, the "Delivery Period" shall mean the period beginning on the Effective Date of the Agreement, and expiring on the last day of the Agreement or any renewal thereof; provided, however, that PassKit’s appointment as Your agent shall survive expiration of the Agreement for a reasonable phase-out period not to exceed thirty (30) days and further provided that, solely with respect to Your end-users, subsections 1.2(b), (c), and (d) of this Schedule 1 shall survive termination or expiration of the Agreement unless You indicate otherwise pursuant to sections 3.1 and 5.2 of this Schedule 1.
You acknowledge and agree that PassKit, in the course of acting as agent for You, is hosting, or pursuant to Section 1.2(b) of this Schedule 1 may enable authorized third parties to host, the Pass(es), and is allowing the download of those Pass(es) by end-users, on Your behalf. The parties acknowledge and agree that PassKit shall not acquire any ownership interest in or to any of the Passes or Pass Information, and title, risk of loss, responsibility for, and control over the Pass(es) shall, at all times, remain with You. PassKit may not use any of the Passes or Pass Information for any purpose, or in any manner, except as specifically authorized in this Schedule 1.
3.1 You represent and warrant that: (a) You have the right to enter into this Agreement, to reproduce and distribute each of the Passes, and to authorize PassKit to permit end-users to download and use each of the Pass(es); (b) none of the Passes, or end-users' permitted uses of those Passes, violate or infringe any patent, copyright, trademark, trade secret or other intellectual property or contractual rights of any other person, firm, corporation or other entity and that You are not submitting the Licensed Applications to PassKit on behalf of one or more third parties; (c) each of the Passes is authorized for distribution, use in, export to, and import into each of the countries designated by You under Section 2 of this Schedule 1, in accordance with the laws and regulations of those countries; (d) none of the Passes contains any obscene, offensive or other materials that are prohibited or restricted under the laws or regulations; (e) all information You provide is accurate and that, if any such information ceases to be accurate, You will promptly update it to be accurate; and (f) in the event a dispute arises over the content of Your Pass or use of Your intellectual property on the Pass, You agree to follow PassKit’s Pass dispute process on a non-exclusive basis and without any party waiving its legal rights.
4.1 PassKit shall have no responsibility for the installation and/or use of any of the Passes by any end-user. You shall be solely responsible for any and all end-user assistance and support with respect to each of the Passes.
4.2 You shall be solely responsible for, and PassKit shall have no responsibility or liability whatsoever with respect to, any and all claims, suits, liabilities, losses, damages, costs and expenses arising from, or attributable to, the Passes and/or the use of those Passes by any end-user, including, but not limited to: (i) claims of breach of warranty; (ii) product liability claims; and (iii) claims that any of the Passes and/or the end-user's possession or use of those Passes infringes the copyright or other intellectual property rights of any third party.
5.1 This Schedule 1, and all of PassKit's obligations hereunder, shall terminate upon the expiration or termination of the Agreement.
5.2 In the event that You no longer have the legal right to distribute the Passes, or to authorize PassKit to allow access to those Passes by end-users, in accordance with this Schedule 1, You shall promptly notify PassKit.
5.3 PassKit reserves the right to cease allowing download by end-users of the Passes at any time, with or without cause, by providing notice of termination to You. Without limiting the generality of this Section 5.3, You acknowledge that PassKit may cease allowing download by end-users of some or all of the Passes if PassKit reasonably believes that: (i) those Passes and/or any end-user's possession and/or use of those Passes, infringe patent, copyright, trademark, trade secret or other intellectual property rights of any third party; or (ii) the distribution and/or use of those Passes violates any applicable law in any country. An election by PassKit to cease allowing download of any Pass, pursuant to this Section 5.3, shall not relieve You of Your obligations under this Schedule 1.
5.4 You may invalidate any or all of the Passes at any time, and for any reason, by using the tools provided, except that, with respect to Your end-users, You hereby authorize and instruct PassKit to fulfill sections 1.2(b), (c), and (d) of this Schedule 1, which shall survive termination or expiration of the Agreement unless You indicate otherwise pursuant to sections 3.1 and 5.2 of this Schedule 1.
The relationship between You and PassKit established by this Schedule 1 may have important legal consequences for You. You acknowledge and agree that it is Your responsibility to consult with Your legal advisors with respect to Your legal obligations hereunder.
“You represent and warrant You have any necessary right to the images you upload, and further permit PassKit, Inc. to use these images to generate passes”.
"You permit PassKit, Inc. (“Service Provider”) to enable You in accessing and using the Apple Push Network in Your Passes"
1.1 You may use the APN only in Your Applications, Your Passes, and/or in sending OS X Website Push Notifications to the OS X desktop of users of Your Site who have opted in to receive Notifications through Safari on OS X. You, Your Application and/or Your Pass may access the APN only via the APN API and only if You have been assigned a Push Application ID by Apple. Except for the limited purpose of Section 6 below, You agree not to share Your Push Application ID with any third party. You understand that You will not be permitted to access or use the APN after expiration or termination of Your Agreement.
1.2 You are permitted to use the APN and the APN APIs only for the purpose of sending Push Notifications to Your Application or Your Pass on an iOS Product and/or to the OS X desktop of users of Your Site who have opted in to receive Notifications through Safari on OS X as expressly permitted by the Agreement (including but not limited to this Attachment 1), the APN Documentation and all applicable laws and regulations (including all intellectual property laws). You further agree that You must disclose to Apple any use of the APN as part of the submission process for Your Application.
1.3 You understand that before You send an end-user any Push Notifications through the APN, the end-user must consent to receive such Notifications. You agree not to disable, override or otherwise interfere with any Apple-implemented consent panels or any Apple system preferences for enabling or disabling Notification functionality. If the end-user’s consent to receive Push Notifications is denied or later withdrawn, You may not send the end-user Push Notifications.
2.1 You may not use the APN or Local Notifications for the purpose of sending unsolicited messages to end-users or for the purpose of phishing or spamming, including, but not limited to, engaging in any types of activities that violate anti-spamming laws and regulations, or that are otherwise improper, inappropriate or illegal. For example, You agree not to include links to phishing or other malicious websites in Your OS X Website Push Notifications.
2.2 You may not use the APN or Local Notifications for the purposes of advertising, product promotion, or direct marketing of any kind (e.g., up-selling, cross-selling, etc.), including, but not limited to, sending any messages to promote the use of Your Application or advertise the availability of new features or versions. Notwithstanding the foregoing, You may use the APN or Local Notifications for promotional purposes in connection with Your Pass so long as such use is directly related to the Pass, e.g., a store coupon may be sent to Your Pass in Passbook.
2.3 You may not excessively use the overall network capacity or bandwidth of the APN, or unduly burden an iOS Product, OS X or an end-user with excessive Push Notifications or Local Notifications, as may be determined by Apple in its reasonable discretion. In addition, You agree not to harm or interfere with Apple’s networks or servers, or any third party servers or networks connected to the APN, or otherwise disrupt other developers' use of the APN.
2.4 You may not use the APN or Local Notifications to send material that contains any obscene, pornographic, offensive or defamatory content or materials of any kind (text, graphics, images, photographs, sounds, etc.), or other content or materials that in Apple’s reasonable judgment may be found objectionable by the end-user of Your Application, Pass or Site.
2.5 You may not transmit, store or otherwise make available any material that contains viruses or any other computer code, files or programs that may harm, disrupt or limit the normal operation of the APN or an iOS Product or OS X, and You agree not to disable, spoof, hack or otherwise interfere with any security, digital signing, verification or authentication mechanisms that are incorporated in or used by the APN, or enable others to do so.
Notifications that You send using Your Website Push ID must be sent under Your own name, trademark or brand (e.g., a user should know that the communication is coming from Your Site) and must include an icon, trademark, logo or other identifying mark for Your Site. You agree not to misrepresent or impersonate another Site or entity or otherwise mislead users about the originator of the OS X Website Push Notification. To the extent that You reference a third party’s trademark or brand within Your OS X Website Push Notification, You represent and warrant that You have any necessary rights.
3.2 By enabling the APN and sending OS X Website Push Notifications for Your Site as permitted in this Agreement, You hereby permit Apple to use (i) screen shots of Your OS X Website Push Notifications on OS X; and (ii) trademarks and logos associated with such Notifications, for promotional purposes in Apple’s marketing materials, excluding those portions which You do not have the right to use for promotional purposes and which You identify in writing to Apple. You also permit Apple to use images and other materials that You may provide to Apple, at Apple’s reasonable request, for promotional purposes in marketing materials.
4. Delivery by the APN or via Local Notifications. You understand and agree that in order to provide the APN and make Your Push Notifications available on iOS Products or OS X, Apple may transmit Your Push Notifications across various public networks, in various media, and modify or change Your Push Notifications to comply with the technical and other requirements for connecting to networks or devices. You acknowledge and agree that the APN is not, and is not intended to be, a guaranteed or secure delivery service, and You shall not use or rely upon it as such. Further, as a condition to using the APN or delivering Local Notifications, You agree not to transmit sensitive personal or confidential information belonging to an individual (e.g., a social security number, financial account or transactional information, or any information where the individual may have a reasonable expectation of secure transmission) as part of any such Notification, and You agree to comply with any applicable notice or consent requirements with respect to any collection, transmission, maintenance, processing or use of an end-user’s personal information.
5.1 Apple may at any time, and from time to time, with or without prior notice to You (a) modify the APN, including changing or removing any feature or functionality, or (b) modify, deprecate, reissue or republish the APN APIs. You understand that any such modifications may require You to change or update Your Applications, Passes or Sites at Your own cost. Apple has no express or implied obligation to provide, or continue to provide, the APN and may suspend or discontinue all or any portion of the APN at any time. Apple shall not be liable for any losses, damages or costs of any kind incurred by You or any other party arising out of or related to any such service suspension or discontinuation or any such modification of the APN or APN APIs.
5.2 The APN is not available in all languages or in all countries and Apple makes no representation that the APN is appropriate or available for use in any particular location. To the extent You choose to access and use the APN, You do so at Your own initiative and are responsible for compliance with any applicable laws, including but not limited to any local laws.
5.3 Apple provides the APN to You for Your use with Your Application, Pass, or Site, and does not provide the APN directly to any end-user. You acknowledge and agree that any Push Notifications are sent by You, not Apple, to the end-user of Your Application, Pass or Site, and You are solely liable and responsible for any data or content transmitted therein and for any such use of the APN. Further, You acknowledge and agree that any Local Notifications are sent by You, not Apple, to the end-user of Your Application, and You are solely liable and responsible for any data or content transmitted therein.
5.4 Apple makes no guarantees to You in relation to the availability or uptime of the APN and is not obligated to provide any maintenance, technical or other support for the APN.
5.5 Apple reserves the right to remove Your access to the APN, limit Your use of the APN, or revoke Your Push Application ID at any time in its sole discretion.
diagnostic information) about Your usage of the APN to aid Apple in improving the APN and other Apple products or services and to verify Your compliance with this Agreement; provided however that Apple will not access or disclose the content of any Push Notification unless Apple has a good faith belief that such access or disclosure is reasonably necessary to: (a) comply with legal process or request; (b) enforce the terms of this Agreement, including investigation of any potential violation hereof; (c) detect, prevent or otherwise address security, fraud or technical issues; or (d) protect the rights, property or safety of Apple, its developers, customers or the public as required or permitted by law.
6. Third Party Service Providers. You are permitted to employ or retain a third party (“Service Provider”) to assist You in accessing and using the APN in Your Applications, Passes or Sites, including, but not limited to, engaging any such Service Provider to maintain and administer Your Applications’ servers on Your behalf, provided any such Service Provider’s access to and use of the APN is only done on Your behalf in providing such services to You for Your Application, Your Pass and/or Your Sites and in accordance with these terms, and is subject to a binding written agreement between You and the Service Provider with terms at least as restrictive and protective of Apple as those set forth herein, including, but not limited to, confidentiality for pre-release versions of the APN and indemnity obligations to Apple. Any actions undertaken by any such Service Provider in relation to Your Push Notifications and/or arising out of this Agreement shall be deemed to have been taken by You, and You (in addition to the Service Provider) shall be responsible to Apple for all such actions (or any inactions), including but not limited to indemnifying Apple against any harm caused by the Service Provider acting on Your behalf. In the event of any actions or inactions that would constitute a violation of this Agreement or otherwise cause any harm, Apple reserves the right to require You to change Service Providers.
7. Additional Liability Disclaimer. APPLE SHALL NOT BE LIABLE FOR ANY DAMAGES OR LOSSES ARISING FROM ANY USE OF THE APN, INCLUDING ANY INTERRUPTIONS TO THE APN OR ANY USE OF NOTIFICATIONS, INCLUDING, BUT NOT LIMITED TO, ANY POWER OUTAGES, SYSTEM FAILURES, NETWORK ATTACKS, SCHEDULED OR UNSCHEDULED MAINTENANCE, OR OTHER INTERRUPTIONS. | 2019-04-22T00:09:03Z | http://docs.loopyloyalty.com/pricing-privacy-security-and-terms/terms-privacy-security/terms-and-conditions |
"A SECOND Must Read Letter"
· Egyptology and Museology at risk of losing some of their support?
· Why the BMFA and the BMA are keeping an obdurate silence on the Collection for fifty years? And, are they partners in crime?
· Why are some Egyptologists "pretty reluctant to talk?"
· What's the "problem" with the Mansoor Amarna sculptures?
and to read it -- and you should if you haven't--please click on "A MUST READ New Letter." To this day, no reply has been received from Mr. Able (which does not surprise me).
You know the story of the controversy which was shamefully created half a century ago by the Boston Museum of Fine Arts and the Brooklyn Museum of Art. That both museums were wrong in their estimation of the Mansoor Amarna sculptures is obvious since the scientific evidence states so unequivocally, and since both museums never answered our appeals for a re-evaluation of their opinion which is based on the BMFA's calamitous report denoting total scientific illiteracy. As you know, the two museums, the BMFA and the BMA received, not only all the reports vitiating the BMFA's, but also other publications concerning the Collection including articles and catalogues, and of course some correspondence from the Mansoors and other parties. It is definitely objectionable and unconscionable for the authorities of any educational institution to keep an obdurate silence in a scientific matter to conceal the scientific truth from the public!
The Mansoor Amarna Collection has been judged behind closed doors in the US, and in kangaroo courts in "Munich, Hamburg and Brussels."
The object of this letter is: 1) To raise public consciousness -- including yours and that of other Egyptologists and museologists -- about the fifty-year old injustice against the Mansoors, their Collection, and the public. 2) To prevent, as I wrote before in "The Truth...," other individuals from going through the same ordeal the Mansoors have been going through for half a century. 3) To ask if you'd like to meet with a couple of Mansoors and with some of your colleagues so you know more, and the whole TRUTH about the Collection. 4) Also to know whether Egyptologists -- in particular ARCE members -- are really, seriously and honestly interested to research Egyptology in a scholarly manner. To my mind, after the infamous "technical" report sold to the Mansoors in 1949 by the BMFA, the Mansoor Amarna Collection was shamefully and skimpily judged, sentenced and condemned behind closed doors by a few American Egyptologists, and the two above-named museums. And this has been spread out and magnified later through the years in such a dishonorable way, that other Egyptologists, even in foreign countries, took it upon themselves to judge and condemn it in kangaroo courts privately, and in particular in "Munich, Hamburg and Brussels." And today, around the world, many people think it is not ancient because one man, a Mr. William J. Young, the so-called "expert" of the BMFA, made an error, and the self-called "great museum of the world," also self-called "a citadel of the spirit of man," backed him up by refusing adamantly and obstinately to consider our appeals and to look into the matter.
For the last half century, not only "the two institutions combined to. 'jinx' negotiations between the Mansoors and other major interested museums" as quoted in the letter to Mr. Able, but also just as well between the Mansoors and collectors. The two museums, the BMFA and the BMA, have besmirched the Collection in such a dishonest and/or malicious manner that today, from far away, I hear lies, distortions of the truth, and rumors that make me sick to my stomach as they are unworthy of scholars. Shame on the two museums as, I believe, they degrade and hurt other American museums.
Dr. Fazzini, don't you think that the Mansoor Amarna Collection could be ancient?
1) If the Mansoors have been fighting for over fifty years to vindicate their Collection, don't you think that it could be ancient?
2) If several eminent scientists -- some of whom are internationally famous, like Iskander, Lucas, Silver, and Turner -- have stated, each in his own way and according to his field, that the Mansoor Amarna sculptures they examined scientifically are ancient, don't you think that they could be ancient?
3) If a most eminent British scientist, Dr. Harold J. Plenderleith. who believed strongly in the ancient age of the Mansoor Amarnas, and who was for years Keeper of the British Museum Laboratory, and then Director for the Centre for the Study of the Preservation and the Restoration of Cultural Property (UNESCO, ROME), stated "gratuitously" and openly his "conviction", not his opinion, that the Mansoor objects he has handled are ancient, don't you think that they could be ancient?
4) If Alfred Lucas, another most eminent British scholar, well-known to Egyptologists for his "Ancient Egyptian Materials and Industries, as well as for other works including his with Howard Carter on the find of Tut-Ankh-Amen, stated after examining scientifically twenty-seven Mansoor Amarnas that they are "genuine," don't you think that they could be ancient?
5) If the most eminent Dr. Zaki Iskander. scientist as well as Egyptologist, who was in charge of the Laboratory of the Cairo Museum, and then was Director for the Research Laboratory of the Department of Antiquities, and in 1974 became Honorary Member of ARCE, if, after examining or indeed scrutinizing scientifically sixty-six Mansoor Amarnas (please see "The Truth...) with another scientist Dr. Zahira Mustafa, and they both stated that "all points favour the genuineness of all objects under consideration," don't you think that they could be ancient?
6) If several eminent Egyptologists have also stated their positive opinion about the Mansoor Amarnas after they handled and examined them "in the flesh," don't you think that they could be ancient?
7) If the giant French Egyptologist, the Abbe' Etienne Drioton, who authored with Prof. Pierre du Bourget "Les pharaons å la conquete de l'art" Desclee de Brouwer, 1965-- an "ouvrage couronne' par l'academie francaise," and who wrote abundantly about many phases of Egyptology, and who handled and examined "in the flesh" about eighty pieces of the Mansoor Amarna Collection during his sixteen years as Director of the Egyptian Antiquities Service, stated, as well as Prof. du Bourget who also handled and examined about forty Amarnas, that they are "authentiques," don't you think that they could be ancient?
8) If another giant French Egyptologist, Mme Christiane Desroches Noblecourt, aka "la grande dame de l'egyptologie francaise," who is "highly qualified in the world of art and archaeology'" (Dr: Sarwat Okasha, Egyptian Minister of Culture and National Guidance, 1965), handled and examined "in the flesh" about forty Amarnas in 1986 and a few in earlier years, and declared them also "authentiques," don't you think that they could be ancient?
9) If Prof. Sergio Pernigotti. the most eminent Italian Egyptologist, who -- without solicitation -- wrote an important and interesting article about the Mansoor Amarna Collection in the April, 1994 issue of "ARCHEO," and started it by saying, "A great collection of Egyptian sculptures from the Amarna period," don't you think that it could be ancient? What to say when he further wrote, "There is no personage in the history of ancient Egypt that has fascinated modern scholars more than Akhenaton, and that has caused more differences of opinion among them on this historical episode than this individual." Should you read the "'ARCHEO" article, you'll also read a super statement, and I quote again: "Of this unprejudiced revolutionary art, the Mansur collection contains most beautiful examples." Wow! How outstandingly and scholarly expressed! "The Mansur collection contains most beautiful examples of the "unprejudiced revolutionary art" of Amarna! From reading the preceding statements, don't you think that it could be ancient?
10) If Dr. Fred H. Stross, the staunchest supporter of the Mansoor Amarna Collection for some fifty years, after studying and examining the Mansoor Amarnas" as well as analyzing the overwhelming scientific reports on the Collection, wrote through the years several articles -- some of them published in scientific publications, among them the most prestigious "Analytical Chemistry" (March1960), and whose"published account" as stated by Dr. Plenderleith is "entirely convincing," don't you think that they could be ancient?
11) If Prof. Dr. Reiner R. R. Protsch, (Palaeoanthropology + Archaeometry, J. W. Goethe-University, Frankfurt/Main, Germany), after examining eighteen objects of the Mansoor Amarna Collection, concluded superbly his report ("In Defence...," p.46) dated 12.1.1976 saying: "I can only reach the conclusion that if the Berlin and Kairo pieces are genuine, which could be solely due to different workmanship by different artists, those pieces of the Mansoor Collection are also genuine," don't you think that they could be ancient?
12) If, and I could go on with many "ifs," the most eminent Dr. Cyril Aldred, who was a leading authority on Amarna art during his time, "declined to discuss the Mansoor objects" as written in '"ARTnews'" in the summer of 1978 by Ms. Sylvia Hochfield, and further told her the following: "You can quote me as follows. If they are genuine, I am not ready to accept that they are great works of ancient Egyptian art." Considering in a really honest manner Aldred's famous "if", don't you think that they could be ancient?
or read it in my letter to Dr. Able. Read about the impression three scholars were left with after viewing some Mansoor Amarnas, about how they "marveled at Nefertiti's enigmatic 'Mona Lisa' smile captured in an extraordinarv work of genius..."
No one can really tell whether an artefact is ancient or a great work of art from photographs only. These may help, but definitely not convincingly and""or for certainty since they do not show details. You must have read that "the delicacy and finesse of the techniques whereby they [the Mansoor Amarnas] were wrought are incredible." And you do remember that the scholar who wrote that statement in 1975, Dr. Alfred Frankenstein, was a lecturer at Stanford University and one of the foremost art critics in the west coast during his time. You'll also remember that he viewed the Mansoor Amarna Collection during its First Exhibit at San Francisco State University. And if, and this "if" is very important and just came to my mind, San Francisco State sponsored a total of five Exhibits, three on University location (1975, 1986, 1991), one at the Brigham Young University in Provo (1975), Utah and the fifth at the Museo Della Civilta' Romana in Rome (1990), Italy, don't you think that the Mansoor Amarna Collection could be ancient?
Dr. Fazzini, before going any further, I'd like you to know why, at this time, I am showing no respect to the two concerned museums, as well as to the few Egyptologists who unconsciously, irresponsibly and perhaps maliciously besmirched the Collection, and are trying to destroy it. At first, the BMFA sold us a report that I would term "apiece of 'scientific' garbage." Then the BMA promoted that calamitous report. And a few Egyptologists were impressed and influenced by it, misleading in turn others through the years -- and I mean through fifty very long and devastating years. They all denied us a hearing, or better said, they denied us justice for half a century -- never considering our appeals. Whatever happened to due process?
For your information, my personal writing on the Internet addressed to Egyptologists and museologists, where I show no respect to some highly placed, is not really my style. Without being conceited, I am noted by all for my integrity and for being extremely polite, always showing great respect and admiration for scholars. I can appeal no more the way I used to. Just read the conclusions of "Je Cherche un Homme..." and "The Truth Is On The March...", and see for yourself how I've humbly appealed and with all due respect. I am fully aware that the way I've been doing it recently -- in the open and in the Internet since the end of 1999-- is not the right way to approach any institution or any scholar to get any appeal considered. But I cannot help it as my fervent appeals have been fruitless. I have to out my anger, revolt and devastation, and I believe the public will not like this whole farce/controversy which was created by the BMFA and the BMA. This is why I am also appealing to day to the public since I received no help from Egyptologists or museologists, and needless to say that I am gaining every day people from around the world who would like this matter solved in a just, honest and scholarly manner. Needless then to add that the harsh terms I am using are due to the devastation I am going through, and for your information, this devastation is too deep to measure. I would certainly apologize if the museums concerned would display fairness in this matter, but I believe they do not care about the public. All they care about are their fame, gain, prestige and reputation. It goes without saying that I am also revolted from the stand some Egyptologists have taken by keeping silent in this matter. Later, I'll give the reasons and why they are "pretty reluctant to talk." And of course, why museums are also keeping an obdurate silence on the controversy over the Collection.
Sir, with all due respect, the Mansoor Amarna Collection should be judged through its own merits. It is not because I talked about, or because I am suspecting and think that in this controversy, there definitely is injustice, and some have displayed prejudice, indifference and/or disdain, gossip and despicable rumors, unethical conduct, lack of ethics, decency and fair play, lack of due process, reckless disregard of the truth -- in particular the scientific truth, ignoble intentions and actions, deviation from the norms, intrigues, incompetence and lack of understanding Amarna art, scientific illiteracy, vandalism, intellectual dishonesty, lies, hypocrisy, malice, obstruction of justice, conspiracy, cover-up, corruption, and crime that the Mansoor Amarna Collection should be either ignored, treated cavalierly, and/or condemned. My character, writing, approach, or style should never, ever be considered in evaluating the matter.
It is not either because I am "uneducated," or impolite, or outspoken, or disrespectful, or perhaps emotional (particularly that this real condition was caused by all the calamities I mentioned previously and which happened through a fifty-year period), that some Egyptologists and museologists should keep silent about the Mansoor Collection. Whatever to be considered is the overwhelming scientific, stylistic and artistic evidence that appeared after 1949, i.e., after the ill-fated BMFA's report. Common sense should also be taken into consideration in evaluating the Exhibits I have listed: Who said what, and why? And, does it make sense?
For any scholar or institution concerned, to keep silent will never, ever solve the problem since many people believe that the Collection is ancient. And please correct me if I am wrong, I believe that today, among the majority of those who are silent and have read some about the Collection -- whether the scientific reports, the articles or reports by staunch supporters, or the Mansoors' writing including the Exhibits and the various statements by Egyptologists, there are many Egyptologists who simply do not know if these Amarna sculptures are genuine or not; and so, they are afraid to speak out. You, yourself, as a true scholar and a leader in Egyptology, and you wrote nicely about the "ART FROM THE AGE OF AKHENATEN," should take the initiative and start re-assessing and studying the matter, giving a good example to many who are afraid to do it. True scholars should never shy away from it. Now that I am bringing this matter openly to your personal attention, you should speak up, and please do it loud and clear for all Egyptologists to hear you, not only American, but also foreign, so they understand that it is about great time to give some attention to the Mansoor Amarna Collection --not only because the matter is long overdue, but in particular that there is, from any aspect you look at it, overwhelming evidence proving its authenticity.
I'd like now to name the dissident Egyptologists who commented in writing on the Mansoor Amarna sculptures, and enumerate and/or recapitulate some of their allegations, errors, or untrue and distorted "facts." The concerned dissident Egyptologists known to me are eight, and please keep always in mind that a few of them have not seen one single piece of the Collection, and the others have seen no more than three, except: Dr. Bernard V. Bothmer who, I assume, must have seen the nine Amarnas that were examined by the "expert" of the BMFA in 1947/49 since, at the time, he was attached to that same institution; and Dr. John D. Cooney, who examined many (25?) of the sculptures in the late forties, during a period of a few years. I shall be brief in the enumeration/recapitulation of some of their errors since I have written previously about them, and it is all inserted in my Web site. Please, do refer to it.
1) Dr. John D. Coonev, I believe, was indeed much interested in the Collection at first since, by his own admission, he had "seen most of these Amarna sculptures several times. both in Egypt and in this country," and ... "in a few cases," he has "had the sculptures" for examination at the Brooklyn Museum. (cf. "The Truth...," p.62). This implies that he wasn't sure from the first few times he viewed them whether they were ancient or not. Clearly, he was impressed and misled by the 1949 unscientifically written "Technical Examination" of the BMFA's "expert," Mr. William J. Young, and particularly by his nonsensical UV examination. Furthermore, the fact he wrote to Dr. Fred H. Stross that "if you were to supply photographs of the objects [to five Egyptologists he had named, cf. "The Truth..., p.64] a firm opinion would be forthcoming," clearly implies that from photographs Egyptologists could tell that the Amarna objects were not genuine. If so, how come he couldn't tell from seeing the objects in the flesh the first time? Please read also in "The Truth..." his erroneous statement concerning Parke-Bernet Galleries who, supposedly as he claimed, had "experiences with portions of this collection."
2) Prof. Dr. Hans Wolfgang Muller was prejudiced since from the beginning and from photographs only, he thought the sculptures were forgeries. Furthermore, he stated that the pink limestone of the objects was never used in ancient Egyptian art -- an unfounded statement accepted by no one, and refuted in the writing of Lucas and Iskander. Indeed, "pink limestone of different shades occurs plentifully in Egypt.. .and WAS USED occasionally"' (A. Lucas, Ancient Egyptian Materials and Industries, 3rd edition, 1948, p.472). Please read about Prof. Muller's erroneous assertions in "The Truth..."
3) Prof. Dr. Phillipe Derchain never saw any of the Mansoor Amarnas but photographs only, and was just impressed by the opinion of both Cooney and Muller, but was convinced they were right. Any way, his outrageous letter is inserted in " The Truth..." and is nothing but nonsense -- to say the least. It degrades Egyptology.
"Art and science must co-exist in today's museum. Science can derive essential data from mute objects and conserve or restore priceless works. The art of the forger is so sophisticated that only the most rigorous application of science can prove him false."
Doesn't the above mean that the "scientific" opinion of Mr. Young must prevail over the personal feeling or opinion of Dr. Bothmer? Doesn't it also mean that the "most rigorous application of science can prove" whether an artefact is authentic or not? Furthermore, two assertions he made are just not right, and they are mentioned in my book.
5) Dr. Peter Munro was prejudice since he told us once that the Mansoor Amarnas seemed to him from photographs to be fakes. He also believed that the Akhenaten bust he purchased for the Kestner-Museum, some thirty years ago on the advice of Dr. Hans Wolfgang Muller, had '"more technical appeal" than the Mansoor objects (please see Exhibit # 22). He had obtained, as he also told us, one good scientific report on his Akhenaten's bust. But how many excellent ones did the Mansoors obtain on their sculptures? Two? Three? Four or more? Weren't the Mansoor objects subjected to"the most rigorous application of science?" Also that his piece had a good "pedigree." Whoa! We're not dealing here with dogs or horses. If "pedigree" counts, how about the Mansoor Amarnas' "pedigree?" Originally the Mansoor Amarnas were purchased from Tawadros Girgis Ghoubrial, a gentleman with integrity second to none. (Please ask Mme. Noblecourt about Ghoubrial, as she knew him). But never to be dismissed or even questioned is the integrity of, and the fact that, M. A. Mansoor was the dealer who has been offering these Amarnas for sale. Mansoor's conviction that these Amarnas are genuine has been demonstrated openly: Didn't he sell several Amarnas to King Farouk? And a few of these sales were made five or six years before the report of Lucas appeared, and that means that he was convinced of their authenticity long before that report. Would anyone in business sell to his sovereign artefacts that could be doubtful? Didn't he sell his other antiques with an iron clad warranty? Do I have to bring again to everybody's attention what was stated in the 1952 auction sale in New York at the Parke- Bernet Galleries? Wasn't it clearly printed in the conclusion of the Catalogue's Foreword the following: "It may be added that Mr. Mansoor offers an unconditional guarantee of the genuineness of each and every article in the catalogue?" Have you ever seen any similar statement or warranty given on any ancient artefacts in any auction sale? Please tell me, have you?
Dr. Fazzini, kindly accept my apologies if I take more time by further writing about my father. To speak about his personality and/or character, integrity and/or honesty would truly be superfluous as these have never been in question. I'd like to just write a little about his knowledge in Egyptology. Indeed he was quite a connoisseur and a knowledgeable antiquary, and although he specialized and excelled in Egyptian antiquities, this line was also a hobby to him, and he enjoyed it very much. But how, and/or from whom or from what did he learn Egyptology? It's from: 1) reading extensively books on Egyptology; 2) visiting regularly and constantly the Egyptian Museum which was close-by, as well as the Egyptian sections of other world museums in his many trips abroad (particularly in England and France); 3) buying Egyptian antiquities from the Egyptian Museum as in the '20s and the "30s, the only store at the Museum belonged to the Egyptian Department of Antiquities, and they were selling in it some of the surplus they had like shawabtis, vases, fragments of artefacts, scarabs and various amulets, beads, etc.; 4) visiting the ancient sites, monuments, and of course some antique dealers in remote areas where, at the time, Egyptian antiquities were a way of life; 5) handling, buying and selling Egyptian antiquities for innumerable years; 6) the many Egyptologists who visited his store through the years, as, indeed, he learned a great deal from them. Do Egyptologists learn Egyptology from any other source? In a word, M.A. Mansoor enjoyed everything and everyone related to Egyptology, and his life revolved on the science you devoted your life to. It goes without adding that he was respected by all, in particular by all Egyptologists who met him. Therefore, his opinion, or rather his conviction about his Amarna Collection should, or perhaps must be taken into consideration.
Dr. Fazzini, did you read "The Truth...?" And in it, did you pay any attention to what a British historian, George Bilainkin, wrote about M. A. Mansoor and his "Shepheard's museum," and about his Amarna collection in his book "Cairo to Rivadh Diary" (London: Williams and Norgate Ltd., 1950, pp.152-153) Did you also notice that in "The Truth...," another British author, Nina Nelson, mentions the Mansoor Amarnas? It's in her book "Shepheard's Hotel," (London: Barrie and Rockliff, 1960, pp.5-6). Just what do these writings mean when they include the Mansoor Amarnas? They really mean that the Mansoor Amarna Collection was the pride of M. A. Mansoor, and that it constituted the most important ancient artefacts he had ever handled. And they also mean that the rare Collection is extremely important. These are facts that cannot be overlooked, and adding them up to the overwhelming scientific data obtained as well as the Exhibits or evidence produced, the sum total should never, ever be disregarded in the evaluation of the Mansoor Amarna Collection. Any scholar or intelligent individual would know that. At this time, please allow me to ask you once more: Dr. Fazzini, don't you think that the Mansoor Amarna Collection could be ancient?
6) Prof. Dr. Dietrich Wildung has been as silent as the Sphinx of Gizeh concerning questions asked to him by some scholars and by myself. His statements on the Mansoor Amarna Collection are either unconsciously, irresponsibly, or deliberately made, and I am truly at loss not knowing which? Whatever he wrote about the Collection makes no sense. Because of his high position, he thinks that people will believe him blindly even when he states untrue "facts." He doesn't realize that the truth will eventually emerge and prevail. Please read Exhibits 24/24D, and tell me why he answered none of my questions. Furthermore, how can anyone research or write a report on a collection of artefacts without seeing one single piece of it? Or without asking questions about it from the owners? Or without reading the scientific reports since I believe he didn't, as it would be foolish from his part to have stated what he did after reading the overwhelming reports.
Should we use plain common sense in evaluating what Dr. Wildung stated at first, that "The gifts of the Mansoor family to the Vatican Museum and to the Louvre were done by the Bank of America as advertisement during the offer for sale of further pieces," I would think that any "intelligent, open-minded individual" would know that B of A must have scrutinized everything concerning the Collection before handling the sale of some Mansoor Amarnas. Clearly, if B of A had an iota of doubt concerning the Collection, they would have never, ever associated their name with it. Kindly read his letters in "The Truth..." And as stated before in my previous writing, those gifts were NEVER made before or while the sale of the Amarnas was in progress. Was this a deliberate fabrication from his part to discourage people from looking into the matter?
7) Dr. A. M. Dodson wrote a letter to KMT editor (please read it in the last chapter of "The Truth...." Summary and Conclusions, Plus), in which he admits that even though he has "not seen the Mansoor collection 'in the flesh, 'and only some of the pieces in photographs...," he has "not the slightest doubt that all the [Mansoor] items I have seen illustrated over the years are fakes." You certainly remember that Aldred could not tell from phographs whether the Mansoor sculptures are genuine or not. Is Dr. Dodson more knowledgeable than Aldred was in the art of Amarna.
Just like for other Egyptologists, I believe that Dr. Dobson was influenced, impressed or misled by others.
8) Prof. Jean Claude Grenier wrote a statement on February 2, 1998 (Exhibit #33) saying that he is "totally convinced that the sculptures of the Mansoor collection are evidently modern and clumsy copies of well-known masterpieces discovered at the beginning of this century in Tel El Amarna, Karnak and Memphis, and currently part of the collections in Cairo, Berlin, and the Ashmolean Museum in Oxford (1).
"It is with firmness that I ask the authorities of the Vatican Museum not to exhibit at the Museo Gregoriano Egizio, the two sculptures offered to the Pope by the Mansoor family about 20 years ago.
"I am here siding only with the advice expressed, often and for a long time, by other Egyptologists whose 'Master' in archaeology and history of art of Pharaonic Egypt that was Bernardt von Bothmer."
As you can see from the previous sentence, his footnote (1), Prof. Grenier jumped with fanfare on the bandwagon a la "moutons de Panurge."
At the beginning of his letter, Prof. Grenier states that he was a "Consultant to the Vatican Museums for the Museo Gregoriano Egizio, and a former Curator of that Museum (1985-1989), This is all fine except: Just were was he for over twelve years when the two Mansoor Amarnas were on Exhibit at the Museo Gregoriano Egizio? Wasn't he a consultant and curator of the museum in 1986 when "In Defence of the Mansoor Amarna Collection" was written and published by Gianfranco Nolli and Andreina Leanza Becker Colonna? And the front cover of that publication represents the Pink Limestone Head of Queen Nefertiti donated to the Vatican Museum? And the two Mansoor Amarnas were subsequently exhibited at the Museum?
To my mind, the fact that he is stating that he is "siding only with the advice..." (his footnote) leaves me to understand that his knowledge of Amarna art is very weak --to say the least -- since he is relying on "other Egyptologists..., and on Bothmer." If I have cited details mentioning the episode of Prof. Grenier, it is to show that the Mansoor Amarna Collection has been outrageously besmirched and unjustly condemned by many who do not know much, if anything at all about Amarna art. Most of these "many" were or are prejudiced, impressed, misled, mesmerized, brainwashed, and/or indoctrinated by others or by some of their predecessors.
Besides the above-mentioned eight dissident Egyptologists, and I am unaware of any other who wrote negatively about the Collection, you can read in "The Truth..." (at its end, Summary and Conclusions, Plus) the flagrant nonsense written by Mr. (Ms.?) I. Seizek of Manchester, U.K., to KMT Editor. And I have also included in my book an Open Letter to Prof. E. L. Ertman of Akron, Ohio in response to a letter he addressed to KMT concerning a detail in a Mansoor Amarna relief that has "no parallels... in other representations from ancient Egypt." I strongly believe that the remark he made in his letter concerning the hardly noticeable detail in the sandal of Smenkhkare is not valid. In fact, it reinforces my conviction that the Mansoor Amarnas are ancient. The mere fact "that there are no parallels to this [Smenkhkara's] type of sandal-shape with a heel support in other representations from ancient Egypt," means to all that it has not been copied. Furthermore, in Fig. N 35 of the Mansoor Collection, a relief of a seated King (Akhnaten?, Tut Ankh Amen?, Smenkhkara?), the king is wearing sandals with NO support which rise vertically from the heel. In other words, the king is wearing sandals that are similar to most others worn by most ancient Egyptians. Could anyone, for the love of God, tell me then why would a "forger" create a minute detail in a sandal with "no parallel...," in particular when that detail does not exist in other representations? So, our "forger" was well aware of the shape of Smenkhkara's sandal. Furthermore, common sense would tell anyone that it was much easier to carve the regular sandal instead of one with the heel support.. .The sandal in Fig. N 35 is very clear in the 1986 Catalogue of the Collection, and on request, I'll gladly forward a copy to you with no charge (also to other Egyptologists while supplies last). Generally speaking, as you know, a forger copies and will never, ever create a minute detail (that would be hardly noticeable) like that in Smenkhkara's sandals. Needless to add then, as all Egyptologists know, that many ancient Egyptian representations do have uniqfle details with no known parallels, and I don't believe anyone would disagree on this point.
In my previous writing, there are two terms I'd like to clarify at this time, and they are: A) "curse;" B) "hunger strike."
A) If I have prayed God to "curse" some in my recent writing, it is because I want people and/or institutions, who display intellectual dishonesty when referring to the Mansoor Collection, to realize that they are also hurting the Mansoors and not only the Collection; consequently, they would be at great risk to be cursed. To be sure, I am not praying God to curse all those who innocently or foolishly gave a negative opinion on the Mansoor Amarnas. I do respect opinions when given with solid reasons or evidence substantiating them, but I do not respect opinions of people who, without knowing and without studying or examining what they are talking about, want only to appear, or to establish themselves as knowledgeable scholars/art stylists. And I cannot either respect opinions given by people I suspect to be malicious, and/or intellectually dishonest. And definitely not, opinions of charlatans who "counterfeit" truth. To make myself very clear, I pray God to curse and punish particularly the wicked and/or the malicious, those who counterfeit the truth, perhaps to cover-up for their own errors, or for a colleague or an institution, and would go as far as spreading ignoble rumors, or simply create lies. I am also praying Him to curse those who conspire against the Mansoors or the Collection, as well as those who deny us justice and condemn the Collection forcefully, with conviction, without seeing it, and in total disregard of the positive scientific evidence -- and as I just said, to impress people as they want to appear to be real art stylists/connoisseurs.
In Saint Anne's Catholic Church in Studio City, California, the following words are written in large, bold capital letters, on a frieze: "COME BLESSED OF MY FATHER, DEPART FROM ME ACCURSED ONES, INTO THE EVERLASTING FIRE..." I understand from this that there are some "accursed ones." Since we bless some people for their good acts, I believe it's okay to curse, or better, to pray God to curse those who are wicked, dishonest and cause harm to others.
B) Concerning the "hunger strike" I mentioned, it is not being considered at this time, but it is still an option left open if my writings give no result. As known, people who go on a hunger strike are generally afflicted with a severe injustice that is being ignored by the responsible of it. Dr. Fazzini, don't you think that there is flagrant injustice in the case of the Mansoor Amarna Collection? Once more, am I asking for the moon when I am simply asking the responsible to check out this matter?
1) The two museums are afraid of a law suit even though I reassured them on this point (cf. "In Defence...." p.47).
2) The two museums are afraid to lose their prestige in the eyes of their patrons and the public.
3) The two museums fear that if it would be established that they were wrong in their estimation of the Collection, not only will they lose the trust of their patrons and the public, but there would also be question marks hanging over many of their holdings. This will result in examinations and tests of many of their artefacts, and of course more spending time and more spending money. Furthermore, as it examines artefacts for others, the BMFA, in particular, may have to re-examine some or all of the artefacts it had authenticated (or condemned) to other museums, collectors, and dealers, because these would definitely doubt the BMFA's report given to them.
4) The two museums find it difficult to apologize for their errors, and cannot swallow their pride.
Did the BMFA sell the Mansoors their report in bad faith? I don't think so, but I could be wrong and it is quite a possibility. How come? As known, there's a certain jealousy among institutions, and some stride to be numero uno. It should be remembered that it was at the MET's suggestion that the BMFA examined some Mansoor Amarnas, and that the MET had a priority to select in the event the objects were declared genuine. Moreover, it is also quite possible that the BMFA had no funds available at the time to buy artefacts. So, it is quite possible that the BMFA had deliberately condemned the Mansoor Amarnas so no other museum would acquire any of them.
Concerning Egyptologists, why are some "pretty reluctant to talk?"
1) Their institutions forbid them to give any opinion on items they are not considering buying.
2) They are also afraid of a lawsuit -- even though a court of law cannot condemn an expert for giving an opinion. Although solid scientific opinion based on scientific data would prevail in a court of law over a personal opinion based on a personal feeling, a court cannot condemn anyone for giving an honest personal opinion.
3) They are afraid to make an error publicly. Many realize that the scientific evidence is so compelling that it would be wise to keep silent. Not to forget that the Amarna style is there, i.e. evident in the Collection since many eminent Egyptologists have declared it authentic after examining "in the flesh" many of the artefacts. Furthermore, others see in them, even from photographs, the Amarna style. If from photographs they look forgeries, Cyril Aldred would have definitely condemned them instead of saying "if they are genuine." Am I right or wrong?
4) They do not care about a scientific opinion contradicting their personal one, and they will not debate it.
5) They do not want to contradict any friendly colleague, in particular any in high position in a leading institution.
And now, what is the problem with the Mansoor Amarna Objects?
The main reason is, as written by Dr. Harold J. Plenderleith in his statement concerning the Mansoor Amarnas, "the collection has been considered to be 'too good to be true' by some..."
2) The quantity of the objects forming the Collection! I would like to point out that if all the gold objects found in the tomb of Tut Ankh Amen would have been found by a farmer and offered for sale by any dealer, some Egyptologists or experts would have been skeptical and reluctant to accept them as authentic as there has never been any find like it. I'd like to quote Prof. Philippe Derchain from his letter which is inserted in" The Truth..., p 99." He wrote to Mansoor the following: "The quantity of the monuments of your collection... prove, to my way of thinking, that yours can be nothing but fakes." Does any Egyptologist agree to it?
3) The William J. Young Report endorsed by the BMFA. The pink limestone in the Collection was unknown to the "expert" of the museum, who first declared that "it shows all the indications of being a made stone which could be fabricated in a great many ways." And this is certainly a big problem for the Mansoor Collection as a few Egyptologists seem to me to believe the veracity of the BMFA report. So long as that report is not revoked, there will always be a few who would believe in it.
4) No one knows exactly where the Collection was found. We were told by Tadros Ghoubrial, the dealer who sold them to my father, that a farmer found them in his land. Prof. Sami Gabra, who excavated for a number of years at Touna-El-Gebel, across the Nile from Tel-El-Amarna, heard that a prominent European -- "who lived in the last century and in this one," owned them and "kept them in a well-kept room." Others said different things about the provenance, but this should not cast any doubt on the Mansoor Amarnas. The fact remains that unless an artefact was excavated in official excavations, its provenance will always remain uncertain. And well over 50% of ancient Egyptian artefacts exhibited in museums around the world were not excavated officially; consequently, their provenance will remain unknown. Most were found by people in their lands, or in areas where there were no official excavations, and it was legal in Egypt for some fifty years to sell Egyptian antiquities.
Dr. Fazzini, there's really much more to the story, and some I would prefer to talk over with a few Egyptologists IF and I am stressing this "if;" from all I wrote concerning the Mansoor Amarna sculptures, there's only one iota of doubt in your mind that the Collection could be genuine, then it is your sacred duty as an honest person and a true scholar to check it out with the owners of the Collection. History will record this, and the world is watching what steps you, yourself as well as ARCE, will take in this matter. You owe it to your conscience and to Egyptology to give some attention to this matter.
As you can see, some people do not have a high opinion of Egyptologists because a few consider themselves infallible and above scientific evidence, and this hurts tremendously Egyptology. Personally, and in all honesty, I believe that many Egyptologists around the world, who would have read the scientific reports and/or one of the many articles by Dr. Fred H. Stross, would never pronounce themselves in a convincing, negative manner about the Mansoor Collection. What to say if you consider also that some probably believe in the overwhelming scientific evidence, but are afraid to speak up and/or to contradict the few authoritarian ones who control today's world of Egyptology? And one should never forget that many Egyptologists have been misled, influenced, brainwashed, mesmerized or indoctrinated by all the inaccuracies as well as the "counterfeited truth" created by a few.
Thank you very much for your letter and the three excellent photographs you have sent us. Mr. Dunham, the Curator of this Department, will be back from his trip to Egypt some time next week, and I am sure he will be interested to see them.
Assistant in the Dept. of Egyptian Art"
If I have any comment, I'd say that forgeries will never look "excellent" in photographs. And this letter stands as a testimony that even the BMFA's Egyptologists of the time were interested in the Mansoor's Amarnas as from photographs, the sculptures look ancient since the style is evident in them. I draw your kind attention to the date of that letter, May 22, 1947, which is prior to the date of the infamous letter dated October 27.1947 in which, as noted in "The Truth...," Mr. Young of the BMFA had declared that a pink limestone head from the Mansoor Amarna Collection was not ancient as he believed that the stone "appears not to be a natural limestone." Any way, there's more to it.
I did not have a chance to talk to Dr. [Hans Wolfgang) Muller about gathering together your Amarna pieces here, but will do so in the fall when he returns.
As you notice, at one time Dr. Fischer wanted to gather our Amarnas at the MET for Prof. H. W. Muller to examine and study them. Doesn't this, in fact, means that Dr. Fischer thought they could be genuine? Not to mention also that some most eminent Egyptologists, like the illustrious Dr. Geoffrey Martin who wrote to me twice concerning the Mansoor Amarnas, and who wanted to know more about the Mansoor Collection after hearing about it or seeing only photographs of some of the objects. And speaking of certain Mansoor Amarnas, Prof. Cl. Vandersleyen, who examined in the flesh about thirty of the objects, wrote: "The pieces are in general of very good quality, which shows not only great artistic skill, but especially an unexpected competence in all the details of the Amarna style." Drioton, Du Bourget, Noblecourt, and Pernigotti, to just name a few, thought the same. So, the Amarna style is clearly evident in the Mansoor sculptures, and I do not want to make this letter any longer than what it is at this time by naming other Egyptologists who examined some of the Mansoor Amarnas and accepted them as authentic.
As I wrote before, there's much more to the "Mansoor affair," and I prefer not to write again about it, and would not do it if there would be a meeting between the Mansoors and some Egyptologists. I believe there's a lack of communication and understanding among all concerned. Should you also favor such a meeting, please let me know and we'll meet at your convenience. The earlier, the better.
Dr. Fazzini, I doubt not for a minute that the case of the Mansoor Amarna Collection will be, in the near future Inchaallah, revised (?), re-assessed (?), re-examined (?), or investigated (?) in a just and scholarly manner. I don't believe that the "intellectually honest" Egyptologists would allow this Collection to be further besmirched without proper cause. This is a matter of conscience and is, and will remain a cause celebre in the world of Egyptology. And mark my words down, there will be, one day, in the not too distant future a TV DOCUMENTARY about the controversy, Amarna Art and the Collection. I wonder what will some Egyptologists say if; and when asked to justify their stand? Will they still be "pretty reluctant to talk" openly to the world?
At this time, I am praying God to bless all people --including Egyptologists, museologists and particularly any of the authorities of both the BMFA and the BMA -- who will start investigating this matter. I am also praying Him to punish and/or to curse all those who will deny the Mansoors justice by hampering or opposing a hearing or an investigation of the matter. I particularly pray Him to punish and/or curse the BMFA and the BMA, and any of their authorities for as long as they do not right the wrong they, or their predecessors have caused the Mansoors. I am repeating this so you, as well as all readers of this letter, would know that I am constantly praying God in that respect.
What's the bottom line in the controversy over the Mansoor Amarna Collection? And, with your kind permission, what's my opinion in this matter?
1) No one can tell from photographs only whether an Amarna object is real or not. This is pure nonsense.
2) Real scientific evidence should never, ever be discounted in evaluating Egyptian artefacts. This is pure common sense.
3) All the Mansoor Amarna objects that have been exhibited and illustrated in the catalogues of 1975, 1986, 1990 and 1991 "are genuine, original, authentic and ancient." This has been stated by Prof. Andreina Colonna in the 1975 Exhibit catalogue and in its conclusion, she wrote the following: "The Collection is exhibited, the scientific and aesthetic documentation printed. Any scholar with professional knowledge, unbiased approach, and ethical behavior who wishes to come forth with sound arguments well supported scientifically and/or stylistically is welcome." Did anyone ever contradict her, or write negatively to San Francisco State University except Prof. Dietrich Wildung? Did he ever give any reason why the Mansoor Amarnas are not genuine? Did he ever contest her comments on the Berlin bas-relief of the so-called Smenkhkara and Meritaten? Did you ever read his "infamous letter dated 14.5.85? Do you agree, or does any Egyptologist agree with him particularly on his reference to Bank of America? And why didn't he reply to Colonna's answer dated September 28, 1985? (The two letters are printed in "IN DEFENCE OF THE MANSOOR-AMARNA COLLECTION", pp 18 and 20-23, and most museums --including the BMA -- received a copy of the booklet). And why didn't Wildung answer other letters by scholars concerning this matter?
4) The ancient Egyptians copied each other's works. The few Egyptologists who do not believe this, should refer to Cyril AIdred's Akhenaten and Nefertiti. Viking Press, 1973 (re-the Brooklyn Exhibition, 1973). The two Mansoor reliefs, one representing the "Two Princesses," similar to the Ashmolean's famous painted pavement, and the other similar to the Berlin's Egyptian Museum, the "Stroll in the Garden," show different details unnoticed by anyone until 1986. Concerning the first, as written by Dr. Fred H. Stross to Dr. Noblecourt in 1991, "The corresponding Mansoor group show more realistic, truly engaging proportions." As for the second, Dr. Stross wrote : " the famous bas-relief of Smenkhkara and his queen in the Egyptian Museum in Berlin, displays what surely would have been called 'blunders' had they been exhibited by any of the Mansoor pieces: the strangely inconsistent left leg and the exaggerated necks, particularly of the queen are cases in point." So the Mansoors reliefs are similar, but different than those of Oxford and Berlin, and they are definitely original, and definitely not, as some claim, copies of the two museum's pieces. Can anyone, in particular, at the BMFA and/or the BMA deny this? (Please read Exhibit # 28, the letter of Dr. Stross to Mme. Noblecourt).
One thing a few Egyptologists do not understand or realize, or at least do not keep in mind, and mislead others with their lack of understanding Egyptian and particularly Amarna art, is that all ancient Egyptian works of art were hand-made and too many were made by different artists; some of these were skilled and others not that much, and some of the items were made by apprentices. Therefore, similar items will never be identical and may have different details, expressions, or what not. A few Egyptologists will condemn an object if it is not identical to one previously excavated, and a few others may condemn an object if it is identical to one previously excavated. Can it be possible both ways? Also, "to affirm that an object is 'copied' from another because it is similar to it, means that one does not take into account one of the fundamental characteristics of Egyptian art, where works, centuries apart, seem to have been done by the same artist" (Gianfranco Nolli). Furthermore, not all ancient Egyptian artefacts -- even from the Amarna Period -- are masterpieces. In a truly humble manner, I don't believe that you could call the famous bas-relief of Smenkhkara and Meritaten of Berlin a masterpiece, since the artist made some errors in it (cf. In Defence of the Mansoor-Amarna Collection. p.12). And some artefacts exhibited in museums around the world do not really look ancient, but indeed are. And vice versa.
5) It doesn't look nice at all for Egyptologists and museologists to keep silent any longer on the Mansoor Amarna controversy. It denotes fear, lack of courage and weakness from their part. Sooner or later the Mansoor Amarna controversy will be discussed openly by true scholars. The longer it takes, the more the disgrace to Egyptology and museology.
6) Sound scientific evidence -- which speaks volumes about the Mansoor Amarnas -- supported by stylistic and artistic evaluation, will defmitely prevail over any personal negative feeling or opinion. Can anyone contest it? Can anyone contest that "the art of the forger is so sophisticated that only the most rigorous application of science can prove him false?" In particular, can the BMFA contest it?
7) Every time there's new writing and revelation in the "Mansoor affair," there's a quantum leap in favor of the authenticity of the Collection. If I am writing in the open with solid overwhelming evidence in my hands, addressing myself to intelligent people in the four corners of the world, it means that I am pretty sure that what I am saying is true.
8) The report of Mr. William J. Young of the BMFA is just weak and bad, to say the least. It's enough for me that some most eminent scientists criticized it in harsh terms, and this has been stated so many times that it's demoralizing to realize that a museum, claiming to be "a citadel of the spirit of man," and "one of the great museum of the world," doesn't give a hoot about what's been written about it. And it's enough for me to have noticed that Mr. Young compared the sufface of a painting with the surface of objects not painted. And neither the museum nor Mr. Young defended their report. This BMFA "technical" report will bring shame and infamy to the museum until it is revoked. And needless to add once more that it utterly degrades American museums. First of all, the BMFA was paid for that report, and it owes us, and it's the least it can do, to check it out since we complained about it, and since we obtained other scientific reports by most eminent scientists who vitiated it. This is the way honest and decent institutions should go about it. Can anyone deny this? Second, other museums should never condone, promote or cover-up for the BMFA's and/or the BMA's errors -- as the Los Angeles County Museum has been doing so shamefully for some time. ( If and when I write again, I may speak about the infamous role the LACMA played, and is playing in this controversy). American museums should never close their eyes on this controversy. Clearly, the public will lose the trust they have in museums, and won't donate anymore as they did before. At stakes in the Mansoor controversy are the reputation and the future of our museums. Does Mr. Edward H. Able, Jr. or anyone else realize this and think differently?
9) Before you became Curator at the BMA, shameful rumors and gossip emanated from that museum. Also letters misleading the public. So long as these are not revoked, the BMA, just like the BMFA, will also live in shame and infamy. Am I wrong to think so?
10) From all what I've written, and there's more than what I have said and revealed that would bring more shame to the concerned, would it be wrong from my part to think that the BMFA and the BMA are partners in crime? Wouldn't I be right to think and say so if the two museums are reluctant to take steps to right the wrong they have created half a century ago? Truly, I see in this controversy a crime from their part as I firmly believe they are vandalizing the Collection, and vandalism is indeed a crime.
Sir, once more, I have not been asking for the moon. I have been asking the two institutions as well as true scholars in Egyptology to re-examine or re-assess the Collection and the whole matter on grounds of newly discovered evidence. Was this too much asking? And didn't I do it in a humble way for years and years? How many times do I have to repeat this so the responsible act in the right direction? To you as well as to each and every reader of this letter, I say: You and your conscience. And I really believe that all people concerned will have an obsession of the controversy on their mind until it is discussed openly and settled scholarly. No honest conscience will be spared, and none will be at peace until then.
I pray to hear from you very soon so I do not have to write again about this Collection.
Mr. Arnold L. Lehman, Director, Brooklyn Museum of Art, Brooklyn, N.Y.
Mr. Edward H. Able, Jr., President and CEO, The American Association of Museums, Washington, D.C. | 2019-04-23T06:58:07Z | http://www.amarnamansoor.com/secondletter.htm |
Yet another article—this one from Inside Higher Ed—is purportedly documenting the idea that MOOCs (massive open online courses) are dead—again. Which is news to those of us who are current relishing and being transformed in dynamically positive ways by George Couros’s #IMMOOC (the Innovator’s Mindset massive open online course). #IMMOOC and others are far from being the educational equivalent of the zombies inhabiting the mythical Land of the Living Dead Learning Opportunity; in the best of situations, they are dynamic learner-centric, inspiration-laden learning spaces where communities of learning can and do develop.
My experiences with #etmooc (the Educational Technology & Media MOOC) a few years ago provided numerous surprises that I’ve documented extensively on this blog and elsewhere: it showed me that online learning is every bit as productive and rewarding as the best of my onsite learning experiences have been. It helped me realize that creating seamless blended (onsite and online) learning spaces was far from a dreamy never-in-our-lifetimes possibility. It has helped me foster an appreciation for an extended use of blended learning among colleagues and other learners. And it has transformed the way I approach my own training-teaching-learning-doing endeavors.
One of the most unexpected and rewarding aspects was the realization that the communities of learning that develop in a course (onsite or online) could, as soon as they become learner-driven by those who see themselves as “co-conspirators” in the learning process rather than sponges striving for little more than a grade or a certificate of completion, take on a life that can and will continue far beyond the timeframe of any individual course or other learning opportunity. The #etmooc community continued actively online for more than three years; it was only when numerous key members of the community changed jobs or retired that the impetus community members had for continuing to meet vanished and the community became dormant.
Yet another unexpected and rewarding aspect came with the realization that the community of learning fostered by a well-designed and well-facilitated is not a closed community. Many of us in #etmooc found that our course-based explorations put us in touch with others who were not in the course—but who became interested in the #etmooc community—because of the two-way (and sometimes multi-way) face-to-face and online conversations that started in #etmooc, continued via social media tools and other resources, and further added to the development of the #etmooc community by drawing those non-#etmooc players into the land of #etmooc. For me, it was a wonderfully expansive example of what Frans Johansson so clearly described as “The Intersection” in The Medici Effect—the type of third place (e.g., a pub) where strangers briefly come together, exchange ideas (involving plenty of listening as well as talking), then disperse and help disseminate those ideas among others whose paths they cross long after the original pub discussions (or MOOC community of learning discussions) took place.
I saw this in action again last week in terms of the #IMMOOC community expanding beyond its tremendously permeable walls when I helped initiate a one-hour conversation about one particular aspect of The Innovator’s Mindset with colleagues who meet online to record sessions of Maurice Coleman’s podcast T is for Training. The conversation began with little more than participants having a link to an online resource—“8 Characteristics of the Innovator’s Mindset (Updated)”—that George Couros wrote and eventually incorporated into his book. We summarized the resource during the first few minutes of that episode of T is for Training, then used it as a springboard for a discussion exploring how it could be incorporated into the library training-learning programs that we help shape and facilitate.
The result was that, by the end of the hour, we were energized and ready to transforms the words from The Innovator’s Mindset into concrete actions designed to support innovative approaches to learning within the organizations we serve. We had also created a new learning object—the archived recording of the discussion—that contributes to the resources available to those exploring the topic—including those of us participating as co-conspirators in #IMMOOC. And we had created a new, ready-to-expand Intersection whereby the T is for Training community and the #IMMOOC community might meet and grow together. And the next possibility—that others who have not participated in T is for Training or #IMMOOC might now begin interacting with the fostering the positive actions both communities support—is a possibility ready to spring to life. Which is not, all things considered, a bad result coming from a form of learning that has just, once again, been declared dead and active only as one of an ever-increasing league of Zombies of Learning.
N.B. — This is the sixth in a series of posts inspired by Season 3 of #IMMOOC.
The last person who tried to convince me I should learn about something that, to me, held no value probably pushed me well down the road of transition from lecturing and advocating to facilitating, listening, and co-learning—something I remembered while attempting to answer the questions “What is one thing you used to do in education that you no longer do or believe in? Why the change?” as part of my participation in the third season of George Couros’s #IMMOOC (the Innovator’s Mindset massive open online course) last week.
She was a wonderful colleague, deeply immersed in and a strong proponent of using Twitter. And she seemed to believe, in her social media heart of hearts, that anyone not using Twitter was somehow leading a sadly diminished existence somewhat akin to living in the gray, war-devastated zone of a dystopian novel. So, while we sat side by side during two days of meetings, she attempted to convince me that I, too, should be using Twitter. She tried all sorts of things: telling me how great it was. (I wasn’t convinced.) Telling me what it could do for me. (Other social media tools were already doing those things for me.) Talking about who else was using it and how I could be in touch with them via Twitter. (I was already in touch with them in many other ways—including sitting with them in that room during the dynamic conversations we were having during that two-day period.) And finally—after nearly a day and a half of friendly cajoling and strong advocacy on behalf of Twitter, she asked a question that resonated: if I wanted a relatively quick answer to a question or situation that was stumping me, would I want quick and easy access to thousands of people who might be able to provide that answer? When she pointed out that Twitter could provide that level of access, she—and Twitter—had me.
What she also had was a learner who could see how the (minimal amount of) effort required to learn about and use Twitter might provide magnificent, appealing, productive results. So I was won over to Twitter. But not—as I realized at the time and now again as I recall that moment—by her zealous advocacy. It was the act of finally identifying an unfilled need and offering a proposed way to fill that need that finally led me to my long-standing engagement with colleagues through Twitter as one medium for that engagement.
I walked away from that experience with at least two valuable transformations: a willingness to adopt and embrace Twitter as one of many tools I use every day to work and play (including the weekly tweet chats that are an integral part of participating in #IMMOOC), and a visceral understanding of and appreciation for the power a trainer-teacher-learner-doer wields in fostering positive transformations through collaboration more than through wordy explanations and coercion.
It’s a lesson that actually embedded itself into the “Rethinking Social Media” course I have taught many times and will again be teaching in November 2017 for ALA Editions. I start, in the pre-course publicity and in the Week 1 course introduction, with an assurance that I won’t be requiring learners to become short- or long-term users of any of the social media tools we will be exploring. I also assure them that our online learning space is a guilt-free zone: they can spend as little or as much time as they care to spend with Twitter, Facebook, LinkedIn, or any of the other tools we will be studying as potential tools to further connect them with colleagues, library users, and anyone else they want to attempt to reach through those tools—as long as they reach the learning goals they (and their employers) have established for themselves. I also strive to keep the “lecture” part of the course as short and engaging as I possibly can, with frequent interruptions designed to stimulate responses and learner-centric activities.
Learners in my courses are, as much as they want to be, co-conspirators in the learning process. We learn from each other. We have as much fun as we can as they alter assignments to meet their own specific learning needs in ways that they can quickly apply within their own work (and other day-to-day) environments. And, in the best of situations, we stay in touch for weeks, months, or even years after a course formally ends. Because we understand that learning doesn’t have to be an endeavor with definitive starting and ending points.
We learn by exploring. Doing. Failing. And failing again and again. Until we finally reach the goals we have helped establish and that are meaningful to us, to our employers, and to those we ultimately serve. So I no longer deliver long lectures; my face-to-face and online presentations are designed to be as short as they can be; highly interactive; and responsive, in the moment, to the responses my co-conspirators offer. I try to keep my advocacy to a minimum. And we all seem to be a bit better off—and happier—as a result.
N.B. — This is the fifth in a series of posts inspired by Season 3 of #IMMOOC.
The new-to-me practice of reading intensively beyond the page as part of my participation in the third season of George Couros’s #IMMOOC (the Innovator’s Mindset massive open online course) struck gold again this morning.
Slowly making the transition from Week 2 to Week 3 of the six-week virtual voyage in this highly-interactive, rhizomatically-expanding course, I was rereading the section of The Innovator’s Mindset: Empower Learning, Unleash Talent, and Lead a Culture of Creativity detailing the eight characteristics of the Innovator’s Mindset and decided to spend a little more time with the fourth item, which centers around the idea that “Networks are crucial to innovation” (p. 52). Because I was following my newly-established habit of reading a print copy of a book while sitting in front of a laptop computer or with a mobile device handy so I would have immediate access to online resources, I made the leap from printed page to an online resource to learn more about a writer Couros mentioned in that section of his book. The result was that instead of having only a passing familiarity with Tom Kaneshige through Couros’s one-line reference to his work, I ended up reading the entire (short) piece Couros mentioned. Picked up a new, wonderfully evocative phrase (“Liquid Networks”) that connects with other familiar but differently-named ideas (including Ray Oldenburg’s concept of the third place as a place where ideas are exchanged, are nurtured, and thrive). And walked away with a much richer, deeper appreciation of Kaneshige’s work than I would have had if I had stayed within the confines of the print edition rather than making the piece by Kaneshige an integral part of the book I am re-reading.
I almost made it through the next paragraph without again weaving print with online content, but wanted to know more about Couros’s next reference—to Steven Anderson’s remark that “Alone we are smart, together we are brilliant.” With little more than Anderson’s name and the knowledge (from Couros’s writing) that Anderson is a “well-known educational speaker and writer,” I had little difficulty tracking him down with the keyword search “Steven Anderson educator.” And was completely surprised to find the full quote at the top of Anderson’s Twitter account. Which struck me as being a bit odd since the tweet was posted in September 2013 and it is October 2017 as I write these words.
“Could he,” I wondered, “be one of those people who rarely uses Twitter, so hasn’t been active since that four-year-old post was written?
“Did someone just finish retweeting it so it again appears at the top of his feed?
It only took a few seconds to see that there were more recent—much more recent—tweets there, including four posted within the last 24 hours…one of which was a link to a magnificent resource (a chart displaying “12 Principles of Modern Learning” and including short descriptions of the “principle,” along with a “reality” and an “opportunity” for each principle).
My head is spinning. I have, in less than 10 minutes, gone from being completely unfamiliar with Anderson’s work to seeing that he has a tremendously valuable (free) online resource (his Twitter feed) for any trainer-teacher-learner-doer. Exploring that resource in the most cursory of ways, yet walking away with another resource (the 12 Principles chart). And taking the natural step of following that Twitter feed so I will have Anderson’s wisdom and resources as additional elements of my own ever-expanding blended (onsite-online) learning environment.
There’s one final step to take before I return to re-reading that chapter of Couros’s book. I’m doing this for #IMMOOC as much as I’m doing it for myself, and a central element of participating in a connectivist MOOC like #IMMOOC is to connect with my course co-conspirators, so I use tinyurl.com to create a link to the tweet with the “12 Principles,” transfer it into a tweet I am composing, then add the #IMMOOC hashtag to the tweet and send the whole thing out into the Twitterverse so my MOOCmates, friends, and colleagues will have access to it. Learn from it. And retweet it so this latest personal learning moment grows rhizomatically and helps change our view of our world—one tweet at a time. Then return to The Innovator’s Mindset to finish my morning reading.
N.B. — This is the fourth in a series of posts inspired by Season 3 of #IMMOOC.
The experience of immersing myself in the third season of George Couros’s #IMMOOC (the Innovator’s Mindset massive open online course) continues to take me down intriguing, dynamic, transformative paths well worth exploring. This exploration of innovations in training-teaching-learning with co-conspirators from all over the world (connected via live, interactive YouTube presentations; a drinking-from-a-firehose rapid-fire Twitter feed and weekly tweet chats with a learner’s guide; interactions on a course Facebook page; cross-pollinating blog posts such as this one, where conversations continue; and probably myriad other learning threads I haven’t yet discovered) is high-energy, high-level learning at its best. And the very act of participating stimulates the types of innovation the course itself inspires us to explore.
Continuing to “read beyond the pages” of the printed copy I have of The Innovator’s Mindset, for example, I once again viscerally feel the difference, this afternoon, between the act of simply reading a line of text and the act of enriching our understanding of that line of text by going back to the source that inspired the thought behind that line. Reading Couros’s one-line summary of Simon Sinek’s talk “How Great Leaders Inspire Action” from TEDx Puget Sound in 2009 (in Chapter 1 of the book), I was left with the following perfectly serviceable idea: “…he [Sinek] explained that all great organizations start with their ‘why’ and then move toward the what and the how.” I had a vague idea of what that implied. I was perfectly ready to keep reading to see where Couros was going to take us. Then I remember how much I enjoyed taking advantage of the access online resources provide to deeper levels of reading/thinking/learning last week, during Week 1 of this six-week course. So I stop watching the clock and worrying about whether I have enough time to take another deep dive. Take the 18 minutes required to actually watch that TEDx talk. Re-view parts of it. Take notes on my laptop. Then transfer those notes into a rough draft of this piece-in-progress.
By the time I am finished, I have an ocean-deep appreciation for what Couros is trying to convey and, more importantly, what Sinek, in his TEDx talk, calls “The Golden Circle”: circles within circles (sort of like the circles within circles of learning in which I’m currently engaged). Sinek’s Golden Circle is comprised of a small, middle one having the word “why”; a middle circle containing the word “how”; and a larger outer circle holding the word “what.” He explains that by starting with the word “why” when we address someone with whom we are trying to make a connection, we are engaging deeply-embedded brained-based feelings and motivations that hook our intended audience. Make those audience members part of our dream. And invite them to actively be part of making that dream real.
By reading that line from Couros and then watching the video and then looking for related resources (including an online reproduction of The Golden Circle), I have gone from seeing an almost throw-away line of text morph—through this blended on-page/online approach to reading—into something that is becoming a memorable extended two-hour moment of transformative learning—simply because I give it the time and effort it so obviously deserves. And by the time I reach Sinek’s concluding lines in that TEDx presentation—“…those who lead, inspire us. Whether they are individuals or organizations, we follow those who lead not because we have to, but because we want to…”—I realize that simply having read that line without having heard the preceding 17 minutes of set up (as you are doing at this moment) would have meant the words had far less impact and stickiness than they had as a result of my mini-deep-dive into what Couros described in a subsection (“Have Schools Forgotten Their Why?”) in his chapter “What Innovation Is and Isn’t”—part of our reading for #IMMOOC this week.
As I finish reading the first chapter of The Innovator’s Mindset, I circle back to one of the opening sections and reread the words “We need to prepare kids for jobs that don’t exist”—a theme I’ve been exploring for many years, most recently with my colleague Jonathon Nalder at Future-U. I think about how this course is preparing me for actions I hadn’t even thought would exist for me as a result of becoming part of the #IMMOOC community. And I hope that if you have the time and inclination to do so, you, too, will create training-teaching-learning-doing opportunities you might not yet know exist—by reading the book and joining whatever part of the #IMMOOC community you can find as you read these words.
N.B. — This is the third in a series of posts inspired by Season 3 of #IMMOOC.
I’ve come to love the tweetchat format in training-teaching-learning-doing for all it inspires and provides. When sessions are well-facilitated (as the #IMMOOC session was), the online 140-character-per-tweet conversations (currently morphing into 280-character bursts) are extremely stimulating and well worth revisiting through online transcripts when their organizers archive them, as our #lrnchat colleagues do. Or when someone takes the time to create a transcript using Storify, as I occasionally do.
Seeing the original online snow-flurry-of-tweets-at-the-speed-of-light translated into the much-more digestible transcript format creates room for review. Reflection. And extended moments of inspired thinking. Sharing. And additional collaboration. The transcript provides a vessel to more effectively navigate the numerous rapids in the fast-flowing river of interconnected thoughts springing from a community engaged in what it does best: learning collaboratively. One notable result is immersion in a learning object (the transcript) created by the learners themselves/ourselves through the learning act of participating in the tweetchat. It makes the learning process expansive and grounded in a well-organized learner-driven process: we prepare for the tweetchat by reading something or watching a video; then we learn through the live tweetchat exchanges; then we create the learning object that immediately becomes part of the body of work available to us and to subsequent learners. And, in the best of all worlds, the live conversation continues asynchronously through additional tweets, through blog posts like this one, through our extended conversations on Facebook, and in numerous other ways limited only by the imaginations and willingness of the ever-expanding circle of participants or community of learners over a period of hours, days, weeks, months, or even years to continue learning together. It’s a concept meticulously described by Pekka Ihanainen and John Moravec in their paper about “Pointillist time”—what they refer to as “a new model for understanding time in pedagogical contexts”—and one I’ve been exploring in a wonderfully Pointillist time frame ever since I came across it while participating in another connectivist MOOC (#etmooc) four years ago.
There’s no denying this can be a messy process—one that requires a great deal of patience with ambiguity and a willingness to react innovatively to whatever comes our way. Even though there is a clearly-identified starting point (the tweetchat), the conversation soon extends rhizomatically through numerous very-loosely-connected platforms (as I mentioned earlier). This is clearly learning at an extremely high level, for highly-motivated learners who find pleasure in the struggle to innovatively respond to a constant stream of new challenges that have the potential to produce transformative results.
It becomes easier and more pleasurable, as I was reminded last night, with consistent practice—the same sort of practice an athlete or ballerina dancer engages in to develop muscles. (I felt, at the beginning of the session, as if my tweetchat muscles had become a bit flabby for lack of recent use.) And it helps to have learning facilitators who support us by offering guidance before, during, and after the formal learning event occurs. Most importantly, this level of learning and engagement in contemporary learning opportunities helps us become comfortable with the idea that the intentionally overblown and completely unrealistic challenge I posed at the beginning of this article (skimming 3,000 tweets in one hour) is part of a larger learning process—the process of realizing that in our dynamic, messy, rhizomatic onsite-online (blended) learning environments, success comes with accepting the fact that we don’t need to eat everything put before us on our learning plates. We have to willingly accept those portions we know we can digest within any given (Pointillist) moment, and ask for a virtual doggy bag to take the rest home with us for later consumption.
N.B. — This is the second in a series of posts inspired by Season 3 of #IMMOOC.
Reading as I prepare to dive into #IMMOOC (the Innovator’s Mindset massive open online course) Season 3, I’m once again coming face to face with how much continues to change in the way we train, teach, learn…and read. At the heart of this Connectivist MOOC is George Couros’s book The Innovator’s Mindset: Empower Learning, Unleash Talent, and Lead a Culture of Creativity, so the learning process begins with reading the Foreward and Introduction to the book. And therein lies a lesson very much worth experiencing and learning.
Reading those first few pages of the print edition of the book brings us in contact not only with Couros’s lovely writing voice, but also, not surprisingly, with a variety of additional resources through references to videos and a few other books. Nothing revolutionary there…until we decide to take advantage of absorbing the book’s contents by pursuing all available contents, including those videos. So, instead of doing what I’ve done in the past—reading the text and promising myself that I would go back to the “extended content” that includes those videos and other books, I’ve taken a more leisurely approach this time around. When Couros mentions Dan Brown’s “An Open Letter to Educators” video (accessible on YouTube from my laptop or mobile device), I take the 6.5 minutes required to watch the video, then return to the book with a far deeper, visceral, engaging understanding of the point Couros is making about the need for us to change our approach to teaching at the moment I’m reading these words. And when he includes a quote from 17-year-old TEDx presenter Kate Simonds’ “I’m Seventeen” talk, I bring her right into my learning space (and hear her plea for more collaboration among learners and learning facilitators) by watching the 13.5-minute video of that session before returning to the printed pages of the book that now, for me, includes that encounter with Simonds. And when Couros writes about how the O2 commercial “‘Be More Dog’ illustrates how a decision can lead to extreme and positive changes,” I follow the link and enjoy a good, thought-provoking moment courtesy of the access I have to that commercial via YouTube so it, too, is part of my reading experience today.
Couros writes, on p. 7, that the book “is all about how we can make the most of learning to create meaningful change and provide better opportunities in our schools.” From where I sit, I believe it also shows how our onsite-online “blended learning” landscape offers us training-teaching-learning-doing opportunities we have not had until recently. It also offers us the opportunity I’m documenting here to step back from our own learning, while engaged in the learning process, to see how something as simple as the act of reading continues to evolve and affect us in ways we are not adequately noting.
It’s a theme that also came up recently among those of us participating in the latest episode of Maurice Coleman’s wonderful biweekly library training-teaching-learning podcast T is for Training. We were engaged in a conversation about a resource (“Liberating Structures”) we had been exploring, and I temporarily stopped the conversation by noting how “blended” our session had become. The four of us on T is for Training were physically sitting in our offices on opposite coasts of the United States, learning from each other through that dynamic virtual learning space created by Maurice’s fabulous online-facilitation skills that fostered an online discussion that immediately became an archived learning object (created, in true Connectivist fashion, by the learners themselves) for anyone else who wanted to access it online as soon as it was posted. And our discussion—in a way that parallels what I’m experiencing as I read a blended printed-online version of The Innovator’s Mindset—seamlessly moved back and forth between the online resources we were reading-exploring-citing while carrying on that online discussion. This is the act of reading as part of an ever-expanding conversation that connects live and asynchronous participants in ways that bring new learning opportunities to us in an approach limited only by our imaginations, our online-search skills, and our access to the technology that puts those resources and participants into our reading-learning spaces.
My exploration of this expanded version of reading a book in preparation for the live IMMOOC session online today comes full circle as I come across citations from a few other books. There is one I have already read in print format, so Couros’s quote from the book rekindles the pleasure of recalling and re-using material already read and absorbed; it becomes woven into my current reading-learning experience and, in the process, gains new life. And as I come across a couple of other references, I quickly find excerpts online from those books so I can skim them and make them part of this immediate reading experience, if time allows, before the live session begins.
Couros, in referring to the “Be More Dog” video, tells us that “[t]he line from the video that resonates most with me is, ‘Look at the world today; it’s amazing.’” And as I prepare for the first live, online interactions I will have with my #IMMOOC colleagues later today, I’m struck—as I always am by first-rate learning experiences—by how amazing the changes in reading and learning continue to be…particularly with the added perspective of an innovator’s mindset.
N.B. — This is the first in a series of posts inspired by Season 3 of #IMMOOC.
And in the course of our conversation in a neighborhood coffee shop here in San Francisco’s Inner Sunset District, we realized how much our work has in common even though it starts from very different directions. In magic, as in learning, some of the most exciting moments are grounded in the unexpected and the engaging. In magic, as in learning, we arrive with expectations that, when set aside, produce something memorable. And in magic, as in learning, each revelation leaves us viewing the world a bit differently than we did before the transformative moment occurred.
It’s possible, DePass suggested, to overthink magic—just as it’s possible to overthink learning.
And that’s when my own DePassian moment of revelation magically occurred. While we are (understandably) asked to document results in learning to justify learning in business terms and I don’t at all disagree with the idea that learning can and often should produce something quantifiable, I believe we miss what DePass and his colleague would refer to the “art” of learning. Recognizing that learning can sometimes just be about learning actually paves the way to produce more concretely justifiable results.
Many of us involved in training-teaching-learning know the pathetically meager results our efforts produce. Resources including The Six Disciplines of Breakthrough Learning: How to Turn Training and Development into Business Results (second edition written by Calhoun Wick, Roy Pollock, and Andy Jefferson) document the obvious problems and offer an engaging roadmap to creating learning opportunities that produce positive results. But in our rush to produce those “metrics” that are meant to justify the time and expenditure invested in supporting workplace learning and performance, we forget the foundations for some of the most enduring and memorable school-based learning experiences we’ve had throughout our lives. Our best and most effective learning facilitators were those who reached us where we needed to be reached, inspired us with curiosity and appreciation for the value of learning, and helped shape us into the successful and avid learners we became in the course of becoming valuable in our workplaces and beyond.
When we learn how to learn and, more importantly, develop a deeply-rooted appreciation for the learning process itself, we are nurturing a skill that helps us become successful in the lifelong learning efforts that keep us competitive and sought-after in the challenging world we inhabit.
It’s hardly a new idea that magic and learning are inextricably interwoven. Illusionist Kevin Spencer’s wonderful paper “Hocus Focus: Evaluating the Academic and Functional Benefits of Integrating Magic Tricks in the Classroom” offers a fascinating exploration of the topic. A #lrnchat conversation form February 21, 2013 (transcript retrievable by using “magic in learning” as the search term in the site search window) produced an engaging hour-long online exploration of the topic. And Stephen Macknik and Susana Martinez-Conde, in their book Sleights of Mind, review the cognitive neuroscience—the neuromagic—of how our brains process the magic tricks we see.
Pulling all of this back to DePass and his burning wallet brings us back to one more of those unexpected moments where magic and learning overlap. He and I were meeting, at a the suggestion of a shared colleague, so he could learn more about the possibilities open to him if/when he and his wife decide to move from Denver, where they currently live, to San Francisco. Still relishing the sight of that burning wallet, I decided to extend the moment by telling one of the waiters—who had not seen the now-extinguished flames—that we wanted another glass of water as soon as he could bring one to us; before he could turn away, DePass demonstrated the immediate need by reopening and reigniting his wallet. As soon as the waiter stopped laughing, he asked DePass whether he was free this coming Saturday afternoon and explained that he wanted to explore the possibility of bringing a bit of close-up illusionism to his seven-year-old son’s birthday party that afternoon. And as if by magic, we all learned that DePass’s possibilities here in San Francisco were far better than even he might have imagined. | 2019-04-24T12:09:34Z | https://buildingcreativebridges.wordpress.com/tag/teaching/ |
Use genuine HP0-J47 dumps. intellect dump and popularity does finish not forget.
its miles a captains job to steer the ship just infatuation its miles a pilots process to steer the plane. This killexams.com can exist called my captain or my pilot as it advised me in to the birthright path before my HP0-J47 test and it become their directions and guidance that were given me to observe the birthright path that ultimately lead me to fulfillment. i used to exist very a success in my HP0-J47 check and it became a second of glory for which im able to for everything time sojourn obliged to this online study center.
Where should I search to win HP0-J47 actual test questions?
I attach together human beings for HP0-J47 exam problem and mention everything to your web site for similarly developed making ready. that is positively the fine website that offers tough exam material. this is the fine asset I understand of, as i appreciate been going to severa locales if no longer all, and i appreciate presumed that killexams.com Dumps for HP0-J47 is truely up to the mark. a all lot obliged killexams.com and the exam simulator.
Little gape at for HP0-J47 exam, notable success.
The material turned into commonly organized and efficient. I could without tons of a stretch consume into account severa answers and score a 97% marks after a 2-week preparation. tons route to you parents for first rate arrangement material and assisting me in passing the HP0-J47 exam. As a opemarks mother, I had limited time to invent my-self win equipped for the exam HP0-J47. Thusly, i was trying to find some genuine materials and the killexams.com dumps aide changed into the birthright selection.
i'm very satisfied with this HP0-J47 examine manual.
To win fulfillment in HP0-J47 exam. Humans agree with that a pupil appreciate to personal acute thoughts. Even though it is birthright but it isnt definitely actual because of the fact that along with the pupil, the educate or the teacher ought to besides exist nicely qualified and informed. I sense blessed that i was acquainted with this killexams.com in which I met such wonderful educators who taught me a route to transparent my HP0-J47 test and had been given me through them with a breeze. I thank them with the bottom of my coronary heart.
just depend on this HP0-J47 actual exam source.
I handed HP0-J47 exam. I assume HP0-J47 certification is not given enough publicity and PR, given that its virtually well however seems to exist below rated these days. That is why there arent many HP0-J47 braindumps to exist had with out price, so I had to buy this one. killexams.com package grew to eddy out to exist out to exist simply as super as I expected, and it gave me precisely what I needed to recognise, no deceptive or wrong information. Awesome enjoy, excessive five to the team of builders. You men rock.
How long prep is needed to bypass HP0-J47 exam?
i was approximately to give up exam HP0-J47 because I wasnt confident in whether or not i would pass or not. With just a week last I decided to exchange to killexams.com for my exam education. in no route concept that the subjects that I had constantly rush away from might exist so much fun to test; its smooth and quick manner of getting to the factors made my coaching lot less difficult. everything route to killexams.com , I by no means concept i would skip my exam but I did pass with flying colors.
Passing HP0-J47 exam was my first undergo but worthy Experience!
I am ranked very excessive among my class buddies on the listing of remarkable college college students however it handiest happened after I registered on this killexams.com for some exam assist. It modified into the towering ranking reading software in this killexams.com that helped me in becoming a member of the excessive ranks at the aspect of different super college students of my magnificence. The resources on this killexams.com are commendable because of the reality they may exist unique and extremely advantageous for instruction through HP0-J47, HP0-J47 dumps and HP0-J47 books. I am cheerful to install writing those phrases of appreciation due to the reality this killexams.com merits it. Thanks.
I necessity to bypass HP0-J47 exam, What necessity to I do?
HP0-J47 is the hardest exam I even appreciate ever stumble upon. I spent months analyzing for it, with everything authentic assets and everything one ought to locate - and failed it miserably. But I didnt surrender! A few months later, I introduced killexams.com to my training time table and stored practicing at the trying out engine and the actual exam questions they offer. I account that is precisely what helped me pass the second one time around! I wish I hadnt wasted the time and money on everything this needless stuff (their books arent horrific in widespread, but I believe they dont give you the top class exam education).
try out these actual HP0-J47 actual test questions.
i used to exist now not equipped to recognise the points nicely. anyhow resulting from my associate killexams.com Questions & answers who bailed me to depart this trepidation by route of fitting question and answers to allude; I effectively endeavored 87 questions in eighty mins and passed it. killexams.com in veracity turned out to exist my actualpartner. As and whilst the exam dates of HP0-J47 appreciate been forthcoming closer, i used to exist attending to exist fearfuland nervous. a lot liked killexams.com.
Stop worrying anymore for HP0-J47 test.
Learning for the HP0-J47 exam has been a tough going. With such a lot of puzzling subjects to cowl, killexams.com induced the self assurance for passing the exam by taking me through center questions about the situation. It paid off as I may want to pass the exam with a terrific skip percentage of eighty four%. A few of the questions came twisted, but the answers that matched from killexams.com helped me impress the birthright solutions.
windows domestic Server might stammer “home” within the product identify, however its low protection cost makes it an model option for tiny businesses. an easy, minute WHS can give comprehensive lower back up, faraway access, and centralized storage for a workgroup. despite the fact, businesses don’t necessity the entire fancy-pants media classes that Come on HPs MediaSmart line. Enter the HP StorageWorks X510Data Vault.
sadly the fees appear to exist a minute bit off. These servers are housed in the identical case exhaust the equal home windows home Server utility and appear to appreciate the equal hardware because the new MediaSmart line, but cost greater for less storage. as an example, at the flash the MSRP of the brand new MediaSmart EX495 is $699 and springs with 1.5TB of storage along with a bunch of software that consolidates media and may share it on the cyber web. however the HP StorageWorks X500 information Vault comes with 1TB of storage for the identical $699 rate and the entire further utility isn’t listed on the product web page.
advertising and marketing home windows domestic Server to companies makes loads of sense, but overcharging them is only incorrect. possibly HP expects the models to exist discounted sometime soon and a stronger MSRP makes earnings materialize even more suitable.
HP (NYSE:HPQ) nowadays brought options to aid tiny and midsize corporations (SMBs) better records security, maximize productiveness and prick company chance while enormously reducing expenses and energy use.
the brand new choices extend the HP total custody portfolio, which helps SMBs control, give protection to and develop their companies.
for max uptime, the HP StorageWorks X3000 community Storage methods towering Availability Bundles combine hardware and software into a Good shared storage solution for file and utility information. in keeping with the HP StorageWorks X3000 network Storage Gateways and HP StorageWorks MSA2000 G2 storage arrays, the bundles boost efficiency by immediately disposing of duplicate data, conserving in opposition t power failures and cutting back setup time by route of up to 50 %.(four) assisting to preserve charges in investigate, the solution does not require added license charges for networking protocols, file replication or photo capabilities.
stronger administrative productivity with the HP ProCurve 1810G swap series. This sequence gives cost effectual gigabit connectivity that can exist configured and maintained with out a immense or really Good personnel. It present valued clientele elastic deployment alternate options equivalent to a fan-less design for silent operation, mounting alternatives for effortless deployment in any space and community safety capabilities for insurance route against denial-of-service assaults. The eight-port mannequin additionally facets a power-over-Ethernet alternative for connectivity in locations devoid of quite simply accessible energy sources. The collection is besides supported by route of the ProCurve Lifetime assurance(5) to aid purchasers improved manage their overall networking charges by using providing value and altenative for his or her company functions.
The HP color LaserJet professional CP5220 printer series, which is available for purchase in Asia and Europe, offers terrific print nice and community efficiency, making it simple for tiny agencies to affordably market themselves. it's the first printer to proffer HP Auto-Off know-how, an trade-leading expertise that intelligently senses when there isn't any print recreation and immediately adjusts the power settings. This latest addition to the HP LaserJet household builds on 25 years of leadership in innovation, satisfactory, performance and dependability, and sets the gold tolerable in company printing.
To serve SMBs comfortably opt for the greatest HP LaserJet printing system for his or her business, HP announced new sub-branding. valued clientele can pick from a comprehensive line of HP LaserJet “expert” printers that give skilled and reasonably priced effects, whereas bigger companies can select from the HP LaserJet “business” portfolio.
To assist tiny companies greater unite with their consumers, HP released a new edition of its MarketSplash by HP net provider. HP printer and notebook purchasers in the united states can now download and edit a all bunch of professional-fine brochure, flyer and company card templates at no permeate and print them in-house. starting subsequent month, MarketSplash will proffer a print success option that allows consumers to opt for a local print carrier provider.
HP and Yahoo! appreciate teamed to aid tiny businesses in the united states easily and affordably create a cohesive manufacturer identity throughout distinctive on-line and offline advertising capabilities. during the HP creative Studio, the HP complete custody site and the Yahoo! tiny enterprise portal, consumers can receive particular presents including internet internet hosting expenditures for as low as $7.forty six a month(2) and access custom design capabilities from Logoworks through HP to create knowledgeable-searching web site.
To serve SMBs exploit fees and invent paying for effortless, HP presents bendy financing options to install subsequent-era HP know-how and features through HP fiscal capabilities, the business’s leasing and lifecycle asset administration capabilities subsidiary. From now through Oct. 31, 2009, SMBs can consume potential of the economic healing lease program, which presents a 36-month route with fastened cost buy alternate options.
From now except Dec. 31, 2009, SMBs can obtain up to $1,000 money again when buying a new HP LaserJet, Officejet pro or Scanjet and recycling an ancient printer throughout the HP trade-in and store software. in the closing six months, HP has generated virtually $16 million in earnings and sold greater than 17,000 units during the program.
licensed solutions for the channel that encompass companion working towards, product sourcing and technical assist for opt for impartial application vendor solutions from HP’s options enterprise accomplice program.
An undocumented administrative account with a default password turned into discovered within the HP StorageWorks P2000 G3 MSA network storage answer, placing everything such gadgets susceptible to unauthorized entry.
This mannequin continually comes with an account referred to as "manipulate" (password "!control") for consumers to personalize and use.
despite the fact, it became discovered that a default account known as "admin" with password "!admin" besides exists on the device and, according to the H security, it does not appear within the consumer manager and cannot exist deleted.
The "admin" consumer has permissions to regulate the device's settings or the working device and considering that most people don't know of its presence, it puts devices in danger.
HP tested the vicissitude and pointed out that this carrier administrator account "has imperative privileges that are used through inside strategies running on the array."
fortunately, it feels infatuation the password will besides exist modified. "If the 'admin' account raises a security concern, [it's] password may besides exist modified by using the Command Line Interface (CLI), through telnet or SSH, to trade the default password," the enterprise wrote in an advisory.
this is fairly straightforward and involves issuing the "set password" command after logging in as "admin" by the exhaust of the command line.
"The result of embedding hardcoded passwords, as established in this most recent HP storage apparatus illustration, is not simplest average, however extraordinarily harmful," Shlomi Dinoor, vice chairman of rising technologies at id management options issuer Cyber-Ark utility, told SecurityWeek.
"So too is the rehearse of trying to ship systems with 'hidden' admin clients, however during this age of openness, nothing is hidden, and carriers should understand that," he delivered.
One instance of how issues can Go incorrect when enforcing default hidden passwords is the infamous Stuxnet industrial espionage worm, which makes exhaust of a hardcoded access code to read counsel from the database of Siemens WinCC SCADA systems.
PALO ALTO, Calif., and REDMOND, Wash., Jan. 21, 2003 — HP (NYSE:HPQ) and Microsoft Corp. (Nasdaq:MSFT) today broadened their worldwide relationship with a strategic initiative to extend the marketplace for HP StorageWorks and Microsoft® windows®Powered NAS (network connected storage) solutions.
The HP StorageWorks and home windows Powered NAS initiative is designed to boost HP and Microsoft’s presence in the world NAS marketplace, which, according to Gartner Dataquest1, is $1.eight billion. together, the organizations are offering items and options that allow server and storage consolidation, as well as reduce the entire permeate of ownership for storage.
one of the vital first components of the initiative could exist a North American highway panoply surge in March to demonstrate joint architecture and options. The street exhibit will achieve more than three,500 consumers and channel partners by the exhaust of live activities and simultaneous Webcasts.
The tour will consist of here cities: Atlanta, Boston, Chicago, Houston, los angeles, Miami, immense apple, San Francisco, Toronto and Washington. comprehensive time table tips is available at http://www.winnetmag.com/roadshows/nas.
global consumer earnings for server consolidation is expected to grow from $5.2 billion in 2003 to $eight.5 billion by route of 2006, based on trade research solid IDC.three according to traffic estimates, the server consolidation opportunity is big, with about 1.2 million historic home windows NT®and competitor file and print servers and 400,000 exchange 5.5 and older messaging servers installed through HP customers worldwide.
HP StorageWorks and windows Powered NAS solutions are optimized, function-concentrated file and statistics servers in accordance with Microsoft home windows technology designed for prime reliability, availability and ease of administration. HP offers a complete latitude of NAS options based on windows Powered NAS and delivers them as a piece of a total storage and server consolidation strategy to businesses of any measurement.
In July 2000, HP grew to become the primary seller to co-develop and carry a Microsoft windows Powered NAS solution to market. in addition, HP changed into besides the primary traffic to recognize NAS and SAN applied sciences as complementary options choicest architected as a separate storage reply — NAS/SAN fusion. These options provide file and application server consolidation to traffic statistics facilities by bringing together NAS and SAN technologies in a scalable, manageable accustomed pool of storage that provides both file- and block-degree access.
Consolidating servers on HP StorageWorks and home windows Powered NAS products gives a lessen cost of possession with higher availability and scalability. shoppers appreciate the benefits of superior aspects such as snapshot and advanced storage management, complete integration with the lively directory service, combined with low per-gigabyte storage can charge, gauge community plug-and-play deployment, clustering and replication assist.
As piece of their initiative, HP and Microsoft will conduct joint sales and advertising actions, together with income practicing and technical seminars. The businesses will achieve traffic statistics center and far off office clients via direct income, and SMB/departmental shoppers predominantly via channel companions. practising, revenue tools and advertising and marketing substances developed for the HP StorageWorks and home windows Powered NAS initiative, including migration blueprints, case studies and collateral, will exist made attainable to HP and Microsoft channel partners, distributors and apparatus integrators.
extra suggestions on HP StorageWorks NAS and NAS/SAN fusion options is accessible at http://www.hp.com/go/windowspowerednas/.
founded in 1975, Microsoft (Nasdaq“MSFT”) is the international chief in software, capabilities and internet technologies for personal and enterprise computing. The company presents a immense ambit of items and services designed to empower individuals via outstanding software — any time, anywhere and on any equipment.
HP is a number one world issuer of items, technologies, solutions and capabilities to consumers and groups. The business’s choices span IT infrastructure, very own computing and access contraptions, world features and imaging and printing. HP accomplished its merger transaction involving Compaq desktop organisation on might besides 3, 2002. extra guidance about HP is accessible at http://www.hp.com/.
1 Gartner Dataquest,“community-connected Storage Market Forecast: 2001-2006,”June 2002.
2 IDC appliance Server Tracker for Q3 2002, released December 2002.
3 IDC, commercial enterprise Server Fundamentals: Server and Storage Consolidation Market Forecast and evaluation, 2001-2006, July 2002.
This advice release includes forward-looking statements that accommodate risks and uncertainties, in addition to assumptions that, if they on no account materialize or prove wrong, may judgement the results of HP and its consolidated subsidiaries to vary materially from these expressed or implied with the aid of such ahead-searching statements. everything statements apart from statements of historic veracity are statements that may exist deemed ahead-searching statements, together with any projections of salary, revenues, or different monetary items; any statements of the plans, recommendations, and pursuits of administration for future operations; any statements concerning proposed new functions or trends; any statements related to future fiscal conditions or efficiency; statements of perception and any observation of assumptions underlying any of the foregoing. The risks, uncertainties and assumptions said above encompass worker administration considerations; the timely construction, production and acceptance of features and their office units; the challenge of managing asset tiers, together with inventory; the problem of conserving rate boom at modest stages whereas increasing revenues; and other hazards that are described on occasion in HP’s Securities and trade commission reviews, together with but not constrained to HP’s quarterly record on benign 10-Q for the quarter ended July 31, 2002 and experiences filed subsequent to HP’s annual document on benign 10-k, as amended on January 30, 2002, for the fiscal 12 months ended October 31, 2001. HP assumes no duty to update these ahead-looking statements.
Microsoft, windows, lively directory and windows NT are both logos or registered emblems of Microsoft Corp within the u.s. and/or other nations. The names of actual organizations and products mentioned herein may exist the trademarks of their respective house owners.
note to editors: if you appreciate an interest in viewing additional information on Microsoft, gratify contend with the Microsoft net page at http://www.microsoft.com/presspass/ on Microsoft’s corporate guidance pages. internet hyperlinks, mobilephone numbers and titles appreciate been apropos at time of booklet, however might besides in view that appreciate modified. For further tips, journalists and analysts may additionally contact Microsoft’s rapid Response crew or different applicable contacts listed at http://www.microsoft.com/presspass/contactpr.asp.
While it is very arduous job to pick trustworthy certification questions / answers resources with respect to review, reputation and validity because people win ripoff due to choosing wrong service. Killexams.com invent it sure to serve its clients best to its resources with respect to exam dumps update and validity. Most of other's ripoff report complaint clients Come to us for the brain dumps and pass their exams happily and easily. They never compromise on their review, reputation and quality because killexams review, killexams reputation and killexams client aplomb is essential to us. Specially they consume custody of killexams.com review, killexams.com reputation, killexams.com ripoff report complaint, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. If you remark any fake report posted by their competitors with the cognomen killexams ripoff report complaint internet, killexams.com ripoff report, killexams.com scam, killexams.com complaint or something infatuation this, just preserve in intellect that there are always noxious people damaging reputation of Good services due to their benefits. There are thousands of satisfied customers that pass their exams using killexams.com brain dumps, killexams PDF questions, killexams rehearse questions, killexams exam simulator. Visit Killexams.com, their sample questions and sample brain dumps, their exam simulator and you will definitely know that killexams.com is the best brain dumps site.
Never miss these HP0-J47 questions you Go for test.
killexams.com give latest and refreshed Pass4sure rehearse Test with Actual Test Questions for new syllabus of HP HP0-J47 Exam. rehearse their actual Questions better your insight and pass your exam with towering Marks. They guarantee your accomplishment in the Test Center, covering each one of the subjects of exam and enhance your scholarship of the HP0-J47 exam. Pass with no uncertainty with their amend questions.
We appreciate their experts working continuously for the collection of actual exam questions of HP0-J47. everything the pass4sure questions and answers of HP0-J47 collected by their team are reviewed and updated by their HP certified team. They remain connected to the candidates appeared in the HP0-J47 test to win their reviews about the HP0-J47 test, they collect HP0-J47 exam tips and tricks, their undergo about the techniques used in the actual HP0-J47 exam, the mistakes they done in the actual test and then better their material accordingly. Once you Go through their pass4sure questions and answers, you will feel confident about everything the topics of test and feel that your scholarship has been greatly improved. These pass4sure questions and answers are not just rehearse questions, these are actual exam questions and answers that are enough to pass the HP0-J47 exam at first attempt.
HP certifications are highly required across IT organizations. HR managers prefer candidates who not only appreciate an understanding of the topic, but having completed certification exams in the subject. everything the HP certifications provided on Pass4sure are accepted worldwide.
Are you looking for pass4sure actual exams questions and answers for the Managing StorageWorks P9000 Solutions exam? They are here to provide you one most updated and quality sources that is killexams.com. They appreciate compiled a database of questions from actual exams in order to let you prepare and pass HP0-J47 exam on the first attempt. everything training materials on the killexams.com site are up to date and verified by industry experts.
killexams.com is the ultimate preparation source for passing the HP HP0-J47 exam. They appreciate carefully complied and assembled actual exam questions and answers, which are updated with the identical frequency as actual exam is updated, and reviewed by industry experts. Their HP certified experts from multiple organizations are talented and qualified / certified individuals who appreciate reviewed each question and reply and explanation section in order to serve you understand the concept and pass the HP exam. The best route to prepare HP0-J47 exam is not reading a text book, but taking rehearse actual questions and understanding the amend answers. rehearse questions serve prepare you for not only the concepts, but besides the route in which questions and reply options are presented during the actual exam.
killexams provide extremely user friendly access to killexams.com products. The focus of the website is to provide accurate, updated, and to the point material to serve you study and pass the HP0-J47 exam. You can quickly win the actual questions and reply database. The site is mobile friendly to allow study anywhere, as long as you appreciate internet connection. You can just load the PDF in mobile and study anywhere.
Our Exam databases are regularly updated throughout the year to include the latest actual questions and answers from the HP HP0-J47 exam. Having Accurate, authentic and current actual exam questions, you will pass your exam on the first try!
We are doing struggle to providing you with accurate Managing StorageWorks P9000 Solutions exam questions & answers, along with explanations. They invent the value of your time and money, that is why every question and reply on killexams.com has been verified by HP certified experts. They are highly qualified and certified individuals, who appreciate many years of professional undergo related to the HP exams.
Unlike many other exam prep websites, killexams.com provides not only updated actual HP HP0-J47 exam questions, but besides detailed answers, explanations and diagrams. This is essential to serve the candidate not only understand the amend answer, but besides details about the options that were incorrect.
Windows Home Server might stammer “home” in the product name, but its low maintenance cost makes it an model altenative for tiny businesses. A simple, minute WHS can provide comprehensive back up, remote access, and centralized storage for a workgroup. However, businesses don’t necessity everything the fancy-pants media programs that Come on HPs MediaSmart line. Enter the HP StorageWorks X510Data Vault.
Unfortunately the prices appear a bit off. These servers are housed in the identical case exhaust the identical Windows Home Server software and appear to appreciate the identical hardware as the new MediaSmart line, but cost more for less storage. For instance, birthright now the MSRP of the new MediaSmart EX495 is $699 and comes with 1.5TB of storage along with a bunch of software that consolidates media and can share it on the Internet. But the HP StorageWorks X500 Data Vault comes with 1TB of storage for the identical $699 charge and everything the extra software isn’t listed on the product page.
Marketing Windows Home Server to businesses makes a lot of sense, but overcharging them is just wrong. Maybe HP expects the models to exist discounted sometime soon and a higher MSRP makes sales gape even better.
HP (NYSE:HPQ) today introduced solutions to serve tiny and midsize businesses (SMBs) better data security, maximize productivity and minimize traffic risk while significantly reducing costs and energy use.
For maximum uptime, the HP StorageWorks X3000 Network Storage Systems towering Availability Bundles combine hardware and software into an efficient shared storage solution for file and application data. Based on the HP StorageWorks X3000 Network Storage Gateways and HP StorageWorks MSA2000 G2 storage arrays, the bundles extend efficiency by automatically eliminating duplicate files, protecting against drive failures and reducing setup time by up to 50 percent.(4) Helping to preserve costs in check, the solution does not require extra license fees for networking protocols, file replication or snapshot capabilities.
Improved administrative productivity with the HP ProCurve 1810G Switch Series. This train provides affordable gigabit connectivity that can exist configured and maintained without a big or specialized staff. It proffer customers elastic deployment options such as a fan-less design for silent operation, mounting options for simple deployment in any location and network security capabilities for protection against denial-of-service attacks. The eight-port model besides features a Power-over-Ethernet option for connectivity in locations without readily available power sources. The train besides is supported by the ProCurve Lifetime Warranty(5) to serve customers better manage their overall networking expenses by providing value and altenative for their traffic applications.
The HP Color LaserJet Professional CP5220 printer series, which is available for purchase in Asia and Europe, offers exceptional print quality and network performance, making it simple for tiny businesses to affordably market themselves. It is the first printer to proffer HP Auto-Off Technology, an industry-leading technology that intelligently senses when there is no print activity and automatically adjusts the power settings. This latest addition to the HP LaserJet family builds on 25 years of leadership in innovation, quality, performance and dependability, and sets the gold gauge in traffic printing.
To serve SMBs easily select the best HP LaserJet printing system for their business, HP announced new sub-branding. Customers can pick from a comprehensive line of HP LaserJet “Professional” printers that provide professional and cost-effective results, while larger organizations can select from the HP LaserJet “Enterprise” portfolio.
To serve tiny businesses better connect with their customers, HP released a new version of its MarketSplash by HP web service. HP printer and PC customers in the United States can now download and edit hundreds of professional-quality brochure, flyer and traffic card templates at no permeate and print them in-house. surge next month, MarketSplash will proffer a print fulfillment option that enables customers to select a local print service provider.
HP and Yahoo! appreciate teamed to serve tiny businesses in the United States easily and affordably create a cohesive brand identity across different online and offline marketing functions. Through the HP Creative Studio, the HP Total custody site and the Yahoo! tiny traffic portal, customers can receive special offers including web hosting prices for as low as $7.46 a month(2) and access custom design services from Logoworks by HP to create a professional-looking website.
To serve SMBs manage costs and invent purchasing easy, HP offers elastic financing solutions to deploy next-generation HP technology and services through HP fiscal Services, the company’s leasing and lifecycle asset management services subsidiary. From now through Oct. 31, 2009, SMBs can consume edge of the Economic Recovery Lease program, which offers a 36-month route with fixed charge purchase options.
From now until Dec. 31, 2009, SMBs can receive up to $1,000 cash back when purchasing a new HP LaserJet, Officejet Pro or Scanjet and recycling an customary printer through the HP Trade-in and save Program. Within the last six months, HP has generated nearly $16 million in revenue and sold more than 17,000 units through the program.
Certified solutions for the channel that include ally training, product sourcing and technical advocate for select independent software vendor solutions from HP’s Solutions traffic ally Program.
COSTA MESA, Calif., Oct. 5, 2004 (PRIMEZONE) -- Emulex Corporation (NYSE:ELX), the world leader in Fibre Channel host bus adapters (HBAs) and embedded storage switches, announced today that the Emulex Fibre Channel HBA Storport miniport driver has been qualified for connectivity within HP servers and HP StorageWorks systems deployed in storage locality network (SAN) environments running Microsoft Windows Server 2003.
Released with the Windows Server 2003 platform, Storport is a new driver model designed to match the towering performance capabilities of SANs and hardware-based disk arrays. Utilizing the Emulex Storport miniport driver, which was designed from the ground-up to deliver the complete ambit of Storport features for Windows-based HP servers and StorageWorks SAN solutions, improves the reliability, serviceability and manageability of heterogeneous SAN environments.
"HP continues to deploy solutions for the rapidly growing enterprise and mid-range storage market segments and exhaust of the new Emulex Storport driver further increases the functionality and manageability of HP's Windows-based server and storage solutions deployed in SAN environments," said Mike Smith, executive vice president of worldwide marketing of Emulex. "Emulex looks forward to continuing its toil with HP to raise the bar in terms of SAN features, performance and scalability."
"Emulex's robust Storport miniport driver design has not only successfully passed the rigorous testing required by HP for exhaust with its server and StorageWorks SAN solutions, but it offers new and enhanced functionality that their customers will greatly benefit from," said Kyle Fitze, director of marketing, Online Storage Division, HP. "We appreciate complete aplomb that SAN solutions utilizing the new Storport miniport driver coupled with Emulex HBAs and HP servers and storage systems will meet the needs of the most challenging heterogeneous storage environments."
The Emulex Storport miniport driver implementation enables customers to realize the advantages of complete duplex and towering volume I/O transfers, increased device logins, as well as sophisticated I/O queue management functions. The Microsoft Storport driver, coupled with the Emulex Storport miniport HBA driver, besides helps solution providers infatuation HP to deliver higher I/O throughput and greater storage resource manageability on the Windows Server 2003 platform. The Windows Server 2003 operating system, which utilizes the Microsoft Storport driver, is designed to consume edge of Emulex's 64-bit extensions driver technology integrated into the Emulex Storport miniport drivers.
"The combination of the Emulex Storport miniport HBA driver and Microsoft Storport driver ensures that customers will garner additional functionality and reliability in Windows-based storage environments," said Dr. Claude Lorenson, technical product manager, storage technologies at Microsoft Corp. "The Storport miniport driver model demonstrates how the Windows Server 2003 environment is model for both enterprise and midrange SAN environments."
This qualification encompasses advocate for Emulex 2Gb/s Fibre Channel HBAs, including the LightPulse LP1050, LP982, LP9002, LP9802 and dual channel LP9802DC. The Emulex HBA family offers high-performance, standards-based connectivity solutions across storage network environments. Emulex HBAs besides advocate the Windows Server 2003, Windows 2000 Server, and Windows NT operating systems, including the Storport driver released with the Windows Server 2003 platform. Emulex HBAs besides advocate Windows Server 2003 storage technologies including Virtual Disk service (VDS), Volume Shadow Copy service (VSS), and Multi-Path I/O (MPIO).
Emulex Corporation is the world leader in Fibre Channel HBAs and delivers a broad ambit of quick-witted structure blocks for next generation storage networking systems. Emulex ranked number 16 in the Deloitte 2004 Technology rapid 50.
The world's leading server and storage providers depend on Emulex HBAs, embedded storage switching and I/O controller products to build reliable, scalable and towering performance storage solutions. The Emulex award-winning product families, including its LightPulse(tm) HBAs and InSpeed(tm) embedded storage switching products, are based on internally developed ASIC, firmware and software technologies, and proffer customers towering performance, scalability, flexibility and reduced total cost of ownership. The company's products appreciate been selected by the world's leading server and storage providers, including Dell, EMC, Fujitsu Ltd., Fujitsu Siemens, Bull, HP, Hitachi Data Systems, IBM, NEC, Network Appliance, Quantum Corp., StorageTek, Sun Microsystems, Unisys and Xyratex. In addition, Emulex includes industry leaders Brocade, Computer Associates, Intel, McDATA, Microsoft and VERITAS among its strategic partners. Corporate headquarters are located in Costa Mesa, California. advice releases and other information about Emulex Corporation are available at http://www.emulex.com.
"Safe Harbor" Statement under the Private Securities Litigation Reform Act of 1995: With the exception of historical information, the statements set forth above include forward-looking statements that involve risk and uncertainties. The company wishes to caution readers that a number of essential factors could judgement actual results to vary materially from those in the forward-looking statements. Those factors include the rapidly changing nature of technology, evolving industry standards and frequent introductions of new products and enhancements by competitors; fluctuation in the growth of Fibre Channel and IP markets; changes in economic conditions or changes in end-user exact for technology solutions; fluctuations or delays in customer orders; the highly competitive nature of the markets for Emulex's products; Emulex's skill to gain market acceptance for its products; the company's skill to attract and retain skilled personnel; the company's reliance on third-party suppliers. These and other factors which could judgement actual results to vary materially from those in the forward-looking statements are besides discussed in the company's filings with the Securities and Exchange Commission, including its recent filings on Forms 8-K, 10-K and 10-Q.
WALTHAM, MA--(Marketwire - July 21, 2010) - Actifio, the emerging leader in Data Management Virtualization (DMV), today announced $8 million in train A financing. The funds will exist used to market Actifio's patent-pending technology which transforms individual data management application silos into a unified, virtualized, highly efficient solution for data protection, disaster recovery and traffic continuity.
This financing was led by North Bridge Venture Partners and Greylock Partners. With the funds, Actifio will expand its sales channel, and invest in marketing to drive market share for its next-generation data management solutions.
Server virtualization technologies from Citrix, Microsoft and VMware, along with solutions from Cisco, Dell, HP, IBM and others appreciate enabled the transformation of the computing infrastructure into an efficient, dynamic computing resource. However, the storage infrastructure continues to exist a major bottleneck in this transformation, with data lifecycle management shackled by point tools that are deployed in silos -- creating complexity, inflexibility and at a significant expense. Purpose-built to radically simplify and deliver unprecedented agility, Actifio's DMV technology reduces the actual cost of managing the application data lifecycle and virtualizes vendor-independent physical or cloud-based storage devices into a private, public or hybrid storage cloud infrastructure.
"Actifio addresses a significant ache point for enterprises that necessity comprehensive data protection in a separate solution," said Jamie Goldstein, common partner, North Bridge Venture Partners. "Actifio has everything the ingredients for success including a chafed´ market opportunity, technology superiority, and a stellar executive team that will allow Actifio to deliver on the plight of Data Management Virtualization."
"Traditional data protection tools appreciate become a major management hindrance in the migration to dynamic data centers to realize the value of virtualization," said Erez Ofer, partner, Greylock Partners. "Actifio has the birthright team and technology at the birthright time to execute on a tremendous market opportunity for comprehensive data management that eliminates application silos and tangled management headaches for the enterprise."
"The strategic investment by North Bridge Venture Partners and Greylock Partners is a tough validation for the company, their pioneering data management virtualization solution, and their skill to execute and capitalize on a multi-billion dollar market opportunity," said Ash Ashutosh, founder, president and CEO, Actifio. "Protecting traffic data should not appreciate to exist this hard, tangled and expensive. Actifio's DMV technology brings to data lifecycle management the identical paradigm shift that virtualization brought to the server environment with everything the resulting simplicity and efficiency."
About Actifio Actifio delivers a next-generation data management solution with radical simplicity, unprecedented agility and up to an order of magnitude lower cost. Based on Data Management Virtualization (DMV) technology, Actifio transforms individual silos of point tools into a unified solution using efficient pipelined management across the data lifecycle. The company's patent-pending DMV technology delivers unified data protection, disaster recovery and traffic continuity across the data lifecycle for virtual and physical IT environments. For more information, gratify visit: http://www.actifio.com. | 2019-04-21T18:28:46Z | http://tractaricurteadearges.ro/pass4sure-cert.php?exam=HP0-J47 |
3 Arrival Waves? (2022, 2024, 2026) + Bring Your Pets?
Isaiah 17 - Summer War?
Why Does Israel Let Us In?
Since the earliest editions of Know the Future, the next expected event in Bible prophecy has been the M.E. Nuclear War. This is the conflict by which Damascus shall finally have “ceased to be a city and become a ruinous heap” (Isaiah 17:1). From what Isaiah and Psalm 83 say, Israel is attacked (for a fourth time since 1948) by an overwhelming coalition of Arab neighbor nations. Israel responds to this existential threat by using nuclear weapons, the so-called “Samson Option,” something Israel has threatened in two past conflicts (1973 Yom Kippur and 1990 Gulf War). This scenario explains how Damascus is both destroyed and never rebuilt like it would be after an earthquake. The nuclear fallout prevents resettlement of Damascus like it did for the Chernobyl reactor's worker town of Pripyat. As a result, the world's oldest continuously inhabited city will remain ruins despite being the capital of Syria (at least until the restoration of all things in the Millennium).
The question that has always dogged me about this event is when does it happen in relation to the start of 70th week? Clearly, there are events inside the beginning of the 70th week that depend on this war happening first. The chief and most obvious example of this is as our move to a “believer's settlement” in Judea starting in 2024 for safety from WW3/Wormwood in 2026 or the so-called “beginning of sorrows” per Joel 2:32=Matthew 24:16. Non-Jews are not allowed to reside in Israel and it will take the heavy casualties and need for aid in the wake of a war to even temporarily change that longstanding immigration policy.
However, whether this war starts inside the 70th week (right after it begins) or some years before that has remained a question. The challenge is that this war is only described in OT prophecies and not in the chronological framework of Revelation. This uncertainty has been reflected on the Revelation Roadmap chart by ambiguously showing the war event (2nd box from left below) as straddling a stretch of the chart before the start and after the start of the 70th week (with a footnote explaining this).
If you have not already done so, be sure to read the earlier study on 2026 before proceeding as that will lay the foundation of the 70th week needed to understand the chart above and the article below.
To read the rest of this 9,000(!) word study and understand what my (and Katrina's) dreams are leading me expect in 2022 , please join my support team monthly or even for just one month (no monthly financial commitment required). I appreciate your material support in exchange for helping me to continue to bring forth spiritual support (as Paul taught in 1Co 9:11, 14) for the saints to finally learn God's will and to do it (Lk 8:21=Mt 12:49-50=Mk 3:34-35). If you cannot afford to join the Support Team at this time, I understand. Please enjoy the hundreds of other free studies on this site instead!
I wonder how much certain topics are coincidences or if I just have my antennas up.
I enjoyed this article. There is also the flip side of the coin with grace and forgiveness and judgement. But I haven’t checked out the Handling Verbal Article. Ecclesiastes 7:21-22 is one of my favorite passages.
Faith and complaining are inseparable in those stories.
Do not believe that lie, friend.
Igor……You are NOT the antichrist.
You are not the antichrist – you’re just a very naughty boy.
Great article. I apparently missed the clue about keeping track of my complaining responses and attitudes from fellowship last Sunday so I’ll plan on doing this for the next week. I’m sure it will be rather humbling to review a weeks worth of this behaviour but should help to provide some perspective and identify triggers.
Thanks for the ongoing help and support as we learn to live Gods way.
The danger of complaining lies with feeling justified for doing so. And that justification can stem from pride, wondering why certain injustices or troubles have befallen our family. Most of us can relate to the “why me” or “why is this happening to us” dialogue as if we shouldn’t have to experience trials & tribulations.
Tim, I think you are spot on presenting this information as life-saving prep work for the conditions we will have to face. Katrina I started listening to your podcast but will have to finish it later when my house is quiet. But I do thank you sincerely for being honest in your struggles with complaining. This is an area that I am struggling with and it’s always encouraging to know how others are successfully pruning their spiritual branches.
Your article has definitely heightened the sense of urgency for getting my attitude in check for what lies ahead. I’d rather go through the discipline now rather than have God make an example out of me because I have not exercised self-control.
Thank you again for your work!
Well, this is extremely interesting. Yesterday I was talking with my 9 year old son about EXACTLY this point and the scriptures you shared. Last week I also considered keeping a notepad for how often my wife and I showed appreciated and gratitude and how often we complained and criticized.
I am not a warm and fuzzy person, I very seldom say that “it’s a sign” (remind me to tell you a joke about that) but I don’t believe what you wrote to be a co-incident, perhaps this is confirmation for both of our families about where we need to be – conformation post fact for you guys 🙂. Very, very timely Tim.
Also you mentioned Ananias and Sephira- funny enough I think about them all the time. My wife and I discussed this this morning talking about how when we are called to give and set up the kibbutz we can store anything up for ourselves (like women’s products, deodorant, anything personal because we can prepare just for ourselves – every thing we have will be for the body. There will be a double issue there – what is ours is no longer ours and those that have not prepared need to be shown grace and not reluctant giving even if they were late to the party and contributed nothing (just like the scripture about the workers in the field in a way were the workers that came early complained about “fairness” with those coming at the end getting the same pay – it’s a similar “justice” issue that we as humans have a problem with.
I could talk on and on about the scriptures and ideas and revelations my wife and I are having and had all surrounding your teaching. Great stuff Tim, it is helping to increase my faith we are in the right path and that we believe we are in the right place to support you as unto the lord. Exciting times. I pray God continues to speak to you, me and everyone involved clearly like this.
I just read the supporter content with regards to your planned move to Israel to prepare the way for the people. I had to write to you because I could not contain the emotion I have in my heart. It is filled with happiness right now and excitement, but also a lot of anxiety only in the sense where I am anxious about not being able to prepare everything I have set in my heart to do for that time (and I will tell you about it in a bit), but I just need to trust in Father to help us in all of this. Need to learn to trust more!
On my end, I started reading your content and studying the Bible when I was a stay at home mom 9-10 years ago. When my little one (third) came to school age, I went back to work and I wasn’t able to dedicate “full time” as before. But recently, my family moved away from the big city (Toronto) to a very small town about 2 hours out. Previously, my husband wasn’t a believer. (And I owe so much of what you taught, Tim, about kindness, instead of forcing him to believe when I first started out.) Last year he started to become convinced of the truth of God’s word and we started praying together and studying the Bible together (also with the children). We felt that we were being led by Father to move out of the distractions of the world and be in a place where it was hard for our friends to reach us and hard for us to go anywhere because now we’re just in the middle of farmlands. We started (trying) to do Sabbath the best way we can (my desire since forever but only recently husband willing to do so, and I can’t even believe the blessedness of this, how finally we are able to do this as a family, although super far from perfect.) Our family also stopped eating pork and shellfish and other unclean foods since we moved here (almost 2 years now!) despite my husband being a chef. Doing this not for traditional reasons but because we realized really why Father is giving us these things, not prevent us from doing things but to protect us, to keep us healthier and well.
We both just left our jobs early this year to work on a business, with the goal of saving up money to pay all our debts (the jobs aren’t working, and we realized, for 6 years it wouldn’t be enough) for ourselves and, most especially, because Father had placed in my heart to help people to move to Israel when the time comes, we were planning to earn enough money so that we could move our families and others, anyone else who didn’t have funds enough to do so, whoever it may be. I don’t know that this is going to go as planned but we need your help in praying for us as well, that we do not lose our way and continue as planned.
Another thing is, I would like to pray about this, because as soon as I read your content about 2022, I just had the overwhelming desire to go and help you out. I don’t know how my husband will feel about this yet, but please do let me know if you might need any help when the time comes for you to be there. My husband is super hardworking and hands on, with anything you give him in terms of work. He is also very handy around the house.
For years now I had been praying for what Father’s purpose is for my life, and I didn’t know what it was exactly but I know He had placed in my heart to want to help. I just didn’t know how I could help people until the time when He placed in my heart that I could help with the move. I’m writing this to let you know, if you need help with anything by 2022 or 2023, please reach out to me, would be very happy to help.
Thank you very much for all your writings and for being such a blessing to our family. I love you both very much and thank Father for you.
Kristine, I enjoyed your post! Just like you, I have had a belief in my heart that Tim and Katrina will have a big part to play in the end time Exodus; now that Tim has shared his dreams and insights about 2022, I realise the feelings I had in my heart, were true! How exciting! But I also feel anxious, because my only child, has lost her faith and believe in God (she was brought up with the faith). She and her husband (he instigated it) and their children, go through life without God at this stage and I am so very sad about it! I can only keep praying that in Gods time, and if its His will, He will remove the veil from their eyes and that hopefully in 6 years, they will be back under His wings!
Linda my oldest child is like yours – she lost her faith. It’s very sad, isn’t it? We are not the only parents going through this – apostasy is taking many people away. It’s hard to know that our children are going through life without God, isn’t it? I know what I am supposed to do – pray – but it’s painful to even think about my child being so unrepentant and rebellious towards God. It’s hard to pray about this matter. Thanks for your post because you encouraged me; I’m reminded that I should persist in prayer for her to be reconciled to God.
I so wish you could be here right now so I could hug you and draw strength from another mother who is so worried and sad about her child going through life without God! I am so grateful that my words could encourage you in this; Tim and Katrina has helped me with the issue over the past 2 years; email them, they will help you! Yes, you and I and the minister and who ever cannot get our children back to God; only He calls people in His time. So if they are called, they will hear His voice in His time, His way; not ours. I often cry my heart out in prayer about this; and always feels better afterwards. Remember Nanette, somewhere in Psalms, God says that He catches our tears in a bottle, keeping it in heaven. How amazing is that; our DNA shed in sadness and despair, is kept close to Him. Lets pray for each other!
I found this to be a very encouraging article! I laughed a little when reading the intro as it posed the question “will you be able to bring your pets?” because I’ve actually wondered that quite often but have been too timid to ask, so other people must think like me as well 😀 Did you address this by including scriptural quote “Why, now, have you brought us up from Egypt, to kill us and our children and our livestock with thirst? ” So to clarify, for all the fur parents, will we be able to bring our pets?
Tim & Katrina, I thank you so much for this. Truthfully, I have never heard or been in contact with this teaching before you started the Podcasts. It’s totally new to me, at times I have been shocked by the things you have said.
One of the economic modeling systems I follow is suggesting a convergence of the war and the economic cycles during the time of 2022 (in this very area) so you may be right about the timing (Tim).
As for setting up one or more farming communities that will support “millions” of people who arrive in Israel around 2024 I can say (unfortunately) that I have no answers for you on that topic…The task(s) of acquiring land, resources, knowledge, and the right human structures (collective ones tend not to work out very well historically) along with setting up the means of production to support such a vast number of people in around 2 years is a daunting endeavor to say the least . In any case ‘something’ will have to profoundly change to allow for a mission such as this to be successful–What that is I have no idea…So yes, I am sitting here completely beside myself on this one.
Zachary, I had the same thought. Such an enormous resettlement is hard to imagine. However it’s fun to try to imagine it, right? 🙂 I’m envisioning a social structure that imitates Jethro’s system: “look for able men from all the people, men who fear God, who are trustworthy and hate a bribe, and place such men over the people as chiefs of thousands, of hundreds, of fifties, and of tens.” Under such a system, people would organize themselves, settle disputes, and co-operate (or not co-operate) — however their own “hundred” clans are inclined to do. You have to know, I have an ethnically diverse extended family and so I have a heightened awareness of how the communal lifestyle that Asians (and others) enjoy is completely different to the individualistic lifestyle of Westerners. People will need to organize themselves. As for the land, physical resources, and means of support, I have no worries at all. Our Heavenly Father will provide it all. I do think, though, that there is a reason that God has been pushing me to give up my worldly possessions –gulp– I need to let go of my expectations and superficial attachments. It’s easier not to complain when I do that.
Hello Nanette, Zachary and all.
Regarding the scale of the kibbutz/camp and what is needed to sustain it, my immediate thought was that Yahweh will provide like He did during the Exodus. We’ll have basic equipment like the Israelites took with them from Egypt but the water, meat, protection, blessings will come from God. He will provide.
I listen to and support several groups and many of them are starting to talk about the wilderness experience and how kibbutzs will be utilized. I love camping but this will be tough…..part of the testing and refining.
Thanks Tim for these insights. I see the Holy Spirit at work, spreading the same message to many groups……prepare, get to work, change is coming, etc. Time to begin to let go of our lives and become what He called us to be.
So, I’m confused…if the conflict starts in the next 7 year Cycle for the Lord to return on the next approaching High Sabbath (2026?) when exactly does the Damascus nuclear exchange happen? Are you saying to expect this in the year 2022? I wasn’t clear on that from the article. Either way if it doesn’t happen in the next cycle, we should be looking for these events to transpire within the 7 year Sabbath cycle, is this correct, with the next one being 2032-33?
Mauricio, did you read the 2026 article already? I kind of expected readers to have already read that one. Let me know if you did not and then if it helps with your question tell me I’ll know I need to tell readers to read that first.
Tim and Katrina, I doubt that many of us have seriously and scripturally considered the consequences of complaining.
I certainly hadn’t until reading and listening to your work.
The cliche “once you see it you can’t unsee it” seems to fit here.
Even if things get the better of you or you try to ignore your grumbling thoughts and actions, you’ll know you’re doing it.
Not complaining: now there’s a challenging project!
Tim, why Judea for the evacuation and not Petra? The Bible says that after the antichrist appears /abomination of desolation in the Temple, those in Judea should flee for their safety. Would evacuated Christians be caught in this scenario also?
Margaret, because Joel 2:30-32=Rev 6:12 tells us the protection for God’s servants is in Judea/Mt.Zion/Jerusalem which is who Jesus refers to when he says “those in Judea.” It’s those God has gathered there from Wormwood before sending them to Jordan (not just Petra) for protection from Antichrist.
I see, God’s words has to stand if it is written in scripture. The night after I read your article about Wormwood, I went to bed and just before I woke the next morning I heard a voice saying that WORMWOOD WILL COME IN 2028. My dreams and premonition have always held true and this was so plain. Does this coincide with any of your time lines? I believe it does.
Margaret, 2028 would be one year into the Great Tribulation if 2024-2030 is the sabbath year cycle of the 70th week. 2026 is the year that fits Wormwood for that cycle.
Tim, but from what you have deduced, 31-37 could be the Sabbath year of Jesus’return which could mean 2028 is wormwood with the tribulation and Antichrist taking up rule shortly after. Or as one person noted the years could be off by a few years and as you suggested maybe by a year approx. Or how would 2028 fit into the Trinulation days and the Sabbath year?
I found this article to be one of the most relevant to me that I have read lately. For many years I was enjoying a good life- I had a loving wife, a great job and a wonderful place to live. But the last three years have been a trial, I lost my job (that I had appreciated immensely) and have been unable to find anything. Luckily my wife has been able to pick up the slack but it has been a strain on our relationship. But I am realizing that my problem isn’t not having a job, it’s my lack of faith and my negative attitude. I am a complainer and due to my family upbringing that was what was considered normal. I see now that this has gotten in the way of finding work, after all, who wants to work with someone who is always pointing out the faults in the system? That is what I need to overcome. I see my problem…I feel like I know what I now need to do.
As a newcomer here, forgive me if this point has already been discussed and answered.
If the ME war takes place in the summer of 2022 the the nuclear bombing of the major Muslim cities such as Damascus, will probably cause high numbers of civilian casualties. Many of these will have relatives and friends who have emigrated to the West.
As a consequence massive uprisings in the West among immigrant populations especially in countries such as Germany, France and the UK can realistically expected.
This will probably be expressed in more random bombings on the general populations and other indefensible targets,which could lead to civil breakdown of law and order.
I’m not trying to frighten people but its necessary that we are aware of probable consequences of this war which will stretch far beyond the Middle East and we should be prepared in advance.
Also at the time in the fall of 2022 when workers are going out to construct the camp there could well be large numbers of Jews fleeing back to Israel, from all over the world from the rampant anti semitism which will no doubt ensue from both East and West countries.
With Israel having to build large settlements to house the returning Jews maybe the Lord has plans for them to build our settlement at the same time ! Just my own personal thoughts.
Your articles and podcasts are very uplifting, and I’ve found myself to have so much better understanding of the prophets now that I’ve read your book and your articles for the past few years. I hope one day to join your family in the kibbutz and contribute where we are able. Abba has given us a nack for homesteading as my husband does all the structure and fence building and I raise the animals. So naturally I was thrilled when I read about Katrina’s dream of the possible kibbutz property.
My question for you is what you take from Zechariah 10:8-12 and Micah 7:11-15. Are these passages parallel? I can see Gilead fitting, Will the “safe place” extend as far north as Lebanon? I’m just trying to figure out how these passages fit and they seem to be before the millenial reign by the language used but I’m not sure.
I realy liked the idea of the Kibbutz to stay while waiting. It was so logical to me. I’m just wondering , my husband and I are already of age, we are 69 and 64 and healthy , but in 2022 we are 73 and 68. What can we do to contribute to the community in the Kibbutz? That worries me. I will be retired than and I donot think that we will be able to do hard labor on the land.
Hi Marcelle, where did you get the idea that God is only going to save people who can be productive on a farm? I’m only a Bible teacher with zero skills for kibbutz life like you. God saves those who are willing, not those who are useful!
What Tim said and I fully expect miracles and healings to be normal to have again. I believe the weak and elderly will be given strength like Moses and Caleb received from God.
Hello Tim, since you have published this article I must have read it at least five times.
I also went to Wikipedia to see what they say about the kibbutzum origin and development. What I found interesting is, as at 2010 there was about 270 kibbutzim with an estimated population of 100000 people. So if you devide 100000 by 270 it gives you an average of 370 people per kibbutz.
Let’s say for instance the biggest is between 1000 to 2000 people, and after the ME war, it is sort of desolated and ready for occupation by new settlers, there should be enough infrastructure left over and available for the first wave of believers by 2022 to occupy and start the planning, repairs and maintenance of the facilities in preparation for the next wave of settlers.
In the 1st group there should be people who will have either skilled or basic knowledge of building, electrical, plumbing, farming etc. to get things going and get the basics in place for further development as more people arrive and get utilized in different areas to carry on preparing.
We need to keep in mind that it is only short term, say 4 to 5 years max, so no serious development will be carried out if it is going to be destroyed again in the next conflict against Satan and his cronies.
So what I am trying to say is people should not be concerned about the qualifications they have at the moment, people will be utilized for what ever they are needed for to keep the ball rolling.
I am busy making a list of equipment and skills that will be needed to get a project like this of the ground, and will send it through once its ready, for supporters to comment on and make suggestions.
I find it exiting on how we will be used to get this project going, we might be in for some real surprises.
You are right! Thank you.
I’m so excited! I’m just worried about how to create a plumbing system; and food logistics. We’ll either have to grow our own herbs/spices or stockpile them. Whatever we can grow, we won’t stockpile.
Regarding accommodations, I hope it won’t be every man for himself. I am sure I will be 100% self-sufficient, but not everyone will have financial ability to do so. The more prepared/fortunate will supplant the lesser ones.
I think people forget, myself included, about some of the verses in the Old Testament about God giving people skill and wisdom. Although I think working toward future events is an act of faith.
What about families like mine who have young children? Do you think we will be able to go in 2022 or need to wait a little longer? Would there be schools in a kibbutz or would we have to send our children off the kibbutz to school or would we homeschool them? I see Israel is a homeschool friendly country but there aren’t very many families there who do. I am good with children so I could totally see myself in a childcare position. It will certainly be interesting to see what happens and how everything runs.
I pray He does cause we really want to go early if we can.
My husband and I think this is all pretty exciting, I asked him what we are going to do when the call comes and his comment was we get in his Toyota Ldv and travel overland from JHB to Cairo and from there get to Israel. My comment was what will we use for fuel and he said Diesel as it is all the way up Africa for Trucks to use. As to being too old we know that if YHVH GOD kept the Israelites in the desert He will keep us as our hearts are really in this. Even though we have just moved house we feel that it is not the end for us, so we will keep moving. We have moved 12 times in 48 years so Israel will the 13th move.
Wow! Is this a dream? What an exciting time to live in! Tim is the Joseph of our time in as much as the Lord has revealed all these things to him. May the Lord bless and keep him as we await further instructions. Am eternally grateful. Obiajulu.
Hello Tim and Katrina, hope you are doing well?
I have just read an interesting article on Prophecy news Watch regarding a new political party that was formed by Avi Lipkin which is a joint Jewish- Christian party which will partake in the next Knesset elections. The idea is to represent all people who believe in the Bible or Christians which are currently not represented in the Knesset. Read article on the PNW website.
Could this new party perhaps pave the way for the 2022 move to Israel? It is very interesting.
Hi Tim and Katrina, I have done a lot of thinking about the two dreams Katrina had about the buildings that she has envisioned. To me it shows that at that time there will be more of these homestead’s that will be available to be prepared for the next waves of people that will be arriving. The other thought I had is that I am sure that these places will not be fully desolated but there will be some of the people left, not many, that worked at these various locations who will be able to assist and guide the newcomers in the running of these kibbutzim. So I am sure we will have some guidance once we get there.
I’m sorry for the German National team today, they didn’t make it further in the FIFA World Cup 2018 in Russia, and are now out. The boys fought well, but that’s sport. Good game, and thank you to the boys. Thought I mention it.
This aside, when I found out that Qatar will be hosting the next FIFA World Cup in Soccer in 2022, that got me both worried and thinking, and I remembered Tim and Katrina’s dreams about 2022.
From what we know today, FIFA 2022 in Qatar is set to kick off on 21 November and end on 18 December. Many national teams from all over the World will be there.
I thought that struck me is that the Arabs & Iran may choose to orchestrate the events & the following Psalm 83 attack on Israel during the tournament, believing that Israel would not dare retaliate against them, because of them hosting national teams from so many nations, as well as delegations, and hundereds of thousands of fans from all over the world.
When Arabs think that they are safe beacuse of hosting the FIFA World Cup, Israel will not care and retaliate against them with nuclear weapons, killing everyone, the national teams/football fans gathered from all over the world.
I just wanted to share my thoughts on this here, it’s incredibly scary.
Shoud it happen like this, it would sure cause the World to hate Israel & the Arab States alot! Hope I’m wrong, yet however it happens it will still be a very scary and tragic experience, and Israel will be hated on anyway.
Interesting thoughts. Thank you for sharing. It definitely seems possible.
After reading this article the first question that came to my mind was: Is the “farm” dream referring instead to the “place prepared”? There are many farms (and farmland) in Jordan. I’m just wondering if you’ve considered this to be ‘where’ your dream might be leading you?
I bring this up because the entire “Kibbutz” theory that you’ve proposed doesn’t make a lot of sense from the perspective of Israel’s situation. I’m guessing Israel will be relatively desperate, possibly with a fairly large loss of life (30%+), along with loss of arable land (possible radiation), and a destruction of general infrastructure. Kibbutz farms aren’t exactly known for being “efficient” and/or “highly productive”. In fact, Kibbutz’s do not base themselves on “agriculture” (as you stated) but instead base themselves on the Marxist ideology that the “male patriarchy” is the cause for humanity’s ills—hence, the ideology was designed to “remove” said patriarchy by “allowing” women to work in the fields—this is then coupled by a sudo-state entity (part of the group) raising the children of these “worker parents” so they can go out and “work the fields”. Marxism views the “natural order” as the problem my friend. In fact, the very hierarchy posed by God (Father) and Son would be opposed by such an ideological worldview. But this poses an additional question: Why would Israel bring in a million people (your estimate) to work limited arable land just so those people could make possibly enough food only for themselves? Remember, Israel did this to incentivize “Jews” to move to Israel from already socialist countries—They did this to increase their numbers. This incentive would no longer apply—as bringing in a large number of non Jews simply to breed and take up space would not provide any immediate benefit to Israel (from what I can see). Unless this provides a benefit to Israel I don’t see how that could even take place—However, I do see the other possibility (that you mentioned on one of your older articles taking place)—Israel letting in people to fill a multitude of job roles and positions all of which could be living in various areas throughout the country (even in farm camps). This to me seems like the most logical conclusion but that’s just my opinion.
Could I see “something else” (or similar) taking shape in the “place prepared”? Yes, I could. But in no way would it be based on the same ideology as that of Marxism (which, by the way is a horrible way to view the world because it completely denies human nature and that of limited resources). I’m guessing you didn’t intend this specifically (also guessing) but it’s important to note the true purposes of these “kibbutz’s”. IF the “place prepared” has food/water provided by God directly then people could spend their times doing other things—heck, God could even clear out that entire area into space to allow normal sunlight (and therefore normal conditions for farming, etc. would be possible).
Tim, I’m not a financial supporter, for the simple fact that I’m unemployed and survive on French unemployment benefit. I did, however, purchase “Know the future” several years ago and consider the information given vital for our times. I would very much like to continue reading your articles and catching up on truth.
Tim, I’ve been tithing for some time and have a few of your books. I’ve given all my relatives a copy and have a few left, but I don’t think anyone has read the book. I would like to see if I meet the criteria for a membership. If I do would you please send me a password. Thank you always, your friend, bob wheeler.
Bob, I tried giving you access last year so I’m glad you are now interested. Sent the invite again by email. Bless you.
Wow, I’m really glad I read this because I didn’t realize that preparing for a move to Israel was a preparation for Jordan. I’m on it in prayer for God’s alignment and I can’t thank you enough for being a Moses to us. I pray God’s abundant blessings for each step of your progress, with more than enough provided for you and your family. Remember that God grants desires so I am believing your kitties go with you.
I read a few other things on your site today and I’m overjoyed that you now have a car in Germany. God is so faithful, isn’t He? Always bringing us to new seasons and levels of blessings.
You’re an incredible blessing to the Body of Christ. Your rewards are great. Bless you and family always. I am praying for you all. I rejoice to know that Zach is moving toward his total healing. These are all tremendous dreams God has given and I rejoice with you in God’s great unfolding. | 2019-04-24T17:50:17Z | https://escapeallthesethings.com/2022-dreams/ |
The summer I went up to University I had a job decorating somebody’s house. Hearing I was a Christian and that I was going to Cambridge to study medicine, the owner tut-tutted and said it would be hard to keep my faith. I’m not sure if that was because religion has no answer to suffering, or because it has no answers period. One reason I didn’t lose my faith, though, apart from the stubborn desire to prove her wrong, was that I expected to run into all kinds of different belief-systems, promoted by people far cleverer than me, but I told myself that all other things being equal my beliefs were no less likely to be right than theirs. It actually worked, preventing me from being overawed by an idea’s sheer novelty – or its plausibility, in the sociological sense.
in the school library, whose central theme was that “modern man” couldn’t believe in a God “out there”, and certainly not one who performed miracles and other magic. It annoyed me slightly that at the age of sixteen I had peremptorily been excluded from the class of “modern man” because I could.
I was reminded of all this as I’m ploughing through John Sailhamer’s magnum opus on the Pentateuch, which has nothing to do with creation or evolution at all as such but is fascinating. There’s a chapter on the interpretive history of the Old Testament, in which he points out that as soon as the Enlightenment began to influence Bible Scholarship, the first thing to go in Old Testment Studies was the doctrine of providence.
particular signs and wonders, was not special for God’s directing its history.
But Enlightenment Deism axiomatically scorned not only the miraculous and the truth of the traditional stories of God’s involvement, but on the grounds of the primacy of reason, it rejected the idea of God’s provident involvement in the world. Since the work of Newton and his like was showing the world to function, like a clock, by rational laws, the God of reason could by no-means stoop to lesser means like contingency (ie choosing to change things).
Sir Isaac Newton and his followers have also a very odd opinion concerning the work of God. According to their doctrine, God Almighty wants to wind up his watch from time to time: otherwise it would cease to move. He had not, it seems, sufficient foresight to make it a perpetual motion.
Sailhamer describes how, in rejecting Deism, Evangelical scholarship nevertheless absorbed enough of its rationalism to have two particular results. Firstly, the doctrine of providence shrunk to God’s “miraculous” intervention in the history of Israel or the life of the Christian believer. God may well have delivered Israel from Egypt and given them Canaan, but that was “salvation history”, and he usually leaves the world to itself.
The second effect on Evangelical thinking was the tendency – very dominant in the nineteenth century but common in my own lifetime – to rationalise miracles away: the turning of the Nile to blood was an influx of silt from upstream flooding, and the other plagues followed naturally from that; the crossing of the Jordan was possible because of the known phenomenon of landslips further up; psychosomatic disease explains Jesus’s healings etc.
Now Deism went the way of all fads, and I’ve remarked before on how, amongst Evangelicals, biblical miracles are taken far more for granted than when I was younger. Perhaps the Charismatic Renewal influenced that – but perhaps it’s also the fact that, Hume’s parochial claims notwithstanding, accounts of miracles remain pervasive throughout the world .
But we’d need a much more nuanced survey to separate out those who believe there are gaps in the natural order of things that need constant intervention from a divine agent (the typical Intelligent Design position), and those who affirm that God set up a natural process and actively sustains it without needing to intervene miraculously to bring about his desired goals (the typical evolutionary creation position).
Now, to me that position, given as that of most of BioLogos, seems indistinguishable from the position of Leibniz against Newton. It assumes that it is preferable for God to act through “natural law”, and that if he didn’t it would be through inability to “get it right first time,” (in Leibniz’s words, “make it a perpetual motion” ).
Similarly, much TE writing does what Sailhamer describes Evangelicals doing in response to Deism back in the day: accepting divine action in biblical miracles like the resurrection (but not necessarily the creation of Adam and Eve, or in the divine superintendence of Scriptural inspiration), and in the conversion and life of believers, but not in the governance of the rest of the world.
Evolutionary Creation treats divine action as a problem that nobody is quite able to solve, but without a strong doctrine of divine action (whether or not you have a philosophical theory like concurrence to intellectualise it) there cannot be the kind of doctrine of providence that underpins the biblical worldview.
If God does not act directly in nature, how can he determine the boundaries of nations? The subject isn’t brought up in origins questions, so it’s hard to know whether the question is left unanswered, or whether it is concluded that God doesn’t govern the nations that way, but that all is explained by secular historical concepts. Conversely, if God answers prayer directly, even on rare occasions, on what principle is it inappropriate for him to act beyond what natural law alone will accomplish in the created order?
My conclusion is that the principle involved, though buried by now in the subsconscious, is the same as that which led to the rise of Deism in the first place: that somehow for God to act in “personal” ways is messy and unsuitable to the cool loftiness of pure reason. A mathematical law looks beautiful: multiplying loaves and fish and leaving leftovers is messy. Or perhaps in the “religious” sphere such untidiness is acceptable. But in science, though it takes place in God’s world just the same, the equivalent would be that God himself determines the natures of the fish (perhaps they are Cichlids?) or influences their natural multiplication as he caused their miraculous increase. That’s just unreasonable.
And if that’s the case (and I can’t think of any more solid reason – just the very much less solid reasons of “free-creation” theodicy) then restricting God to “natural causes” in evolution is just an attempt to keep Deism on life support for a bit longer. Which is a bit passé, isn’t it?
A half-appropriate song to round off.
This entry was posted in Philosophy, Politics and sociology, Science, Theology. Bookmark the permalink.
I have a choice between guided evolution vs. God working through nature? Are those the options?
Ok, so let’s take the first. What is guided evolution? I used to think that it simply mean’t God created everything with the desired affect that everything He wanted would appear (or evolve). But from my understand of you Jon, that is not Guided Evolution. That is some sort of light-deism (jump in anytime if I misunderstood you). But anymore that, reminds me of a scene from Apollo 13; when one of the astronauts needs to pilot the module toward Earth, he has to add a little bit of thrust here, a little more there, tap the controller slightly more left, until he has the Earth perfectly aligned to let gravity do the rest and pull them in. The point being, without them interfering with the natural path of the module with all the slight thrusts, the module would have slipped out to space. I think the metaphor is appropriate here and reminiscent of what Liebniz was referring to (not that I know anything about him). I sounds like what you are saying is without God making slight modifications along the way, nature and everything in it would have run amok. But this contradicts features of nature such as predictability and the laws of nature. These two things seem to work together just fine. We know laws exist and it helps is make certain predictions. But how can we ever claim that there are laws of nature when really God is interfering with the law? How can we ever make predictions, which we already do if at any moment, God can steer things away from their “natural” path?
Hi, Hanan. I’ll jump in with my comment before Jon replies.
Your post starts out well, and then, in the last four sentences, appears to go off the rails.
I like your example from the Apollo 13 movie. That is how I picture “guided” evolution. Of course, the guidance could be very, very fine; it might occur at the subatomic level and might be non-detectable by our scientific methods. The point, however, is that, without the guidance, evolution would take a different path. Thus, for example, without God’s subtle steering, maybe life on earth would never have got beyond single-celled creatures. Or maybe it would have got to dinosaurs and no further, so that God had to steer an asteroid to earth to wipe them out. Or maybe it would have got to primates, but not beyond simple lemurs. Etc. The point is that in a “guided” model of evolution there is a special divine action that makes a difference to the outcomes of evolution. When I speak of evolution as being “guided” or “steered” this is what I have in mind. Among the TE/EC folks, the only one I know who clearly endorses such a model is Robert Russell (who sees God acting decisively but invisibly underneath quantum indeterminacy).
On the other hand, if evolution is set up from the very beginning of life to unfold in a certain way, with certain precise outcomes, but all by natural causes, without any steering or guiding by God (however subtle), I would call that front-loaded or programmed evolution. Very few TE/EC people seem to endorse this model, but if anyone does, it is probably Denis Lamoureux. But one ID person endorses it, and that is Michael Denton.
Now, to your last few sentences. You object that God’s steering would amount to tampering with the laws of nature to the point where our scientific study of nature would be invalid. But this need not be the case. In fact, evolution, at least of the Darwinian kind, does not proceed due to laws of nature anyway. It proceeds in accord with contingencies, i.e., particular events. For example, suppose an asteroid strike did wipe out the dinosaurs. Well, there is no “law of evolution” that forces asteroids to strike planets when dinosaurs are ruling, so that mammals can take over. It just happened that an asteroid struck. Maybe on some other planet dinosaurs still rule, because no asteroid struck. It’s all contingency, not natural laws, that determines what happens in Darwinian evolution. So if Darwin was right about evolution, how could God guarantee any outcomes? And the answer is: God couldn’t.
But if you supplement Darwinian chance with adjustments by God, you can take even Darwinian evolution and guarantee outcomes, much as the astronauts in your movie brought the ship back on course.
Does this scenario — God’s tinkering here and there — undermine science? Not at all. No one is saying that God changes the laws of physics, the laws of chemistry, etc. The planets will still go on obeying Kepler’s laws, Newton’s laws, etc. Hydrogen and oxygen will still make up water. Plants will still make food by photosynthesis. Male and female animals will still get together to produce young. It is only when evolution needs to be kept on track to produce certain desired outcomes, that God intervenes, and even then, he doesn’t change the laws themselves, but only adjusts their application here and there. So scientists can still go on treating the universe as law-bound. The only thing they can’t treat as law-bound is Darwinian evolution. But Darwinian evolution is not law-bound anyway; it works by a series of historical events, not by a series of scientific principles. All that God is changing is the sequence of events, not the basic rules of nature.
Human beings do this all the time. If you hit a line drive in baseball, it might go right into the stands; at least it would go far into the outfield. That is what natural law would have the ball do. But if the shortstop leaps up and catches the ball, its flight is interrupted. Does that deny the laws of physics? Not at all. It just diverts the course of a particular ball, changing the historical outcome of that ball’s motion. The next time someone hits a line drive, the shortshop might miss the catch, and the ball would proceed as normal. The natural laws haven’t been changed at all. Rather, the course of events has been changed because an intelligent actor has entered into the picture. I don’t think you would say, that because a shortstop sometimes catches the ball, all of ballistics will have to be thrown out because we can never know that a ball will keep going on its course. I think you would say: The ball will carry on in its course unless someone or something gets in the way to stop it. It’s the same with guided evolution. Darwinian evolution will produce whatever messy outcomes it produces, in its stumbling blind search for workable forms, unless someone or something directs it along a path it would never otherwise take. So guided evolution is no more incompatible with good science than a shortstop’s catch is with good physics.
What guided evolution is incompatible with is atheism — the doctrine that everything in the universe happens due to either natural laws or blind contingencies, because there exists no intelligence that could direct the universe to any ends or purpose.
The TE/EC attitude to guided evolution is very strange. If you mention Denton to them, they will spurn programmed or front-loaded evolution as “too Deistic” — they say that the Biblical God is “mightily hands-on” and no distant programmer who merely sets the ball rolling. But then if you say, OK, God is guiding evolution, they are just as offended. They want God to keep his hands off and let natural processes do all the work. And since they are all neo-Darwinists, that means leaving it to chance whether or not man, or any other creature, will ever emerge from the process. Yet they say that God created man. In what sense it is “creating” anything to roll the cosmic dice?
In other words, TE/EC folks are extremely mixed up, conceptually. They seem incapable of thinking in a straight line, of reasoning from premise to conclusion. How they got this way, nobody knows. But the typical TE/EC combination of American pietist, non-confessional, free-church mental culture and a philosophy-free scientific training seems to have a lot to do with it.
The apostle Paul told the people of Lystra that God had given them a witness by providing rains from heaven and fruitful seasons (Acts 14:17). Was Paul saying that God performed regular miracles by which rains fell on the plains of Lycaonia? If instead we were to point to Mediterranean weather patterns under natural laws governing evaporation, winds, condensation, etc., would we be refuting Paul’s point? Diminishing his point? Or can a natural law-based explanation of “rains and fruitful seasons” in Asia Minor be fully compatible with Paul’s message. Remember, Paul said that the life-giving patterns of wind and rain were “a witness” to God as benevolent provider.
Likewise, then, why does it detract a whit from God’s glory to say that evolution, like the weather, can be fully God’s work, with ends entirely foreseen and planned for (even asteroid impacts) even if carried forward under God’s minded maintenance of lawlike regularities?
I have no theological objection to God’s working through “lawlike regularities” (e.g., the cycle of rainfall). The problem is that neo-Darwinian evolution, as conceived by atheists and TEs alike, does not proceed by “lawlike regularities” but by a series of contingent events.
When we explain the movement of a planet around the sun, we explain it in terms of lawlike regularities. When we explain the French Revolution, we explain it as the outcome of a series of contingent events. We do not say that the French Revolution was produced by any “law” of history. Neo-Darwinian evolution is more like the French Revolution than like the orbit of a planet.
Yet TE/EC folks, especially at BioLogos, don’t like talking about God’s intimate involvement in that way. They can’t make up their minds what they believe in: a God who is always personally active in what happens, or a God who gives nature authority to do the creating itself, and stands back with his hands off. And when you press them on this, they give obscure answers or go silent. Venema, Falk, Giberson, Applegate, Ard Louis, and many other American TE/EC leaders practice this studied evasion. They seem to be trying to negotiate a tightrope walk, not wanting to commit themselves to a God who actually makes a difference (because then they would face the scorn of secular humanist, naturalistic biologists) and not wanting to endorse a remote Deistic God either. Basically, they don’t know what they think, or do know but aren’t telling. And as long as they practice this evasiveness, as long as they won’t tackle the question of divine action in evolution head-on, they cannot possibly make any serious gains in the evangelical world.
Evangelicals believe in a personal God who acts, and they want to hear TE/EC leaders saying that God acts — and acts in a way that makes a difference to evolutionary outcomes. To most evangelicals, the TE/EC God looks like a dice-roller who hopes that if he makes enough galaxies, eventually a dice roll will produce man. That’s not the Biblical God, that’s not the traditional Christian God, and true evangelicals will have nothing to do with such a God. TE/EC needs to find some intellectual clarity, and some public spine, on this question. Otherwise it will remain a liberal rump within the evangelical world. Most evangelicals will reject it, secular humanist scientists will reject it, and it will have to be content with its shrinking (down from 38 to 31 per cent) share of American support.
Eddie’s answered Hanan well, but one quick addition: for my money, either “preloaded” or “real-time guided” evolution do justice to a wise God, for the simple reason that his wisdom lies in deciding his goals (which include both the general result and the detailed outworkings, such as you and me) and creates the means to fulfill them.
They both differ from the God who creates a largely ateleological system to see where it ends up, maybe making it likely that something intelligent evolves with hands or tentacles, which he then calls “man”. That is gambling, not creation, and is the model many TEs certainly hold.
The problem with frontloaded evolution is that we have no evidence that it can be targeted that precisely – it’s no longer a Laplacian universe. One reason Apollo needed mid-course correction is that it’s impossible – even in theory – to calculate trajectories precisely when several bodies are involved (earth, moon, sun, planets, spacecraft). The means are insufficient for the effect: you just can’t create a Universe with initial conditions that guarantee the K-T event at the right time.
…because it speaks only of laws and cannot contemplate their suspension, that is, miracles, which are of the essence of the idea of Revelation. Thus the God of Physical Theology may very easily become an idol; for he comes to the inductive mind in the medium of fixed appointments, so excellent, so skillful, so beneficient, that when it has for a long time gazed upon them, it will think them too beautiful to be broken, and will at length so contract its notion of Him as to conclude that He never could have the heart (if I may dare to use such a term) to undo or mar his own work; and this conclusion will be the first step towards its degrading its idea of God a second time, and identifying Him with His works. Indeed, a Being of Power, Wisdom and Goodness, and nothing else, is not very different from the God of the Pantheist.
That’s where I come from too (though I’d be more nuanced on the “natural-supernatural” divide). He voices much of what I say in the article (though I was unaware of him when I wrote). The fact that panentheism, at least, has been a prominent player in the “divine action” project seems to confirm his fears.
One more thing. Ed Feser has a recent column on “laws and causation”, in which he mentions that the very concept of “natural law” is problematic, and certainly pushes us towards ideas like “violation”. It’s actually quite hard to contemplate where those laws actually are.
It arose from a comparison with torah, essentially, specifically in order to “free” science from the ideas of final and formal causation. In A-T thinking regularity was explained by substantial form and teleology: if you like, God makes particles, or creatures, with natures that produce certain ends. It works just as well as law does, mathematically.
But it gives a greater sense of space for contingency, for there’s no reason why God shouldn’t make each particle slightly differently, so that the regularity comes from the average of their action, rather than being a strict law each of them is tied to. That fits with Maxwell’s treatment of laws, actually, which are based on the statistical sum of what particles do, not what individual particles do.
To reply to Darek’s point, one needs to understand that special providence (pre-Deism) simply did not mean regular miracles instead of, or as well as, natural events. Rather, providence says that all events are subject both to the regularity of God and his contingent choices – the regular seasons are his, but so is the witholding of rain in a particular time and place as a judgement, say. It is legitimate to pray for the weather, without expecting a miracle. I did something on that here.
I come down closer to occasionalism than anything else–but with many qualifications, not to mention that I make no pretenses to skill in philosophical hair-splitting.
patterned working and foresees its every outcome, he is not pushed out to a cosmic distance as a deistic clockmaker. That is what perhaps the TEs at Biologos are nervous about–without any justification in my view.
And of course I do not believe that God is locked out by quantum indeterminacy; the fact that differences in certain outcomes in QM have no physical cause does not mean they have no mental cause, which they do and which is the divine purpose. God holds quantum events in his hands as much as any others.
Evolution is a process of growth-with-differentiation. Like the growth of embryos or plants writ large. Notice what Jesus says about plant development: “For the earth brings for fruit of itself: first the blade, then the ear, then the full grain in the ear” (Mark 4:28). From one perspective the process occurs “of itself” or as a product of the earth “by itself.” Just as evolution from a materialist perspective seems to occur “of itself.” But Paul cites the larger reality, saying “God was making it grow” (1 Cor 3:7). God is the one empowering the process unseen except to the eyes of understanding and faith.
The Genesis creation story begins with echoes of embryonic life–the watery darkness, the undifferentiated character of what is developing, yet superintended by the divine Spirit the whole time. Cf. Gen 1:2; Eccl 11:5.
God appoints the deaf, the seeing, and the blind, not by miraculously striking babies with blindness but by foreseeing and taking responsibility for every such circumstance and providing for a positive eventuality (cf. John 9:3). Yet at the physical level birth defects are often the result of “random” mutations.
I incline toward patience with those at Biologos. They are still learning, as we all are.
I take your point about the weather passage – clearly in that context the main message is “God is reliable in his provision”, and if we’re relating that to science, it’s the lawlike processes that are in view. The problem only comes if that becomes the sum total of God’s activity and he’s not “allowed” to act in nature apart from “Law”. That leads inevitably to a Deistic position (or one that has been called “Semi-Deism”, where Deistic science is partitioned off from pietistic faith, in the latter case occasional divine action being admitted).
Your use of the embryology metaphor for evolution is an interesting spin on the recent BioLogos reference to “Let the earth bring forth…” as an indicator of quasi-independent secondary causation. It’s reading too much into the Genesis text, but is a reasonable way of seeing things.
I’ve said here (and at BioLogos) before that the root meaning of evolution is an unfolding of what is inherent – just like the emergence of plant from seed or animal from egg, and that seems to be implicit in what you describe. Many of the original TEs saw things that way. But it’s important to realise that Darwinian evolution was conceived as a deliberate denial of that whole viewpoint, as Étienne Gilson unpacks in From Aristotle to Darwin and Back Again. That’s why Darwin didn’t use the word “evolution” until its popular usage by Spencer forced it on him.
For “embryological-type” evolution implies that the information for the final result was inherent in the seed – whether that be seen as information in the evolving LUCA or in the environment and the laws by which it lived. Both inevitably suggest a designer who originally implanted that information. Both are problematic in terms of actually locating the information: natural laws contain minimal information (which is why they are regular), DNA shows no sign of implicit future evolution, and so on.
Darwin denied that developmental view, and instead put the weight on random search and selection actually creating new information, which is why a designer becomes unnecessary (if it works). It seems to me that BioLogos, in placing its bets on “mainline science”, is either endorsing the “unfolding” model without realising it’s denying Darwin, or else is in a muddle in trying to make God the author of an undirected process.
My problem with them is that they’ve shown themselves unwilling, over the last three years or more, to engage with serious critiques and discussions of such things, or even to state clearly which position they take. It suggests that, with the exception of guys like Ted Davis, they don’t really appreciate the important relationship between metaphysics and philosophy and the theological and scientific outcomes.
They may still be learning, but if these issues have become obvious to a tyro like me in the five years I’ve been working on it seriously, then one would expect the guys with the expertise and the Templeton Grant to appreciate them too. Such issues, after all, were raised even in Darwin’s own time.
I don’t think that either Jon or I would disagree with Polkinghorne’s statement as it stands. But how does Polkinghorne apply it to evolution?
It’s one thing to say God doesn’t always have to be poking his finger in, but for Polkinghorne, is God ever poking his finger in? I would guess that P., like many BioLogos TEs, imagines that God “poked his finger in” for some New Testament miracles; I wonder if P., any more than the BioLogos folks, would be comfortable imagining God “poking his finger in” in the evolutionary process (between the Big Bang and the arrival of man).
There is a definite preference among BioLogos folks that God should not poke his finger in, until it comes time for Biblical miracles. Thus, in the BioLogos picture, divine action is “deistic” until Biblical times, then “theistic” for the period of the Bible and maybe the early Church, and then (at least for those Protestant TEs who are cessationists) “deistic” again. So mechanistic, reductionist explanations for everything are the right approach except for Biblical miracles. For me, there is something rotten in Denmark with such a convenient deistic/theistic switch. It’s as if the BioLogos folks want to be good modern Enlightened people most of the time, but want to hold out a small private zone for miracles that is limited to concerns over Jesus and individual salvation. I don’t like such a compartmentalized model of divine action, which I think is neither Biblical nor traditional — or for that matter very philosophically consistent.
Eddie, since Polkinghorne refers to “all these natural processes”, and I’m sure Polkinghorne sees evolution as one of those, then it seems safe to conclude that Polkinghorne isn’t holding out evolution as separately excluded from being an expression of God’s will.
I know such a brief teaser has none of the details you would want about exactly *how* Polkinghorne (or any TEs) thinks God’s will would be expressed in evolutionary processes, and that always seems to be the crux of the matter. You and Jon are frustrated with their perceived long-standing unwillingness to speak to those details.
Could it be that the above hypothetical objection in quotes parallels your demands that TEs bear the burden of showing exactly where this “God-nature” interface is and exactly how it works?
Polkinghorne’s an interesting “case”, it seems to me. On the one hand, he’s written paragraphs that are amongst the strongest I’ve seen on the moral imperative for God to allow creation its autonomy, and he is one of those who applies the Open Theist agenda to nature on that very basis.
Now to my ears, he’s positively affirming that God does act in real time in nature, by the input of new information, and that the world is made sufficiently different thereby to leave detectable gaps in the “bottom-up” evidence. Is that not how it sounds to you? If so, bully for him.
What I can’t get my head round is how that is consistent with what he has written elsewhere about the fact that it would be wrong for God to “coerce” nature (“a puppetmaster God” is his own phrase) rather than leaving it free to make itself. But that is exactly what the input of new information is – divine formal causation, the opposite of autonomy. Indeed it’s a true case of ex nihilo creation, for something completely new (the information) has been added to the universe just as surely as if he’d input new energy or new matter.
I’ve been reminded (twice) today that God is described as the “author of life” (Acts 3.15), which is a description of a very informationally complete creatorial role in nature, and thoroughly consistent with Hanan’s Polkinghorne quote if it refers to God’s natural law-like created processes, or to the input of new information as above. God wills, things happen – that’s the biblical doctrine of creation.
But I hit a rock if Polkinghorne actually means that “God’s will” is that Creation should be “allowed to make itself in its own time and its own way”, free from the “puppet theatre” and “enslaved world” in which “everything dances to God’s tune” (all quotes from just one paragraph of Polkinghorne).
So Polkinghorne too appears to be self-contradictory, or at least cryptic. How can we take quotes at face value when he seems to keep to contradictory views of creation at one and the same time? Nevertheless, I’m less interested by what one person’s position may be than by where the truth lies.
I disagree with you, Merv, when you suggest the issue is about justified unwillingness to commit oneself on unknown mechanisms. When P, for example, speaks about God’s adding new information to the Universe, that is essentially a theological claim consistent with Scripture. The “How” is much less important than the “Whether”, though it’s legitimate to discuss the relative theological likelihood of God’s “frontloading” or “directing” nature. It would also, on P’s argument, be legitimate to discuss whether the known natural mechanisms are insufficient, which would indicate one of P’s “legitimate gaps” may exist for the input of information by God.
In fact, nobody would be sensible to ask “how” God acts from a scientific point of view, because (to use your previous analogy, Merv), the scientific study of a book is logically incapable of telling you how the information came to be therein . The whole issue is theological and metaphysical, not scientific.
It seems to me that it is eminently reasonable to ask TE/EC leaders to clearly distinguish their view from atheism.
To me, Merv, that is just not acceptable. But more important, it is not acceptable to the evangelical world in the USA, and if TE/EC leaders persist in this evasive answer, their numbers will continue to plummet, as people abandon TE/EC for atheism on one hand, fundamentalism on another, Pentecostalism on another, and ID on another.
What I want to hear BioLogos say is that God intended every last outcome of evolution, and saw to it that all the physical causes were in place to guarantee those outcomes. I want to hear them say that nothing (regarding final outcomes, I mean) was left to chance or randomness, and that nature had no “freedom” to produce anything other than exactly what God wanted, when God wanted it. When I hear them say this, I will leave them alone. But in 5 years not one of them has said it. There has to be a reason why they won’t say it. I think it’s because they don’t believe it.
Please note that informational content can be a tricky business. An algorithm can be brief and yet generate stunningly complex and beautiful results. Laws and initial conditions can seem simple, as well, but constitute the seed of immense complexity.
Most of us would like to envision a working of God that leaves room for “free will” (perhaps “genuine will” is a better term since no human will is free in every sense) for intelligent creatures. And room for God to work in atypical as well as typical ways (“miracles” as well as law-like regularity). Some TEs, probably including Polkinghorne, seem to want to extend freedom to some unconscious physical processes, including those of evolution. One could draw a rough analogy to panpsychism, which is fairly popular among secular thinkers in philosophy of mind.
The idea of freedom for unconscious processes to set their own creative course, presumably within certain limits, could be a kind of aesthetic choice. In a post-modern environment it might feel unnecessarily rigid and controlling (does the word “patriarchal” come to mind?) of God to set the plan of creation with only the will of intelligent creatures as the variable. The more I think about it, the more I suspect this is a matter of intellectual fashion. For myself, I scarcely see the need to confer freedom on unintelligent causes. Naturally, doing so will irritate those who incline toward traditional theism, while appealing to the process-minded and open theists.
John Lennox (a mathematician of course) also mentions the question of algorithmic complexity (and information theory is one of those “must read” issues in these discussions – Yockey’s book is a good start – see the “Books we like” section). Basically, computer science shows that no algorithm (or mathematical equation) can generate information that wasn’t already inherent within it – it simply presents it in new ways.
That leaves room, as you say, for generating some forms of great complexity from simple algorithms, an advanced example being the Mandelbrot series, but expressly not the kind of semiotic complexity that you find in Merv’s book metaphor or in living organisms. Fractals in organisms, then, can be algorithmic – but simple laws are just conceptually incapable of generating complex organisation as opposed to complex ordering.
This is the question of Kolmogorov complexity. The shortest algorithm, for example, necessary to compute the human genome would be almost the same length as the code itself – longer, in fact, since we now know there is three dimensional, not just linear, functionality in DNA. The only bits you could compress are repetitive elements like ALU, where the algorithm could say “print [this sequence] 100 times”.
The “freedom” issue is, as you’ll quickly see if you risk the search function, the biggest bugbear I’ve had with most publishing TE proponents, who see it as a theological necessity. You’ve correctly linked it to process-theology, which has had a big hold on the science-faith academic project on which current theistic evolution was largely based – they jettison the panpsychism but retain its consequences.
But panpsychism apart (as it surely must be in a Christian context), it’s not so much about the non-necessity of granting freedom to unintelligent causes, as the frank incoherence of the idea. Freedom entails will, which entails rational consciousness. Therefore you can’t give unintelligent causes freedom, any more than you can give teaspoons the vote.
Karl Giberson admitted recently that in these discussions “freedom” is actually being used as a metaphor for “chance”, confirming my long-standing assertion that the whole oedipal “patriarch-aversion” talk is empty rhetoric – but it’s rhetoric which is being used to invent a new theology of both nature and of God himself, which is serious.
As soon as you say God “gives” unintelligent causes “chance” (ie he does not coerce govern that chance as in classical and biblical theology), you realise it means no more than that God gambles with his universe rather than governing it prudently. Secondary causes are, actually, submitted to the oppression of a determining fate apart from God rather than to his wise choice – their “freedom” is illusory, except that they have no capacity to distinguish illuison from reality.
If I’m irritated by that it’s because it’s self-contradictory and promoted as theologically orthodox – indeed as a necessary replacement for historic orthodoxy. | 2019-04-18T21:22:12Z | http://potiphar.jongarvey.co.uk/2014/07/07/lets-go-back/ |
Recent Placements — Aaron Consulting, Inc.
Midwestern-based vertically integrated private company seeks a general counsel to lead the legal function and join their executive team. Candidates should have 15+ years broad-based legal experience with multiple employers. Position will involve real estate, general business/operations matters, financing, transactions, human resources and employment law, intellectual property and licensing, litigation, and outside counsel management. Parent company owns well-regarded operating entities in the real estate, specialty store, restaurant, alcoholic beverage production, liquor distribution, and other sectors. Any relevant industry experience is highly preferred. Prior attorney supervisory and management experience is required. This is an exciting opportunity to work with a diverse portfolio of companies and play a bigger role in a smaller environment.
Growing distribution and logistics company seeks an attorney with 7-10+ years experience to oversee real estate and transactional matters. Candidates must have experience negotiating and drafting industrial and warehouse leases, along with other general real estate experience. Candidates should also have transactional experience with mergers, acquisitions, and divestitures. Knowledge of bankruptcy law and licensing matters are pluses.
North American headquarters of global specialty products distributor seeks an attorney with 5-10+ years experience in employment law to join its expanding legal team. Candidates should have a focused employment law background with light exposure to traditional labor issues. Position may include a small amount of executive compensation and ERISA matters. Excellent opportunity to add value in this newly created in-house position.
Publicly held plastics product company seeks a junior/mid-level attorney to join its lean legal department. Position will be responsible for matters pertaining to corporate governance and securities law issues, including required 1934 Act filings. Secondary job function is to negotiate and draft a variety of commercial contracts. First-rate general counsel mentor and executive team member. Candidates should possess 4–10 years experience in relevant areas of law.
Publicly held Midwestern medical device manufacturer and developer with stellar executive management team seeks an attorney with 10+ years experience to lead the corporate legal and secretarial function. Candidates should possess a strong general corporate legal background in mergers and acquisitions, commercial contracts, corporate finance, securities, and corporate governance. Prior hands-on legal department management experience is preferred. Exposure to licensing and management of intellectual property legal matters is helpful. This position is part of the company’s Executive Team.
$2+ billion publicly traded chemical/specialty materials company seeks an IP attorney with 7–10+ years legal experience to provide counsel, support and assistance in patent and technology protection/exploitation to certain company business units. Position will direct the technology portfolio protection process from innovation identification through trade secret establishment/maintenance and patent preparation/prosecution/maintenance. Position is located at a business unit technology center, and will be the sole attorney at this location. Additional responsibilities will include negotiating and drafting agreements for joint development and technology exchange, and managing budget and resource allocation. Position reports to Chief IP Counsel of company, and may require assisting in IP components of M&A activity. Candidates must be admitted to practice before the USPTO and have a background in chemistry, chemical engineering, or a similar discipline. Light travel is required. Current or previous in-house experience is very strongly preferred.
Publicly traded heavy industry company seeks an attorney with 8+ years experience in labor and employment law. Position is responsible for counseling management and human resources personnel concerning labor, employment, health, safety, compensation and benefits, and contractual issues. Position also manages general litigation and arbitration proceedings. Additional responsibilities include negotiating and drafting commercial agreements and drafting company policies and plan documents. Previous experience in the utility/energy industry is beneficial. Position is open due to prior placement’s advancement within company.
$3 billion publicly traded industrial company seeks an M&A and securities attorney with 6+ years experience to join its lean legal department. This position offers a leading role as legal counsel on matters pertaining to mergers & acquisitions (55%), ’34 Act securities compliance and corporate governance (45%), and corporate finance (5%). As lead corporate counsel, this position has significant contact with executives at the highest level of the company. Prior experience directly counseling public company board members, especially Audit Committee and Compensation Committee members, is strongly preferred. An undergraduate accounting degree or CPA designation is preferred. Having an MBA or additional business experience is also helpful. Three persons employed in this position have succeeded in becoming General Counsels of this and other peer companies.
Fortune 50 manufacturer seeks an attorney with 4-7+ years commercial contracting experience, dealing with large-scale service and product suppliers, to join the legal team of a growing, $8 billion division of $30 billion product group. This position will support the senior supplier manager and an executive team in charge of maintaining, refurbishing, and repairing complex technological products. Candidates must be experienced in negotiating and drafting a wide variety of commercial agreements. Additional experience with contract litigation and manufacturing industry regulatory matters is a plus, as is experience handling supplier bankruptcies. Candidates must be able to serve as the sole attorney to the division’s executive leadership, as well as function as a member of a dynamic legal team. Graduating in the top 10% of a law school class or from a top law school is required. This company offers exciting career growth for highly motivated individuals, and is an ideal opportunity for someone wishing to transition from a high-quality law firm career to one with an American industrial icon.
Thriving, well-established, NYSE-listed multi-billion dollar industrial products manufacturer seeks a General Counsel with 15+ years of solid experience in M&A, international, and litigation management to lead its talented legal department. Prior employment as General Counsel or multinational Division Counsel of a publicly traded manufacturing company is preferred. Strong boardroom and/or strategic management team experience also preferred, as is attorney management experience. This position is listed in the company’s Proxy Statement and is a part of the company’s executive officer team. Company is located in an attractive, family oriented smaller city.
Major agribusiness company with $50 billion in sales seeks a commercial contracts and transactional attorney with 4+ years experience to join its legal team. Position is responsible for negotiating and drafting a wide variety of commercial contracts and agreements, as well as handling some M&A, joint venture, and other transactional assignments. Knowledge of commodities regulation and futures trading is a plus.
Fortune 100 manufacturer seeks an attorney to lead its trade controls practice in Washington, D.C. office. This newly created position is part of the Global legal affairs group and serves as the lead lawyer responsible for coordinating and managing all global trade controls matters enterprise-wide, including developing procedures and training related to import and export requirements, executing import and export transactions and licensing, monitoring for compliance, interacting with government regulatory agencies, and providing leadership on trade control strategy. Candidates should possess 10+ years exceptional legal experience with international trade matters, trade controls, imports/exports, International Traffic in Arms Regulations (ITAR), and Export Administration Regulations (EAR). Candidates should be experienced in interacting with the Bureau of Industry and Security (BIS), the Office of Foreign Assets Control (OFAC), and the Directorate of Defense Trade Controls (DDTC). The ideal candidate will be a leading practitioner in the trade controls community who has demonstrated a capacity for working on large-scale matters with substantial experience implanting and assessing trade control compliance efforts in the heavy manufacturing, defense, or aerospace industries.
One of the nation’s most well-respected Fortune 50 corporate headquarters, based in a major league city, seeks an attorney to join its extraordinary legal team. This position serves as the chief corporate governance and securities counsel for the company. As the company’s legal expert, candidates must possess a minimum of 10 years exceptional experience on matters pertaining to all facets of ’34 Act and Sarbanes-Oxley regulations. Candidates must have experience directly counseling Board and Executive Team members on these matters. Experience must include preparing and filing annual and quarterly reports, proxy statements, earnings releases and other reporting obligations. Prior Fortune 250-level corporate boardroom exposure is strongly preferred, as is experience providing counsel on corporate officer compensation issues.
Fortune 50 industrial manufacturer seeks an attorney with 8–20+ years experience to support its major commercial products business. Position is responsible for large-scale, often global commercial transactions, resolving issues arising from international legal work, and assisting with follow-up product support within the group. Candidates should possess in-depth sophisticated commercial transactional experience, and have some exposure to or familiarity with export issues, the Foreign Corrupt Practices Act (FCPA), and offset agreements. This is an exciting opportunity to join a great legal team. Position is open due to internal promotion.
Fortune 50 company seeks a highly experienced Mergers & Acquisitions attorney to join its legal team at its corporate headquarters and lead the M&A function for the legal department. Qualified candidates will possess 10+ years experience being in the center of multi-billion dollar transactions of significant complexity, and also be very experience in finance matters. This is a fantastic opportunity to join an exciting employer in an exciting industry.
Publicly traded national provider of healthcare services seeks an attorney to manage Medicare appeals process. Candidates should possess 3+ years experience with Medicare appeals, either as the payee or payer, and be able to manage a high volume caseload. Additional medical education or training is helpful, and familiarity with skilled nursing facilities, rehabilitation facilities, and long-term acute care hospitals is beneficial.
Multi-billion dollar wholly owned subsidiary of Fortune 50 international manufacturer seeks an attorney with 10+ years experience to join and assist in managing its lean legal department. Primarily responsible for negotiating contracts as well as providing counsel on matters pertaining to business strategy for global wholesale parts operations. Candidates must possess extensive commercial contract negotiating experience, dealing with drafting small and large, short-term and long-term supply and procurement agreements. Additional exposure to employment law, sophisticated transactions similar to M&A, export controls, antitrust, and EU concerns is a plus. Some prior business experience or experience on a strategic lean business team highly preferred. Previous attorney supervisory experience is a plus. Exposure to sophisticated high technology or aerospace products is a plus. This opportunity provides upward mobility within the organization for the right candidate.
Major high technology manufacturer seeks an attorney with 8+ years experience to grow its Information Technology legal practice. Candidates should have experience with electronic access agreements, privacy and security issues and regulations (personally identifiable information), technology licensing, VoIP, and basic intellectual property transactions. Knowledge of export laws and EU Safe Harbor Privacy Rules is helpful. Company possesses one of the largest non-governmental intranets in the world. This is a great opportunity for a motivated attorney to grow and develop this position and make it their own.
Privately held manufacturer headquartered in North Central Indiana has created an opportunity for a second attorney to join its company. The person selected will have 5+ years legal experience and will handle a wide variety of day-to-day legal matters including general commercial litigation management pertaining to product liability and warranties, commercial contracts, intellectual property, employment and corporate governance. Person will also be directly involved in business matters, including litigation prevention, contract negotiations and policy formation. Strong preference for candidates with some knowledge of manufacturing-related legal issues and strength in handling broad-based litigation. Position will report to the General Counsel. This family run, team-oriented company offers stability, professional growth, and highly competitive compensation for the right candidate.
Well-regarded, NYSE-listed healthcare provider seeks an attorney to lead its legal department and serve on the Executive Management Committee. Executive hired will provide legal advice on company strategies, manage the internal legal function, retain and manage outside counsel, and have legal oversight of business transactions (including acquisitions, divestitures, and joint ventures). Candidates should possess 14+ years corporate legal experience with an emphasis on corporate transactions, securities, operations, and litigation management. Prior employment as Chief Legal Officer with strong boardroom experience preferred. Experience with SEC, NYSE, and Sarbanes-Oxley and related regulations, along with corporate governance experience with a public company board of directors, is required. Company will also consider candidates with prior CLO experience with regional and national healthcare providers.
Fortune 50 manufacturer seeks an executive attorney with a minimum of 15 years experience to be the lead lawyer supporting Environmental, Health & Safety activities and manage the supporting law practice. Position is responsible for oversight of the full range of federal and state environmental, health and safety legal issues—including managing related internal litigation and outside counsel—for a company with multiple U.S. manufacturing and office sites and some international sites. This position is also responsible for personnel and administrative management of the EHS legal team, including work assignment and distribution, oversight and guidance, and attorney development and hiring. A background in business and commercial contract issues related to environmental, health and safety law is required.
Growing, well-regarded, privately held real estate developer and property manager with relationships with national and regional retailers seeks a real estate attorney with 4–12+ years experience to negotiate, draft and review a wide variety of real estate contracts and transactions, including leasing and related documents. Development projects are both retail and residential in nature, while leasing work is 100% retail. Company seeks a great team player who enjoys making significant contributions within a comfortable work environment.
Major complex high technology manufacturer seeks an attorney to support its multinational government and commercial sales programs, along with new business opportunities. Candidates should possess at least 5+ years experience in sophisticated business transactions, including multinational government contracts and large scale domestic and international commercial manufacturing agreements. Position requires previous experience in litigating or drafting and negotiating U.S. government contracts valued in excess of $100 million. Exposure to export compliance, intellectual property and risk management is a plus but not required. This high profile global company provides ongoing career advancement opportunities in a collegial team environment.
Multi-billion dollar heavy industrial manufacturer headquartered in the St. Louis area seeks an attorney to join its lean and very talented legal team. Candidates must possess 6–14+ years experience in employment/labor law and commercial litigation. Position will be responsible for corporate and operations HR counseling on a wide variety of employment regulatory and compliance issues, responding to disputes and EEOC charges, drafting non-compete, confidentiality and other agreements, and miscellaneous traditional labor issues as they arise. Position is equally responsible for managing commercial/contract litigation companywide. Exposure to ERISA is helpful. Prior mentoring experience is preferred as this position includes staff attorney supervision. This is a fantastic career opportunity for a self-starter to take a leadership role and make a difference. Open due to our previously placed attorney’s promotion into an executive business position.
Growing central regional office of multinational utility corporation seeks their lead regulatory attorney with 5-10+ years experience in utility, regulatory, or administrative law at the state or multi-state level. All candidates must have experience negotiating and litigating rate cases and resolving other regulatory dockets. Natural gas, electricity, water, or telephone service (not cellular or cable), preferably in multiple states (including MO, IL, IN, OH and IA). Previous employment at a public service commission is preferred. Exposure to litigation, alternative dispute resolution, or arbitration is helpful. Candidates should be self-motivated and business savvy. Position is open due to growth. Retained Search.
ENR 100 general contractor seeks an attorney with 10+ years progressive legal experience drafting and negotiating construction contracts, combined with construction litigation experience, to be its corporate headquarters general counsel. Previous hands-on negotiating experience on both private and public (local, state and federal) contracts is strongly preferred. Highly visible position reports directly to the CEO and will include very active participation on the Executive Management Team. Position will manage commercial and claims litigation and risk management nationwide. Additional well-rounded experience participating in M&A activities, administrative functions, labor and employment law, licensing, and corporate governance is not required but helpful. An undergraduate engineering or construction related degree or M.B.A. is not required, though may be helpful. Prior private practice experience is strongly preferred. Company is located in the suburb of a major league Midwestern city.
Attorney opportunity with high-profile Fortune 100 unit. Person will be the sole site counsel and provide government contracting and operations counsel to help develop several of the world's most interesting government contracts defense programs. Minimum of 10 years former major defense systems experience with the military, a defense contractor, or with a government contracts practice group in a major law firm is strongly preferred. Past experience must have an emphasis on drafting, reviewing and negotiating terms of sophisticated government contracts and not litigation experience. Additional experience with commercial transactions (subcontracts), export compliance, international transactions, and employment law is beneficial. Position offers extensive interaction at multiple locations with other senior business and legal executives, along with high-ranking government contracts officials. All candidates must possess strong "executive presence". Extremely desirable family-oriented location. Open for a second time due to promotion of our previously placed employees with this unit.
Fortune 50 industrial corporation seeks an IP attorney with 10+ years transactional and heavy data rights experience to provide legal advice and support to its major defense group. Position will advise business leaders, and prepare and negotiate intellectual property provisions and agreements concerning a broad range of government, commercial, and international transactions involving some of the world’s most sophisticated uses of cutting-edge technology. Such transactions will include government contracts, subcontracts, license agreements, mergers & acquisitions, teaming and joint development agreements, software agreements, firewall and proprietary information protection procedures, non-disclosure agreements, infringement investigations, and product clearances. Candidates should possess a diverse IP background with a proven track record involving U.S.government contracting and data rights, as well as commercial and international transactions. Exposure to export compliance would be helpful. Previous in-house experience a plus, as is former military/defense agency experience. Must qualify as a U.S. person and be able to obtain a top secret security clearance. Position is located in the metropolitan Washington , D.C.area.
Major defense contractor seeks senior attorney with 10+ years legal experience to advise on the formation, execution, and administration of complex weapon system prime contracts, teaming agreements, and other contractual arrangements. Substantial experience in government contracting and procurement is required. Commercial and international contract experience is also desired. Exposure to export compliance and government data rights is helpful. Previous in-house experience or military/defense agency employment is a plus. Position offers significant participation on and counsel to multiple internal management teams, leading and supporting several multi-billion dollar defense programs. Ideal candidate will be available for numerous significant advancement opportunities developing within the company in 5-10 years. Diversity candidates are strongly encouraged to apply for this position.
Prominent 100+ year old health insurer seeks attorney with 7 – 15+ years of experience to manage and direct litigation as it relates to operations, regulatory affairs, and administration. Position will interact with internal and outside litigation counsel to develop litigation strategy and watch for national trends in litigation (must be able to see the big picture). Person hired will provide litigation counsel to operations areas such as underwriting, claims management, customer support, medical management and the medical director’s office and be responsible for various administrative duties, including reporting, monitoring and planning. Person will also provide technical health/insurance regulatory counsel and train and coach others to do so. Candidates must possess first-chair or strong second-chair litigation defense experience in state and federal courts. Knowledge of federal health/insurance regulations, such as HIPAA, ERISA, COBRA, is preferred, but experience in a different heavily regulated industry, such as telecom or medical/pharma products, is acceptable. A background in healthcare is helpful. Candidates must be excellent team players and communicators, as this position requires frequent communication with different levels of management and multiple departments. Company is an excellent corporate citizen and has a highly desirable corporate culture. Retained search.
Major established high technology manufacturer seeks an IP attorney with 10-15+ years experience to support a growing commercial unit that is part of a massive commercial manufacturing and development group. The position is responsible for providing support and leadership in the areas of IP licensing, digital data rights, drafting, reviewing and negotiating IP provisions related to supplier, customer, partner and merger and acquisition agreements, IP litigation support, and investigative support on IP infringement allegations. Experience with electronic commerce is also desirable. This position does not involve any direct preparation, prosecution, or management of patents and trademarks. An undergraduate degree in electrical or computer engineering is preferred. Diversity candidates are strongly encouraged to apply for this position. Position is part of a lean legal department, offering high visibility throughout this state-of-the-technical-arts entrepreneurial unit and strong potential for advancement via succession planning throughout the company. Very exciting.
Attorney opportunity with high-profile Fortune 100 unit. Person will act as lead counsel on one of the world's most interesting government contracts defense programs. Minimum of 10 years former major defense systems experience with the military, a defense contractor, or with a government contracts practice group in a major law firm is required. Preference for candidates with some in-house contracts experience. Position offers extensive interaction at multiple locations with other senior business and legal executives, along with high-ranking government contracts officials. All candidates must possess strong "executive presence". Extremely desirable family-oriented location. Open due to promotion of our previously placed employee with this unit.
$1.8 billion defense contractor seeks lead division counsel for a $600 million government contracts unit with multiple facilities employing 1,800 people. Candidates must possess 8–15+ years experience with a heavy emphasis on government contracting and procurement, including deal structuring and negotiating and drafting innovative sole source contracts, teaming agreements, some international sales and import/export control. Working knowledge of employment and labor law is necessary for mostly day-to-day counseling of employment matters. Position will also be responsible for unit's litigation management and environmental legal issues. Position responsibilities will include supervision of two government contract attorneys and is a direct report to the Corporate General Counsel. This well-managed company has a history of profitability. Division is based in a very attractive major league city. Retained search.
Multi-billion dollar defense contractor seeks attorney for a $550 million government contracts unit with multiple facilities employing 2,600 people. Candidates must possess 5-12+ years experience with a heavy emphasis on government contracting and procurement, including deal structuring and negotiating international (FMS, FMF, and direct foreign government sales) and domestic contracts, as well as drafting sole source contracts and teaming agreements. Working knowledge of employment and labor law, import/export control, commercial contracts, environmental law, and government and commercial litigation will be useful, but not required. Position will be the sole direct report to the unit's division counsel. Position is located at the division's headquarters, which is based in a very attractive rural area with excellent public schools, no more than one or two hours' drive from several major Mid-Atlantic cities. Retained search.
$18 billion financial services corporation seeks an attorney with a minimum of five years of legal experience to work in its cutting edge Life Insurance Group’s lean legal department. Fifty percent of responsibilities will include negotiating and drafting a wide variety of contracts, including stock and asset purchase agreements as well as agent-oriented agreements. Remaining half of position will involve supporting Group internal clients, 10,000+ agents and 350,000+ policyholders, including answering policyholder and agent questions and dispute resolution. Also, this position may involve up to 30% litigation management, depending on candidate’s background and experience. This growing Forbes 500 company is very lawyer-friendly and offers business career potential. Position will report to the Group General Counsel, a person we placed with the company at this level. Experience in the financial services industry is not required. We have a retained exclusive arrangement with this client.
Major Forbes 100 corporate headquarters seeks a well-rounded environmental and operations attorney with 5-15+ years experience to join their lean legal department. Candidates must possess a minimum of 5+ years in-house experience specifically with a bulk chemical manufacturer, steel producer, petrochemical/oil refinery company, or other heavy industrial manufacturing process employer. Superior client communications skills will be required in this leadership position involving lead contact on all operations contractual and environmental legal issues, including participation on operations business teams. Corporate executive management has an outstanding reputation in their industry.
Major publicly traded telecommunications company seeks a regional attorney with a minimum of 4+ years telecom experience to primarily be responsible for creating a multi-state CLEC, receiving certification to provide services in various states, and negotiating required third-party agreements. Qualified candidates must have experience negotiating and reviewing interconnection agreements, certification applications and certification changes for a Public Utilities Commission, and be well versed in the Telecommunications Act of 1996. Position will help establish a cutting-edge entity with voice-over-internet protocol technology. Exceptionally well capitalized company. Newly created position reports to Vice President, Regulatory and Telephony attorney, whom we also placed.
Lean-and-friendly, very profitable, multibillion dollar manufacturing company seeks the primary attorney to assist the Chief Counsel in multi-group contractual matters pertaining to operations, international, e-commerce, mergers and acquisitions, antitrust and trade practices legal activities. Candidates should possess 5+ years legal experience, preferably with some previous in-house legal employment.
Major complex high technology product manufacturer seeks an intellectual property attorney with 15++ years experience involving attorney management and high level, broad-based IP client counseling. Previous in-house attorney supervisory experience and IP department management with a manufacturer/technology company is required. Highly visible position reports to the Corporate Headquarters Chief Patent Counsel and local Group V.P., General Counsel. Massive yet expanding Group has numerous internationally prominent projects and products. Qualified candidates will have demonstrated IP leadership, an ability to focus on the “big picture,” and possess strong interpersonal skills. Technical background in electronics desirable. Candidates will be required to become a member of the California Bar.
Multi-billion dollar manufacturing group seeks a government contract litigator with a minimum of six+ years experience involving complex government contract disputes and related litigation, including bid protests, qui tam and white collar criminal matters. Responsibilities involve preventive litigation processes, dispute resolution, and case management. Must have prior employment with a large law firm and/or the Armed Services involving prime contractor or major subcontractor litigation. Open due to internal promotion. This is a rare and stellar in-house opportunity for the uniquely qualified candidate.
Exceptional growth opportunity in the headquarters of a large publicly traded cable company based in a major league Midwestern city. Qualified candidates must have a minimum of eight years experience specifically handling FCC cable regulatory matters, including extensive working knowledge of FCC rules and regulations related to network non-duplication protection, syndicated exclusivity, commercial leased access, cable rate regulation, must carry, retransmission consent and open video systems. Familiarity with interconnection agreements, local right-of-way ordinances and pole attachment matters is also required. Executive hired will be the lead advisor to the general counsel and other executives on legal issues related to federal, state, and local telecommunications laws and regulations including the Cable Act of 1984, as amended, and the Telecommunications Act of 1996. In addition to the aforementioned areas of responsibility, person will respond to inquiries from federal and state regulatory groups, including the FCC, and will also provide functional advice or training on regulatory matters to less experienced attorneys. Casual dress code in a stimulating, team-oriented career environment. Client wants to fill this newly created position ASAP.
Mega-billion dollar financial services company seeks an entry-level commercial lending attorney to join its medium-sized legal department. Position will be responsible for negotiating and drafting a large volume of UCC contracts. Extensive client contact. Ideal candidates should have a minimum of 2 years of experience with asset-based or inventory-based lending representing major lenders, retailers or manufacturers in their commercial finance transactions. Some familiarity with bankruptcy law is helpful. Company is based in a suburban setting of an attractive major league city.
$10 billion division of a Fortune 50 company seeks lead counsel with 7-10+ years experience to advise on, negotiate and draft commercial and government subcontracts. Principal client is the V.P. - Procurement. Involves some offset work. International contracts experience is a plus. Some previous experience with government contracts is required. Position has an excellent track record for advancement.
Newly acquired division created this outstanding legal, legislative and public affairs career opportunity with expanding nationwide managed care provider and health insurer. Candidates should have at least 15 years of healthcare industry-related legal experience, plus several years supervising professional management. In addition to very general health law responsibilities, this executive will supervise four directors responsible for risk management, government affairs, compliance and public affairs. Position reports to the President of the Region.
One of the nation's largest companies seeks a seasoned executive attorney to lead the corporation's legal activities involving M&A, Corporate Finance and Securities. This opportunity offers a prominent executive position with a wide variety of professional challenges, a career with one of the nation's most vital employers, and a highly sought after West Coast lifestyle. Minimum of 15 years of experience required.
Career openings listed here were for nationwide searches. Client-requested local recruitment efforts (i.e. Los Angeles-based company seeking Los Angeles-based attorney) typically are not posted on our website. | 2019-04-24T03:01:57Z | https://www.aaronlaw.com/recent-placements |
Wellness and keeping fit is a very important aspect that should not be ignored in the life of human beings. Due to tight schedules, most people tend to forget the need to keep fit. That is why you view here for more need to have a wellness management team at your workplace to ensure that all the employees take wellness practices carefully. Proper timing should be done to allow for both work and wellness sessions for employees. The advantages of wellness at workplace will be experienced in the workplace performance. Here are the advantages of incorporating wellness at your workplace.
Increased and greater productivity is the expectations of all workplaces. Healthy employees will definitely give forth their best at work. If you have wellness practises at your workplace, you will have healthy workers whose work will bring about more productivity. If your workers are healthy, you will record a lower number of absentee cases related to health issues. If you are having employees who constantly fall ill, your company will experience losses from the money given out for medical expenses. With wellness practices maintained at your workplace, you will not have to go through all the trouble associated with worker illness.
The kind of workers that your employees do can sometimes cause illnesses and injuries. There are some work types that require employees to sit for long hours while working. Workers who sit for long hours are likely to develop backbone complications that can be expensive to treat. This is why you have to ensure that your workers undergo regular wellness and fitness programmes so that you can prevent such cases. Workers who do heavy manual work should be having regular fitness and wellness practical that they do not get injured during work. It is usually about the company that provides money for the workers that suffer illnesses or injuries due to work.
With an environment of work where people are healthy, you will have your workers motivated to work harder and feel motivated. Hard work will always be experienced form workers who are happy, physically and emotionally fit read more. Wellness activities keep your workers have wholesome health and this will ensure that you have more worker retention. Workers can get motivated to be more productive by the thought that their employer thinks about their wellbeing. Friendly work environments are necessary and you can create this using wellness programmes at your workplace. Motivate your workers more by giving them the opportunity to learn about their health and about the need to stay fit for more info.
Get urgent $ 800 inbox loan loans Lexington-Fayette, KY no employment verification . You can also apply instant $100 zocaloans loan Baltimore, MD within one hour .
Strapped for money? Uncertain how you can pay for the incoming monthly bills? If you have considered a payday loan and need more information, the subsequent write-up will assist. It contains some essential observations into payday cash loans, anything they will offer and exactly how they will often aid. Meticulously think about the information and facts as it relates to your own conditions.
When you find yourself choosing a business to obtain a payday advance from, there are numerous important things to bear in mind. Be certain the company is signed up together with the state, and adheres to condition recommendations. You must also try to find any issues, or judge process in opposition to each and every organization. It also contributes to their standing if, they have been in operation for many many years.
Payday cash loans are brief-term lending options and should just be used for unforeseen expenses. These lending options must not be employed to spend family expenses or ordinary living expenses. If you utilize a pay day loan for any of these costs, you run the chance of defaulting in your cash advance or another monthly bills.
If you are thinking that you may have to go into default with a payday advance, you better think again. The money firms gather a large amount of data on your part about things like your employer, and your deal with. They will likely harass you constantly up until you have the bank loan paid back. It is far better to borrow from household, promote issues, or do other things it will require to just spend the money for loan off, and move on.
If you are along the way of securing a payday advance, make sure you look at the agreement very carefully, trying to find any concealed service fees or crucial spend-back again info. Will not sign the deal until you understand fully almost everything. Seek out warning signs, for example sizeable charges when you go a day or more over the loan’s because of time. You could wind up paying out far more than the first loan amount.
For those who have time, ensure that you look around for the payday loan. Every payday loan supplier can have another rate of interest and cost framework with regard to their pay day loans. To get the lowest priced payday advance around, you must take some time to check financial loans from various service providers.
In case you are having a hard time choosing if you should use a cash advance, get in touch with a consumer credit history therapist. These pros normally work with non-income companies which provide totally free credit and financial aid to shoppers. These folks may help you find the correct pay day lender, or even help you rework your finances so you do not require the borrowed funds.
Know whenever your payday advance arrives. It is very essential that you will not suppose for this date, due to the fact if you are even some day later, you could end up with large penalty charges. Read through all of the fine print on your own documents, and try everything you may to spend the loan again inside the right time period.
When you obtain a payday advance, talk with any friends members which have presently done so. Question them with regards to their experiences and see which paycheck loan provider they chose. The more research you need to do ahead of time, the greater your chances is to prevent stepping into further more economic trouble.
Restriction your payday loan borrowing to 20 or so-5 percent of your own full paycheck. Many individuals get personal loans for more dollars compared to they could possibly imagine paying back with this brief-phrase trend. By acquiring simply a quarter of your salary in personal loan, you are more inclined to have sufficient resources to settle this financial loan whenever your paycheck lastly is available.
If you get a payday loan, make certain you pertain to a single lender as an alternative to multiple ones. You increase the probability that the application can get denied if you pertain to many different creditors simultaneously as it can certainly be observed as irresponsible with the loan companies.
Comprehend the rules. Picture you take out a pay day loan being repaid with by the following pay out time. If you do not spend the money for personal loan rear on time, the lending company are able to use the check you utilized as guarantee whether you will find the money in your account or otherwise not. Outside your bounced check service fees, you can find suggests in which the loan provider can declare three times the volume of your initial check out.
Quick money with number of strings attached can be extremely appealing, most specifically if you are strapped for money with monthly bills mounting up. Ideally, this article has opened up the eyes towards the different aspects of pay day loans, and you also have become entirely conscious of the things they can perform for both you and your current financial problem.
Get instant $ 900 inboxloan reviews Austin Texas no checking account . You can also apply quick $100 zocaloans reviews Hialeah Florida no credit check .
In today’s arena of quickly chatting salesclerks and scams, you ought to be an educated customer, aware about the details. If you locate oneself in a economic crunch, and looking for a fast payday advance, read on. The following report will give you advice, and tips you have to know.
Spend some time shopping around prior to commit to one financial institution. You will find a great deal of distinct cash advance businesses, every may have distinct rates of interest, as well as other phrases because of their loans. If you take serious amounts of take a look at multiple organizations, you save lots of your challenging-received cash.
It is crucial just to utilize one payday advance company. If you are using multiple payday advance business, it will likely be very difficult to spend the money for bank loan off. Simply because the financial loans are due and due on your own after that payday. Besides the due particular date, these personal loans hold very high fascination.
Steer clear of making decisions about pay day loans from the placement of anxiety. You could be in the middle of an economic turmoil. Believe lengthy, and challenging before you apply for a payday loan. Bear in mind, you should pay out it again, as well as fascination. Make sure it will be possible to achieve that, so you do not make a new situation yourself.
Simply because payday loans tend to be approved inside one day, you should not jump up on the first online payday advance firm you stumble all over. Various companies have various rates, service fees, and terms and conditions. Be sure to do research, and surf the net to find the best achievable business for you personally.
An excellent suggestion for any individual looking to get a payday loan is to avoid giving your information to financial institution matching websites. Some payday advance web sites match you with creditors by revealing your information. This could be really high-risk and in addition direct to many spam e-mails and undesirable cell phone calls.
If you comprehend the very idea of using a payday loan, it might be a handy instrument in some situations. You ought to be guaranteed to browse the loan agreement thoroughly before you sign it, and if you can find questions regarding any of the specifications ask for clarification of your conditions before you sign it.
When examining the suggested regards to a pay day loan offer, be sure you decide if there are any charges evaluated for prepayment of your financial loan stability. As a result, it can be easy to prevent paying out needless fascination if the cash necessary to repay the financing are, attained earlier than initially awaited.
If you want a pay day loan to get a costs you have not been able to pay because of insufficient cash, chat to individuals you are obligated to pay the money very first. They might allow you to shell out later as opposed to obtain an increased-curiosity payday advance. In many instances, they will assist you to create your obligations later on. When you are relying on pay day loans to acquire by, you can get hidden in personal debt easily. Take into account that you can purpose with your loan companies.
A good idea for anybody who is taking out a cash advance is to pay attention to any inspections which could inflatable bounce and give you insufficient cash. You will not only be billed by your bank, but additionally, you will standard on your own financial loan priced at you even more income.
When you find a excellent cash advance company, stay with them. Make it your ultimate goal to create a reputation profitable financial loans, and repayments. As a result, you may come to be entitled to greater loans later on with this particular organization. They could be much more eager to work alongside you, when in genuine have difficulties.
In case you are obtaining a cash advance for the first time, find out in case the loan provider puts a limit on the money you may borrow. Some companies may have a cover in your initially payday advance. Then will help you to borrow much more with your secondly, or third personal loan.
After looking at this short article, ideally you will be not any longer in the dark and also have a better comprehending about pay day loans and exactly how one can use them. Online payday loans allow you to obtain profit a quick amount of time with couple of limitations. When investing in all set to obtain a payday loan when you purchase, keep in mind every little thing you’ve go through.
Make sure you create a great CV and cover letter. With your CV and cover letter, you are introducing yourself to your potential employer and hopefully you can greatly impress them with it. You shouldn’t let failure bring you down so much. Accept the rejection and look for some other place to apply.
LInkedin is one social media site you should join. Employers consider those who are part of LinkedIn. If you are interested in certain industries, join their discussion groups and start building your social network so that you are updated on job offers. If you want to get noticed, then follow the companies that you like and put comments on their posts. Ensure that the comments that your posts are just professional ones.
Look for jobs outside of job listing. Focus on specific companies rather than vacancies. Your interest in the company will show in what you say when you apply for a job there. But you don’t completely reject job listings. Even if the company that you like has openings for positions you are not qualified for, send your CV and cover letter anyway. You will never know when that company will be needing people with your skills. If you make a great CV and cover letter, then you can show them what you’ve got.
When you come across a child who is physically challenged, you get to ask yourself some questions which you have no answers for and you may want to engage them in order to understand them better. It gets interesting when you are a teacher and you are qualified to teach this kind of kids since this will give you an opportunity to spend more time with them and you find that you will learn a lot from them. You will be required to consider the following factors when you intend to teach these kinds of children.
This work requires special kind of teachers who are able to tolerate these kids and their behavior since not all people are gifted with patience when it comes to dealing with special cases. You need to ensure that you have studied the students well in order for you to determine each case and know how to deal with each one of the kids. The kids require a person who is able and certified to deal with them and this requires you to undergo through such test to determine if you are fit to teach them.
This work requires people who have passion for it and not just about career and that is why you need to determine if you really have the passion or it is something else pushing you to do it. It is important to look at the website that provides information on every detail about teaching for special education which really help teachers to understand more. In this section, I will be talking about ways in which teachers who teach special education can learn to be compassionate and loving as it is stated in this website.
This site illustrates how teachers are able to see the everything differently through the eyes of their students and this impacts them to see things from their own perspective which can really help you out there. When teaching these students, you will learn that they fight so many obstacles from within and this makes compassionate about them which changes your relationship with people out there. You can get close to these kids by ensuring you have enough patience on them and their shortcomings since this is what will make you understand and be patient with people around you.
Trees are essential in an environment. There are many reasons why we should plant trees around us. Among the benefits of planting trees is to filter the air especially in these times of environmental degradation. Trees increase the amount of rain that we receive. Trees are also necessary for areas that experience soil erosion. The trees ensure that that soil is intact. Trees can also be used as shelter in dry seasons. The last essential advantage of tree planting is that they are critical for improving the landscape of a place.
Though trees are essential there is need to maintain them so as to serve the advantages. Not taking care of trees can be very risky and it can end up causing harm and not benefit. There are also times when trees pose as a danger to human beings if they grow close to a building they can be the cause of the building collapsing. For these reasons it is necessary to pluck these trees to avoid this kind of disasters. Trees if left unattended can grow and abstract ways, therefore, making it hard to pave through places. Tree removal without the right skills is risky. The best thing to do is to hire the services of tree service companies. These professional tree services have the expertise and the skills to sort all the issues that people have concerning trees.
There are many reasons why it is necessary to entrust the responsibility of maintaining trees to tree service companies. Tree services have the right equipment for doing a good job. Removing a tree without having all the tools does not remove all the parts of a tree it only deals with the track living back the roots on the ground; hence the tree continues to grow. The other essential advantage of hiring these companies is because they have the technique of doing an excellent job. The other benefit of these companies is because they also take care of the young trees. Young trees may sometimes not thrive if they are growing amid other older trees; therefore it is necessary to ensure that they receive all the requirements for growing. These companies trim the twigs that create a canopy that makes it challenging to access sunlight and rainfall. Tree services have the capacity to the composition of the soil and to decide it’s the best for growing trees. Professional tree services companies are also essential because they clean all the mess. They do not live the compound with the remains of the leaves and twigs they cut, they live the place clean that they found it. For convenience it is necessary there is a need to let tree services conduct these work. Tree services are necessary since one does not have to buy the tools for doing these task. These companies do a quick job because they have the equipment and the technique.
Opting to build a house rather than purchase one is a tough decision to make. Building a house for yourself does not take too long and you should not fear to do so. You will need to hire the most appropriate builder for the task so that your dream can be a reality. The process of choosing the right builder does not have to be a difficult ordeal when you have a few tips to guide you. Here are some things you should never overlook when making your choice.
You should check the reputation of the builder. You should find a builder who is well talked of by his clients as well as money-lending institutions. You can check the website of the builder for reviews made by current and past clients. A builder who does not care about the satisfaction of his clients will not bother to respond to any issues raised by clients, which will be evidenced by unresolved issues on their website. If the builder has positive reviews from clients, they will probably offer you a satisfactory service like they have done in the past to other clients. You should judge a builder from their track record.
Consider the experience of the builder. Know the number of years they have built homes. The more the experience of a builder, the lesser the chances of mistakes during the construction of your home. It is easier to deal with an experienced builder because they have dealt with a wide range of homes in their years of service. You can request to see photos of houses they built in the past or visit the homes to check how well the builder constructed them. It is a good way to identify any faults that are common with a builder so that they can avoid them when building your home.
You need to check the certificates of the potential builder. Do not hire a builder who is not qualified to offer construction services. You should request to see their academic qualifications and whether they are updated about the latest developments in the construction industry. Their licenses to work should also be updated. Updated licenses mean that they can offer you services adequately and legally.
Consider the charges of the builder. Compare the prices of a number of builders by requesting for their quotations. There are builders who give their quotations and might not give room for negotiations. It is important that you establish all costs that you will incur in the process o that you hire a builder that is compatible with your budget. The factors discussed above are helpful when choosing the right builder for your new home.
Music can make even enemies listen to one another. Music transcends most cultural barriers. This is clear to see when even unborn babies seem to enjoy it. Music is also a great learning tool, as it is used in addressing cases of autism. Here are the methods through which this is done.
Music is beneficial for verbal development. Most kids who are autistic tend to lack the ability to speak properly. You will see them either struggling to make the sounds others do, or taking too long to get to that level. There are some who will eventually speak perfectly, while others may never manage to. Music therapy shall thus come in handy. It shall make a bridge between the verbal and non-verbal sides of the brain. Such stimulation is how the child shall develop their speech skills. Those simple gestures of clapping and humming to music shall help them develop immensely.
Music is also needed where social skills are to be developed. There is a tendency for autistic kids to be withdrawn. The work of therapists shall thus be that much harder. Music is what shall get them to come out of their hiding places and engage the world. Therapists will now have a way to connect with them and help them more effectively. Music shall, therefore, help them develop more relationships, when they engage other kids in music playing sessions.
Music also helps them with their moods. We all tend to deal better once we have listened to music. Autistic kids are the same. Music allows them to feel good, as well as express their emotions. It is hard for them to go through life feeling not understood, or not managing to express themselves. This is part of their existence. They shall feel it even more in social circles. Music therapy is what shall lower their anxiety and stress levels.
This is why you need to search for the best therapy center for your autistic child. Music therapy should be offered a part of their treatment plans. This site shall have plenty for you to read more about that center. The good thing about music therapy is that even parents can be taught how to do it. This therapy allows for a simple application that needs not much specialization. You can, therefore, discuss the process with your child’s therapist, to discover more about how best to do it.
There may come a time when the child does not respond to anything else. These are the times when you will need to know how to apply this therapy. You shall achieve peace when the child is fine. You shall also find more info about how to approach them the best way on this website.
ISO 9001 is an international standard which specifies the requirements for a quality management system. Organizations make use of the standard. They do so, so as to show their ability to meet the customer’s needs and the regulatory requirements. Organizations regular provision of products and services helps meet customer’s needs. The ISO 9001 helps to improve work and meet set objectives. The standard will ensure that staff are supported and the organization improves the customer satisfaction levels. An organization implements the ISO 9001 for several reasons. Check out this reasons here.
Organizations reasons to implement it are so as to meet the customer’s requirements. Some customers can only do business with certified organization. Business chances are increased due to the certification. The customer’s requirements are able to be met. The standard ensures that the organization continually strive to satisfy the customer each time. Satisfying the needs of a customer continuously results to customer loyalty.
Acquiring more revenue and customers is another reason for the implementation. A quality certification can be advertised by an organization. Doing this opens up new market for the organization. The certification will be particularly helpful in instances why a customer cannot engage with an organization that does not have the certification. An increase in revenue will be realized with the increase in customer base. The certification helps to improve the organization and the product quality. The standard is all about quality. The organization shows high level of quality by possessing the certification. High level of product quality is also portrayed by the organization. Quality management systems helps start the road of quality by an organization.
Customer satisfaction is increased in relation with the products. The high product and services quality will eventually cause satisfaction of the customer’s expectations. Less complaints are received due to high quality and the one received are handles in a better way. Customer satisfaction is increased because of the possession of the certification by the organization. The certification helps in describing and communicating the organization’s processes. A business metrics is used to identify and describe the processes in use. Better management and control of processes is achieved by doing this. The metrics is used to assist in understanding and communicating the processes performance. This is compared to the objectives of the quality.
The certification helps in improving the consistency of the organization’s operations. Variation of the processes used in the organization is reduced. Having no variation in the products and services offered to customers is important. Consistency in the output produced by an organization is assured by the ISO 9001. Efficiency is improved, money is saved and waste is reduced by the use of the ISO 9001.
Entrepreneurs are always finding better approaches to market their organization. However, relatively few of them consider employing an internet advertising firm to deal with their website optimization and web promoting effort. Many think that they can handle internet marketing by themselves. Even though this is true, some firms cannot manage to implement internet marketing methodologies like SEO and many others perfectly. In the literature below, you will get more information on why it is integral to procure the services of a website marketing company that will help in website design and SEO.
Expertise is presumably the most apparent reason, yet website design enhancement specialists give the majority of their time to adapting new advertising techniques and web optimization positioning elements. They are going to use all their time and effort to support the business that has hired them so that they can have a great search engine ranking. Web index firms see how to dispense different assets. If you have been applying a PPC marketing tool, they are going to analyze it and help you make it better based on your desired objectives. They are going to aid you in developing your short term goals to assist in achieving the long term objectives. In website design, changes always take place. Whatever was best in the past wouldn’t be pertinent today and changes must be executed. So you can remain refreshed with the most recent issue on web promoting, it is vital if you obtained the administrations of a site publicizing association. They know the best way to help you pull in as many customers as you desire. Their strategies reach out past crude methods. They know precisely what individuals react to. Such experts collaborate with other top site publicizing firms to become familiar with the present strategies and the ones that they can use for your association. It is the main role of the firm to ascertain that they are updated on the latest web advertising techniques to help their customers perfectly. The creators additionally take their customers’ close to home inclination and objectives to mind.
When you are expressly dealing with site adverting matter like website optimization and a lot more it can devour a ton of your time. Since you are attempting to develop your business, you don’t have time to squander, as you have different occupations to finish. With a website marketing company, you get everything done for you. They are going to be with you every step of the way. You will discover that contracting a site promoting firm is an incredible move for your business. Guarantee that the firm has a decent web presence before you contract them for the same.
Given the fact that there are multiple service providers in the industry, choosing a competent, reliable and efficient office interior design company can be a daunting and stressful task. You need to be careful when choosing an office interior design company because not all service providers will understand your business needs and provide quality services. With the right information and proper market research, an individual can easily choose the best office interior design company. This article, therefore, explains some of the crucial factors to consider when choosing an office interior design company for your business.
The first factor to consider when hiring the services of an office interior design company is the level of experience. The business owner should understand that once developed the business will use the office for many years hence the need to make sure the right service provider is hired for the project. The interior design company you hire should have many qualities which include creativity, good color sense and eye detail, excellent communication skills, and problem-solving abilities. You need to look for an office interior design that has completed many projects successful as this will give you an insight to their level of experience.
The second consideration you need to make when choosing an office interior design service company is the reputation. Reputable office interior design companies deliver quality services to their customers. You, therefore, need to access the status of the interior design service company before you enlist their services. The business owner needs to check the reviews of the various businesses the office interior design service company has worked with in the past. You should choose an interior design company that has many positive reviews because this indicates that they offer quality services to their clients. Apart from checking for reviews online, you can consult with friends, family members, and other close entrepreneurs for referrals. Prior to trusting any office interior design company with your project, you need to do a complete investigation of the organization by checking things like level of experience, cost of their services and reputation.
Getting a new computer today is a lot easier compared to how it was before. To get your own gaming PC, you have to understand the guide below; it will help you get a gaming PC without having to worry about credit check problems. A bad credit history is not going to be enough to stop you from getting your very own gaming PC and if you are interested in knowing more, make sure to spend another five minutes in reading this guide. To get a gaming PC with a bad credit score is actually possible as long as you know where to go and what to do; you don’t have to have a high credit score to get one. If you do decide to get a new computer, you have to make sure that you take the time to read the article because it will explain to you why credit score will not matter at all. If you want a new gaming PC, make sure you get the memo and follow what the article below will tell you to do.
One of the best ways to get a new computer is through a rent to own program. You don’t have to worry about your credit score when you join a rent to own program because all they need from you is your monthly payment.
Renting out the new PC is going to be a smart option for people who have bad credit scores because they don’t have to worry about problems that personal loans provide. For a rent to own store, what’s important to them is just to get the monthly payment; credit score for them does not dictate the capability of a person to pay their debt.
This is quite simple for a complex problem; you get a rent to own store build you a PC, they lease it to you and then you take the PC home, use it like it was yours already and pay for the monthly fee when it is time to do so. The gaming PC is finally and legally yours when you are done paying the amount; it takes around a year or two to get things done. You can get your own computer in a much easier fashion; the one that does not include credit score.
It is our responsibility to take care of our health. This is because of the advantages associated with the move. There are so many measures that one can take to ensure that they take very good care of their bodies. For instance, it is important that you be very choosy on the kind of foods that you eat. In other words, avoid taking foods that are not healthy. Seeking medical attention in case of an infection is the other thing that you should always do. It is always a wide idea for a person to go for checkups once in a while. One should do so even if they are not feeling sick. By doing so, you will be able to prevent very many infections that might happen in the future.
You also need to work out a lot. You can exercise in various ways. For instance, you can choose to go to the gym. The other option is where you get to work with a personal trainer. Going for morning or evening runs is another brilliant idea. The workout that professional athletes subject themselves to, is more intense than that of regular people. One thing that you need to know is that it takes more than just exercising to have an athletic body. One of the other things that you will need to care about is the kind of food that you eat. You should stick to healthy eating habits. Fortunately, there are so many restaurants these days that serve their customers healthy meals.
Very many operations have been simplified following the use of the internet. This is the case even in the food industry. For instance, it is very easy nowadays to order healthy meals from wherever you may be. There are so many advantages associated with this move. Some of these advantages are as follows. One amazing thing about ordering healthy meals online is that it is a convenient way of doing so. To acquire the meal you want, you do not need to move from one place to another. The only thing that one requires is a mobile phone and the internet connection.
The other thing is that the population of restaurants that deliver healthy meals are quite high these days. This means that you have the option of choosing the one to purchase your meals from. During the process of making the selection, there are so many things that one can put into consideration. One of them is checking out the online reviews and testimonials. The high levels of competition between these restaurants that force them to reduce their prices. They do this as a way to entice people to purchase these meals from them.
In conclusion, these restaurants provide home delivery services to their clients. In some cases, customers are not expected to pay for home delivery services.
Auctions are prevalent in society today because people will want to get the chance to buy the best product by quoting the highest price. It is a common belief that auctions involve items that are not in good condition for standard sale. That’s not the case because you can also auction your most valued property. Property auctioning is done because you have a concrete explanation to the need. Whatever the reason, you need to find an auctioneer company that will make your sale smooth. The following aspects explain the qualities that the best auctioneer company exhibits.
Soft skills that are needed for proper communication are necessary for the auctioneer to be able to auction your property successfully. They need to be able to control the buying crowd so that the buyers get involved. Giving buyers time to express themselves and quote their bids is necessary. This will raise the chances of getting the highest bidder in a short period.
As a property owner who needs to get rid of your property through auction, you have to find an auctioneer who is professionally experienced to handle sales. Many interested buyers will be able to attend the auction if the auctioneer knows the best way to reach them. Also, you will need to be updated frequently by your auctioneer on the progress of how they will auction your property. Frequently talking with the auctioneer will ensure you how things are going every step of the way.
You also need to find an auctioneer who respects you and buyers. People skills should not make the auctioneer instill fear in interested buyers rather than boosting confidence. An auctioneer with a vast knowledge of auctioning should be able to understand their critical role of selling your property to the highest bidder. Discouraged buyers are most likely to walk out of the sale when it is still in the middle.
Look for a company that has a positive image. By doing this, you will be able to get great buyers for your property. You also have to consider gathering information on the best auctioneer company to approach.
If you are run a marketing agency, or are a website designer, or you actively host websites, and you don’t know how to accelerate the performance of these sites that you are handling, then this article will help you. Turns out that all you need towards this end is a web acceleration platform. With this solution, you get improved conversion rates, superior performance, and it decreases the load time. All this can be achieved by a single license. It is a one server-wide caching, one-click cache acceleration solution that has a built-in security, and gives you peace of mind while still accelerating the client’s ecommerce. Before getting that license, it is best to look critically at what is on offer and what you need because there are different web acceleration platforms that are ever increasing in the market. See below how to choose the best web acceleration platform.
Start by doing some research. Basically the best one is one has can be managed simply, is flexible and highly configurable, has a high availability failover, has the best customizable acceleration and so on and so forth. So, it is wise to first to do as much research as you can so that you can find the one that meets your needs. You just need to educateyourself a little more on the choices that you have on the table first.
The web acceleration platform that you choose must also be cost-effective. You shall therefore have to look at the different licenses there are and then do a cost analysis to see which of them fits into your budget.
It is also important to think about support. It is important that there be a support team that can handle any security issues or any other issues thereafter. The platform may allow a graceful restart and updates without any downtimes, but you may have a need here and there for the support team and working with one like this will make the experience better.
Read reviews and testimonials to be able to see what more can find out about the web acceleration platform from others that have used it before. It is via such reports that you can learn if there will be some limitations that you should be aware of.
The web acceleration platform needs to be one that has a lot of features that you can work with. It is best to choose one that can grow with you as your business grows and your needs start changing even if the platform seems a tad overwhelming at first. You are better off working with a platform that has the capacity to handle your needs as they come.
The above are some of the things that you can use to find the best web acceleration platform in your bud to improve user experience.
There are many outcomes of being accused of a criminal offense. For instance, being accused of a criminal offense can result in emotional, financial and mental stress and headaches. being accused alone before even the case is heard in the court can ruin your life. This is because the society an individual accused of a criminal offense is already guilty even before the official judgment is passed by the court. When facing criminal charges, the priority thing you need to do is to look for a reputable, experienced and reliable criminal defense attorney to handle your case.
Since there are multiple criminal defense attorneys, choosing a service provider can be a challenging task specifically to an individual who has never been in the same position before. When searching for the right criminal defense attorney, you need to comprehend the fact that not all lawyers are suitable for your case. A person should, therefore, be keen when hiring the services of a criminal defense lawyer for their case. Given useful information and adequate market analysis of the available lawyers, an individual can easily identify the best criminal defense attorney for their case. This report discusses the various useful tips to examine when searching for a criminal defense attorney.
The first consideration you need to make when looking for a criminal defense lawyer is the license. You need to choose a licensed criminal defense lawyer if you want quality legal services and representation. It is important to note that attorneys are given licenses to operate in the law industry by the local authority, but in some instances, the permit can be terminated if the expert engages in unprofessional legal practices. Before issuing the license, the local authority ensures the expert has the right skills and training. Thus choosing a licensed criminal defense lawyer ensures you get quality services hence you can win the case and avoid a jail term or even fines.
The second factor to consider when looking for the right criminal defense lawyer is the reputation. An individual can effortlessly locate a reputable criminal defense attorney by consulting with people close to him or her such as workmates, family members, and friends. The next thing you need to do after getting a list of the various criminal defense attorneys is to consider them one by one by looking into things like level of experience in criminal cases, quality of customer services and their availability. Apart from getting recommendations, you can also conduct online research and look at the reviews of the various criminal defense lawyers to find a reputable service provider.
In conclusion, all the tips highlighted in this article are essential when hiring the services of a criminal defense lawyer.
The police will arrest people when they commit crimes or even when they are not the perpetrators, and this means their life will be turning upside down. Some people have a lawsuit filed against them, and this becomes scary and annoying when the prosecution team asks the state to give lengthy sentences for the action they did. In any prison, you come across people who got sentenced and serving a term, yet they are not guilty. Some people are guilty as charged, and they are completing their terms. When you go to court as an accused or accuser, you must hire a lawyer who gives representation. When people bring the law firm to stand with them, they increase the chances of winning that case.
It is your right to bring on board a lawyer to take up the matter. We know that hiring the law firm of Andrea M. Kolski means getting good representation for any matter. When you bring on aboard this law firm, you can rest assured that your case is in good hands and the outcomes will be positive. When accused of breaking the law and taken to court, a lot of stress and burdens comes, but hiring the lawyer will help you regain your mind. Many people who decide to go alone and stand trial will run to additional legal trouble and complications. If you find a lawyer to take up the matter, you get someone who knows the laws well. Since you have legal representation, the evidence is brought to convince the state that the ruling should be made in your favor.
There are many people who have gone to court and wants representation in Montgomery, and the best thing is to contact the law firm of Andrea M. Kolski to give them an excellent representation. When taken to court with a family case such as divorce, property distribution or child custody, you must find a lawyer here to go to court on your behalf. You might be having a criminal case which means you might go to prison for a longer time. The accused people will have the option of hiring the best Montgomery County criminal lawyer to avoid the conviction.
Hiring the Conroe criminal lawyer means they check the prosecution evidence and advice on the next step to take. The evidence might be too strong, and the lawyer hired will now come up with a defense plan that makes you win the case. They understand the loopholes to use and make the case lost. They will always have investigative resources which makes them have an ideal defense strategy. These legal experts have represented people facing the same challenge.
Laser hair restoration is actually a whole new approach to the treatment of hair loss that indeed deals with the problem a lot more effectively. By and large, this treatment to hair loss work through the application of the fine medical grade laser technology which in effect awakens the hair follicles and as such result in such growth of thick, supple and durable hair. Get the following as some of the reasons that explain the ever growing popularity of laser treatments and capillus laser caps clinical hair treatment products, why they have been the best alternative with many patients and practitioners out there.
First and foremost, compared to the laser combs, the capillus laser caps have proved to be better and far more effective. This is even looking at the fact that with the use of the capillus laser caps, you will be having your treatments for hair loss on the go. Indeed even by the submission by the hair restoration physicians, the use of the capillus laser caps has been approved to be one of the most effective approaches to the need to deal with thinning hair and this is looking at the fact that with it there is actually achieved such a consistency in the applications as such being far more effective. | 2019-04-25T16:46:52Z | http://realbiglinks.com/ |
Staphylococcus aureus activates a protective cell wall stress stimulon (CWSS) in response to the inhibition of cell wall synthesis or cell envelope damage caused by several structurally and functionally different antibiotics. CWSS induction is coordinated by the VraSR two-component system, which senses an unknown signal triggered by diverse cell wall active agents.
We have constructed a highly sensitive luciferase reporter gene system, using the promoter of sas016 (S. aureus N315), which detects very subtle differences in expression as well as measuring > 4 log-fold changes in CWSS activity, to compare the concentration dependence of CWSS induction kinetics of antibiotics with different cell envelope targets. We compared the effects of subinhibitory up to suprainhibitory concentrations of fosfomycin, D-cycloserine, tunicamycin, bacitracin, flavomycin, vancomycin, teicoplanin, oxacillin, lysostaphin and daptomycin. Induction kinetics were both strongly antibiotic- and concentration-dependent. Most antibiotics triggered an immediate response with induction beginning within 10 min, except for tunicamycin, D-cycloserine and fosfomycin which showed lags of up to one generation before induction commenced. Induction characteristics, such as the rate of CWSS induction once initiated and maximal induction reached, were strongly antibiotic dependent. We observed a clear correlation between the inhibitory effects of specific antibiotic concentrations on growth and corresponding increases in CWSS induction kinetics. Inactivation of VraR increased susceptibility to the antibiotics tested from 2- to 16-fold, with the exceptions of oxacillin and D-cycloserine, where no differences were detected in the methicillin susceptible S. aureus strain background analysed. There was no apparent correlation between the induction capacity of the various antibiotics and the relative importance of the CWSS for the corresponding resistance phenotypes.
CWSS induction profiles were unique for each antibiotic. Differences observed in optimal induction conditions for specific antibiotics should be determined and taken into account when designing and interpreting CWSS induction studies.
Staphylococcus aureus is a major cause of both nosocomial and community-acquired infections worldwide. Because staphylococci can adapt rapidly to varying environmental conditions they are quick to develop resistance to virtually all antibiotics and multiple-drug resistance, especially in methicillin-resistant S. aureus (MRSA), severely restricts antibiotic therapy options. One of the major targets for antimicrobial agents is the bacterial cell envelope, which is a complex, multi-macromolecular structure that undergoes highly ordered cycles of synthesis and hydrolysis, in order to facilitate cell division while maintaining a protective barrier against environmental stresses. There are several different classes of antibiotics that target specific cell envelope structures or enzymatic steps of cell wall synthesis (Figure 1).
Schematic representation of the enzymatic steps involved in S. aureus cell wall synthesis and the targets of cell wall active antibiotics. Fosfomycin inhibits the enzyme MurA (UDP-N-acetylglucosamine-3-enolpyruvyl transferase) that catalyses the addition of phosphoenolpyruvate (PEP) to UDP-N-acetyl-glucosamine (GlcNAc) to form UDP-N-acetyl-muramic acid (UDP-MurNAc) . D-cycloserine prevents the addition of D-alanine to the peptidoglycan precursor by inhibiting D-alanine:D-alanine ligase A and alanine racemase . Tunicamycin is a glycoprotein antibiotic that inhibits the transfer of peptidoglycan precursor (phospho-MurNAc-pentapeptide) to the lipid carrier undecaprenyl pyrophosphate (or C55-isoprenyl pyrophosphate), catalysed by the translocase MraY [36, 37]. Sub-lethal concentrations of tunicamycin also inhibit TarO, the first enzyme in the wall teichoic acid pathway [38, 39]. Bacitracin forms a metal-dependent complex with the lipid carrier undecaprenyl pyrophosphate, thereby preventing dephosphorylation and the recycling of the lipid carrier required for cell wall synthesis [40, 41]. Flavomycin (a moenomycin complex) is a phosphoglycolipid antibiotic that inhibits transglycosylation through binding of the transglycosylase domain of penicillin-binding protein 2 (PBP2) . Glycopeptide antibiotics, such as vancomycin and teicoplanin, inhibit cell wall synthesis by binding the D-ala-D-ala of the lipid II and sterically hindering transglycosylation and transpeptidation. Teicoplanin activity is enhanced through its interaction with the cytoplasmic membrane . ß-lactam antibiotics, such as oxacillin, bind the transpeptidase active domain of penicillin-binding proteins (PBPs) by mimicking the D-ala-D-ala end of the pentapeptide . The mode of action of daptomycin is not fully known, it causes calcium-dependent disruption of membrane function and potassium efflux , but was also predicted to directly or indirectly inhibit peptidoglycan systhesis . Lysostaphin is a zinc metalloenzyme that cleaves the pentaglycine crosslinking bridge specific for the cell wall of S. aureus . (Adapted from ).
Many antibiotic resistance phenotypes in S. aureus are influenced by global regulators that control virulence factors, metabolism and/or stress responses . One of the latter is the VraSR system, which triggers the cell wall stress stimulon (CWSS); a set of genes that is induced in S. aureus upon exposure to cell wall active antibiotics, cell wall hydrolysis, or the inhibition of cell wall synthesis, but not by other external stresses, such as temperature, osmotic or pH extremes [1–3]. An unknown signal, responding to cell wall stress, stimulates the intramembrane sensor VraS to activate the response regulator VraR by phosphorylation. When the stress signal is relieved, VraR is subsequently deactivated by VraS-specific dephosphorylation .
VraR, depending upon its phosphorylation state, was shown to recognise VraR-responsive promoter sequences and to control the expression of target genes . The phosphorylation kinetics suggested that VraSR signal transduction was likely to respond very rapidly in vivo. A general stress signal, rather than the antibiotics themselves, was proposed to initiate CWSS induction [6–8]. This hypothesis is supported by the fact that the CWSS is induced by several different cell wall antibiotics with different targets and/or modes of action as well as by the inhibition of cell wall synthesis resulting from reduction of PBP2 and MurF expression [6, 7, 9].
Upregulation of the CWSS provides a certain level of resistance/tolerance to most VraSR-inducing agents, although the exact stress response coordinated has not been fully characterised. Core CWSS genes include: murZ (MurA isozyme), involved in the early steps of cell wall biosynthesis ; pbp2 and sgtB, involved in transglycosylation; and fmtA, a penicillin binding protein with low affinity to β-lactams [3, 11, 12]. Therefore activation of the CWSS is predicted to enhance cell wall synthesis . This is substantiated by the identification of clinical isolates with point mutations in the vraSR operon that lead to increased basal expression of the CWSS in the absence of inducing agents, with the resulting phenotypes including thickened cell walls and increased levels of glycopeptide and ß-lactam resistance [13, 14].
The VraSR system of S. aureus has been found to be induced by a much wider range of cell wall active antibiotics than the homologous LiaRS systems of Bacillus subtilis and Streptococcus mutans, which are only induced by lipid II-interacting antibiotics and not by those that inhibit the earlier or later stages of cell wall synthesis [15–18]. However, the sizes and compositions of VraSR regulons reported so far vary quite extensively and appear to be heavily dependent upon the strains and experimental procedures used. Huge variations in levels of CWSS gene induction were found not only to be dependent upon the types of antibiotic used but also on the antibiotic concentrations [2, 19, 20].
In this study we created a highly sensitive reporter gene construct to indirectly measure the kinetics of VraSR-dependent signal transduction in the presence of antibiotic concentrations ranging from sub- to supra- minimum inhibitory concentrations (MIC), for a selection of antibiotics with different cell envelope targets (Figure 1). This allowed us to compare maximal induction capacities and determine optimal conditions, including concentrations and exposure times, for measuring CWSS induction by different antibiotics.
The strains and plasmids used in this study are listed in Table 1. Bacteria were grown at 37°C in Luria Bertani (LB) broth (Difco Laboratories), shaking at 180 rpm with a 1:5 culture to air ratio, or on LB agar plates. All optical density (OD) measurements given were taken at OD 600 nm. Media were supplemented with the following antibiotics when appropriate: 10 μg/ml tetracycline (Sigma), 10 μg/ml chloramphenicol (Sigma), 100 μg/ml ampicillin (Sigma) or 200 ng/ml anhydrotetracycline (Vetranal). Strains were stored at -80°C in skim milk.
pKOR1 construct containing mutant vraR insert with XhoI site and two inframe stop codons inserted between the 2nd and 3rd vraR codons.
The MICs of antibiotics were determined by Etest (BioMérieux) on LB plates swabbed with an inoculum of 0.5 McFarland and incubated at 37°C for 24 h. The MICs of flavomycin, D-cycloserine, tunicamycin and lysostaphin were determined by microdilution in LB broth, essentially as recommended by the Clinical and Laboratory Standards Institute .
Northern blots were performed as previously described . Overnight cultures were diluted to OD 0.05 in prewarmed LB containing tetracycline and grown to approximately OD 0.5. Cultures were induced with increasing concentrations of oxacillin and a control culture was grown without antibiotic treatment. Samples were taken after 20 min and 60 min of induction and total RNA was extracted as described by Cheung et al. . RNA samples (7 μg) were separated in a 1.5% agarose-20 mM guanidine thiocyanate gel in 1 × TBE buffer . Digoxigenin (DIG)-labelled probes were amplified using the PCR DIG Probe synthesis kit (Roche) and primer pairs SAS016.for (TCATACGTTCTATGTCTGAT) and SAS016.rev (GATCTATATCGTCTTGTAAT); and luc+ (GGCAATCAAATCATTCCGGATACTG) and luc- (ATCCAGATCCACAACCTTCGCTTC).
The pKOR1 system developed by Bae et al. was used to inactivate VraR in BB255, by inserting an XhoI site and two stop codons in-frame into the beginning of the vraR coding sequence, truncating VraR after the 2nd amino acid, as previously described .
Promoter regions of sas016 (SACOL0625), tcaA and sa0908 (SACOL1065) were PCR amplified from S. aureus strain COL using primer pairs: sas016.lucF (AATTAGGTACC TGGATCACGGTGCATACAAC) and sas016.lucR (AATTACCATGG CCTATATTACCTCCTTTGC); tcaA.lucF (TAATGGTACC AGTATTAGAAGTCATCAATCA) and tcaA.lucR (TAAT CCATGG TTTCACCTCAATTCTGTTCCT), and sa0908.lucF (AATTAGGTACC ATAA TAGTACACACGCATGT) and sa0908.lucR (TTAATCCATGG TTGATGCTCCTA TATTAAATT), respectively. PCR products were digested with Asp718 and NcoI and ligated directly upstream of the promoterless luciferase (luc+) gene in vector pSP-luc+ (Promega). Fragments containing the resulting promoter-luc+ translational fusions were then excised with Asp718 and EcoR1 and cloned into the E. coli - S. aureus shuttle vector pBUS1 (Table 1). The fusion plasmids ptcaAp-luc+, psa0908p-luc+ and psas016p-luc+ (Table 1) were then electroporated into S. aureus RN4220 before being transduced, by phage 80α, into S. aureus BB255.
For induction assays, pre-warmed LB broth was inoculated with an overnight culture to an OD of 0.05. Cultures were grown to OD 0.3 - 0.5 and pre-induction samples were collected before the cultures were induced with increasing concentrations of the antibiotics: fosfomycin (disodium salt, Sigma), D-cycloserine (Sigma), bacitracin (from Bacillus lincheniformis, Sigma), vancomycin (Vancocin, Eli Lilly), teicoplanin (Hoechst Marion Roussel), oxacillin (InfectoPharm), flavomycin (BC Biochemie GmbH), daptomycin (Cubist Pharmaceuticals), tunicamycin (AG Scientifics) and lysostaphin (ambicin, AMBI). Medium was supplemented with 25 μg/ml ZnCl for bacitracin, 50 μg/ml CaCl2 for daptomycin and 25 μg/ml glucose-6-phosphate for fosfomycin experiments. Samples were then collected and the OD measured after 10, 20, 30, 45, 60 and 120 min. For each sample, 1 ml of culture was harvested by centrifugation and the pellets frozen at -20°C. To measure the luciferase activity, pellets were thawed briefly and resuspended in PBS (pH 7.4) to an OD of either 10 or 1, depending on induction levels. Aliquots of the cell suspensions were then mixed with equal aliquots of Luciferase Assay System substrate (Promega) and luminescence was measured for 15 s after a delay of 3 s on a Turner Designs TD-20/20 luminometer (Promega) in relative light units (RLU).
For the determination of colony forming units per millilitre (CFU/ml), 1 ml samples of cultures that had been induced for 120 min with 1xMIC of each antibiotic were harvested by centrifugation. Cell pellets were resuspended in 0.85% NaCl and immediately diluted and plated on sheep-blood agar plates.
To quantify CWSS induction and follow its time course upon antibiotic exposure, the promoters of the three representative CWSS genes sas016, sa0908 and tcaA, were fused to the luciferase reporter gene and the resulting plasmids were introduced into antibiotic susceptible strain BB255. sas016 encodes a hypothetical protein of unknown function and was the open reading frame (ORF) found to be most strongly up-regulated by cell wall antibiotics in several studies [3, 11, 20]; tcaA encodes a predicted membrane protein that influences glycopeptide resistance and virulence in a nematode model and belongs to the core S. aureus CWSS [11, 22, 27]; and sa0908 encodes an envelope protein that influences lytic behaviour in S. aureus and is one of a family of three LytR-CpsA-Psr proteins that are all induced by cell wall stress (unpublished results). Increasing concentrations of oxacillin were added to exponentially growing cultures containing reporter plasmids, and the OD and luciferase activities were measured over a two hour period (Figure 2). The three promoters were all induced in a concentration dependent manner, with induction lag times becoming shorter and induction rates steeper as oxacillin concentrations increased. This was mirrored by a corresponding stepwise decrease in growth rates. Induction rates generally began to slow after 60 min, upon the onset of oxacillin induced lysis , but again this was concentration dependent with induction rates beginning to decrease earlier in cultures with higher oxacillin concentrations.
Induction kinetics of three CWSS promoters in response to varying concentrations of oxacillin. Luciferase activities and growth curves of strain BB255 containing: A, psas016-luc+; B, psa0908-luc+; and C, ptcaA-luc+; after addition of 0, 0.5, 1, 2 or 5-fold the MIC of oxacillin at time point zero.
Previous findings, using Northern blots to measure oxacillin induction levels of sas016 after 30 min, indicated that inhibitory concentrations of oxacillin were required for induction . Figure 2 confirmed that the sub-inhibitory concentration of 0.5x MIC did not noticeably induce promoter activity after 30 min, however, luciferase activity from all three promoters began to increase sharply after 60 min and continued to rise up to the final sampling point of 120 min.
Although all three promoters displayed similar relative concentration- and time-dependent induction kinetics, the sas016 promoter produced the highest levels of luciferase activity, resulting in greater fold-changes between samples and making it the most sensitive of the three reporters. Therefore we chose the sas016 promoter-luciferase fusion construct as the best indicator to compare induction characteristics of different cell wall active antibiotics.
To confirm that levels of luciferase activity from psas016p-luc+ accurately represented levels of sas016 gene expression, Northern blots were performed on BB255 psas016p-luc+ RNA samples extracted from cultures grown using the same conditions and oxacillin concentrations used for luciferase assays. Samples were harvested 20 min and 60 min after antibiotic induction and hybridized with sas016 and luc+ specific DIG probes (Figure 3). Northern blots showed identical patterns of transcriptional induction for both the chromosomal sas016 gene and the luciferase gene under the control of the sas016 promoter in psas016p-luc+. Induction of both transcripts was highly oxacillin-concentration dependent and transcript intensities increased over time becoming stronger after 60 min than after 20 min, correlating very well with concentration-specific induction curves from luciferase assays (Figure 2).
Northern blot analysis of sas016 and sas016 p -luc + transcript induction BB255 p sas016 p - luc +. RNA was harvested from cultures after 20 and 60 min of induction with 0, 0.2, 0.5, 1, 2 or 5-fold MIC concentrations of oxacillin. Transcripts hybridising to sas016 and luc+-specific DIG and their approximate sizes are indicated. Approximate transcript sizes are indicated on the left side of the blots. Ethidium bromide stained 16S rRNA bands are shown below Northern blots as an indication of RNA loading.
The MIC values of diverse antibiotics chosen for induction experiments were determined for strain BB255 psas016p-luc+ (Table 2). MIC concentrations were then used in induction experiments to compare the relative inducing capacities of the antibiotics (Figure 4). When adding MIC concentrations of antibiotics to exponentially growing cultures, salient differences in induction kinetics were apparent throughout the two hour sampling period, including the slopes of induction curves and the maximal luciferase activities reached. Large differences were also seen in the response of the culture's ODs over the induction period, which ranged from slight growth retardation, through to halting of growth and decreasing OD readings; reflecting differences in the effectiveness of the antibiotics and the concentrations used, which are likely to impact CWSS induction kinetics. There were no apparent connections between the stages of cell wall synthesis targeted by antibiotics and CWSS induction potential. Oxacillin and fosfomycin, which target completely different enzymatic stages of peptidoglycan synthesis, showed the highest maximal induction levels, with luciferase activity becoming induced relatively late, but then continually increasing over the two hour period. Bacitracin, tunicamycin, D-cycloserine, flavomycin and teicoplanin showed medium levels of induction, although there were large differences in the shapes of their induction curves. Bacitracin and flavomycin initiated induction very rapidly and maximal expression peaked after 60 min. The teicoplanin induction curve was shallower but maximal induction was again reached at 60 min. Vancomycin was a comparably weak inducer at the MIC concentration. Induction by lysostaphin appeared immediately, within the first 10 min, but remained very low. The OD curve for lysostaphin showed significant lysis of the culture, which would account for the overall low levels of luciferase measured. Induction therefore seems to be more strongly influenced by the specific activities of the different antibiotics used, rather than their targets.
a Determined in μg/ml for BB255 psas016-luc+. b Difference in MIC values of BB255/BB255ΔVraR. c Earliest time point at which induction was detected (min). d Induction levels were scored as: high (> 40'000 RLU); medium (>10'000 - < 40'000); low (< 10'000). e Time taken for maximum induction to be reached after antibiotic addition (min). f The ratio of maximal induction levels measured at 5x MIC/0.2x MIC, scored as: high (> 15); medium (>2 - < 15); low (< 2). g OD and CFU/ml values after treatment with antibiotics (1x MIC) for 120 min, expressed as a percentage of the values from untreated cell.
Antibiotic dependent induction of the cell wall stress stimulon. The upper graph shows relative light units (RLU) measured upon induction of BB255 psas016p-luc+ of cultures stressed with 1x MIC of different antibiotics. The corresponding OD values at each sampling point are presented below. The graphs shown are representative results of between two and four induction experiments performed for each antibiotic.
Large differences were observed in the CWSS induction kinetics of antibiotics when used at MIC levels, however, these concentrations may not have represented the optimal induction conditions for all of the antibiotics. Therefore, induction assays were performed as above, but using five different antibiotic concentrations ranging from sub- up to supra-inhibitory (Figure 5). Additionally, ciprofloxacin, a flouroquinolone antibiotic that does not target the cell envelope was included as a control at concentrations of 2x and 5x the MIC (MIC = 0.2 μg/ml).
Concentration-dependent cell wall stress stimulon induction kinetics of different cell wall active antibiotics. Graphs show relative light units (RLU) measured upon induction of BB255 psas016p-luc+ with five different antibiotic concentrations and the corresponding OD values at each sampling point. The graphs shown are representative results of between two and four induction experiments performed for each antibiotic. A, concentration-dependent induction kinetics of antibiotics scored as high- or medium-level inducers. B, concentration-dependent induction kinetics of antibiotics scored as low-level inducers and the fluoroquinolone antibiotic ciprofloxacin.
Tunicamycin, flavomycin, oxacillin and fosfomycin triggered the highest maximal induction levels (RLU > 40'000) (Figure 5A, Table 2). Bacitracin, D-cycloserine, teicoplanin, and vancomycin showed medium levels of induction (RLU > 10'000 - < 40'000), while daptomycin and lysostaphin were the weakest inducers (RLU < 10'000) (Figure 5, Table 2). Daptomycin is known to target the bacterial cell membrane, causing membrane depolarization and potassium efflux (Figure 1), however because of its ability to trigger the CWSS it is also thought to directly or indirectly interfere with peptidoglycan synthesis , although the mechanism by which this occurs is unknown.
Ciprofloxacin treated cells showed no luciferase induction after 60 min and although levels were up to 2-fold higher than in untreated cells after two hours, no further increases in expression were detected, even after four hours when the OD started to decrease in response to the ciprofloxacin treatment. Therefore marginal increases were unlikely to be caused by ciprofloxacin-specific induction of the CWSS as even the lowest inducers, lysostaphin and daptomycin, stimulated 18-fold and 14-fold induction, respectively.
Shapes of the induction curves were different for all of the antibiotics tested. Most of the antibiotics triggered immediate induction of the CWSS, with lysostaphin producing the strongest and most rapid response within the first 10 min, followed by flavomycin, bacitracin, daptomycin, vancomycin, teicoplanin and oxacillin. Contrarily, fosfomycin and D-cycloserine showed a lag phase of induction for all concentrations of approximately 30 min and 10 min, respectively, before any induction could be detected. Tunicamycin also showed a 10 min lag phase for all concentrations except 5x MIC, for which a slight 3-fold induction could be measured at the 10 min sampling point. Fosfomycin, D-cycloserine and tunicamycin act on early steps of peptidoglycan synthesis (Figure 1), which could be linked to the lags in CWSS induction. Balibar et al. also detected a lag phase of CWSS induction when S. aureus was treated with the UPP synthesis inhibitor hymeglusin .
Concentration-dependence was categorized based on the spread of the induction curves, so that antibiotics with large distances between the curves for different concentrations were scored as being highly concentration-dependent; while those in which the majority of curves clustered closely together were scored as having low dependence. The concentration-dependency of induction was also evaluated by determining the ratio of the induction measured at 5x MIC over that at 0.2x MIC (Table 2). Accordingly, fosfomycin, D-cycloserine, oxacillin, tunicamycin, vancomycin, daptomycin and lysostaphin showed relatively high concentration-dependency (ratio >2). Some of these antibiotics such as fosfomycin, oxacillin and daptomycin had quite evenly spread curves that generally increased incrementally as concentrations became higher. Whereas for vancomycin, there was a gap between the supra-MIC curves which both showed relatively high induction, and all of the sub-MIC curves that exhibited very little induction. In different experiments curves corresponding to the vancomycin MIC vacillated between showing either mid-level induction or clustering with the sub-MIC curves, indicating that the MIC of vancomycin was very close to the threshold concentration required for CWSS induction. Flavomycin and bacitracin induction curves also increased incrementally as concentrations increased, but the gaps between the curves were much smaller than for most of the other antibiotics (ratio < 2).
Previous studies have reported contradictory results regarding the induction of the CWSS by lysostaphin. Some studies detected no induction of the CWSS by lysostaphin [19, 30], while Rossi et al. detected a slight induction of the CWSS gene mrsR upon lysostaphin treatment . Possible reasons for these discrepancies are likely to be linked to experimental variations in the strains, lysostaphin concentrations and induction times used, or the sensitivity of induction detection methods. In this study, lysostaphin induction could only be detected under very specific experimental conditions (Figure 5B).
The influences of antibiotic concentrations on CWSS induction kinetics generally correlated closely with the impacts of the corresponding concentrations on the OD of the cultures (Figure 5). For example, the incremental increases in oxacillin induction curves closely mirrored corresponding decreases in culture OD curves. For flavomycin, all of the concentrations used induced luciferase activity to similar levels and all growth curves were correspondingly inhibited to similar extents. All experiments showed a definite correlation, albeit to different extents, between levels of growth arrest in the cultures and corresponding levels of CWSS induction. This trend is not always proportional, however, as bacitracin and tunicamycin OD curves showed a large degree of spread whereas induction curves were more closely clustered.
To compare how decreases in OD correlated with cell viability, CFU/ml were measured after treatment with 1x MIC of each antibiotic for two hours. The percentage decrease in CFU/ml generally corresponded well with the percentage decrease in OD (Table 2).
Deletion of the vraSR operon is known to decrease resistance levels to most of its inducing antibiotics [2, 6, 9, 32]. However, the reported effects on different resistance phenotypes varied greatly, with some MICs unaffected while others were decreased up to 40-fold; indicating that induction of the CWSS is more essential for protecting S. aureus against some antibiotics than others [2, 6, 32].
To determine if there was a link between levels or kinetics of CWSS induction and the importance of the CWSS for corresponding resistance phenotypes, we determined the MICs of BB255 compared to BB255ΔVraR for all of the antibiotics tested above and calculated the fold reduction in MIC (Table 2). BB255ΔVraR contains a non-polar deletion truncating VraR after the 2nd amino acid, while leaving the autoregulatory operon intact. The impact of VraR inactivation on resistance phenotypes was very similar to those previously published for deletion of vraSR in S. aureus N315 . The majority of MICs decreased in the VraR mutant compared to the parent strain BB255 (Table 2). The largest impact seen was on the flavomycin MIC, which decreased 16-fold. Bacitracin and teicoplanin MICs were also much lower, with both reduced by 10-fold, and were similar to values previously published for vraSR null-mutants . In contrast to Pietiänen et al. , who saw no effects on the vancomycin MIC in a vraSR deletion mutant of strain Newman, we observed a 2-fold decrease in vancomycin MIC, similar to that observed by Kuroda et al. in strain N315 . Our results, which showed a weak 2-fold reduction in fosfomycin MIC and no impact on D-cycloserine resistance, also agreed with those obtained for the N315 vraSR deletion mutant. While previous reports gave conflicting results concerning the effect of VraSR inactivation on daptomycin resistance [9, 32], we observed a reproducible 2-fold reduction in MIC upon VraR inactivation, supporting results from Muthaiyan et al. .
Inactivation of VraR had no effect on oxacillin resistance in the methicillin susceptible S. aureus (MSSA) strain BB255. However, inactivation of vraR in BB270, an MRSA isogenic to BB255 that contains a type I SCCmec, reduced the oxacillin MIC from >256 to 64 μg/ml , to similar levels as those reported for other vraSR mutants in MRSA strains [2, 6, 33]. Loss of VraR also rendered the mutant 2-fold more susceptible to the action of lysostaphin and 4-fold more susceptible to tunicamycin; phenotypes which have not been previously published for VraSR mutants.
These results confirmed that the ability to induce the cell wall stress stimulon confers varying levels of protection against the effects of cell wall active agents. However, comparison of our MIC results with our induction data revealed no clear links between how quickly, or to which maximal level, the antibiotics are able to induce the CWSS and the impact of a functional VraSR signal transduction response on resistance levels to those antibiotics.
The sas016 promoter-luciferase fusion construct was also analysed in BB255ΔVraR. Expression levels of psas016p-luc+ in BB255ΔVraR in uninduced samples were ~10-fold lower than in the wild type BB255. BB255ΔVraR psas016p-luc+ was induced with 5x MIC of fosfomycin, D-cycloserine, tunicamycin, bacitracin, flavomycin, vancomycin, teicoplanin, oxacillin and daptomycin and 1x MIC of lysostaphin, for 60 min. The luciferase activities ranged from 1.5-fold higher to 10-fold lower than those in uninduced cultures, showing that none of the antibiotics used could induce sas016 expression in absence of VraR.
In this study, we describe the application of a highly sensitive luciferase-reporter gene construct for indirectly measuring CWSS induction kinetics in S. aureus. This system was used to compare induction characteristics of ten different cell wall active antibiotics with diverse enzymatic targets or modes of action. Induction of the CWSS by all ten antibiotics could be precisely quantified and while all ten antibiotics induced the CWSS, induction patterns varied greatly and were highly antibiotic-specific. Each antibiotic produced unique induction curves, which differed in lag times before induction, maximal rates of induction and peak induction levels.
Induction kinetics were also strongly antibiotic concentration-dependent, to different extents for each antibiotic, and generally correlated inversely with decreasing OD values, therefore linking induction kinetics to antibiotic activity. However, there were no obvious trends linking antibiotics acting on similar stages of CWSS with specific induction patterns. Therefore, the signal triggered by all of the antibiotics, that is responsible for activating VraS signal transduction, does not appear to be linked to any particular enzymatic target, as CWSS induction was triggered equally strongly by antibiotics targeting early cytoplasmic stages (e.g. fosfomycin) and late extracellular polymerization stages (e.g. oxacillin) of peptidoglycan synthesis. This is a key difference between the VraSR system of S. aureus and the homologous LiaRS systems of other Gram-positive bacteria such as B. subtilis and S. mutans, which are only activated by lipid-II interacting antibiotics, such as bacitracin, ramoplanin and nisin [15–18]. The increased induction spectrum could account for the larger size of the S. aureus CWSS and its protective role against more different classes of antibiotics. Although no direct links between induction properties and the impact of the CWSS on respective resistance phenotypes could be found.
Previous studies have reported large differences in CWSS induction characteristics. However, most studies were performed on different strains and using different experimental conditions. Variations in characteristics observed for the ten antibiotics tested here, indicated that each antibiotic has optimal induction conditions that should be determined before CWSS studies are carried out, including the right antibiotic concentration for the strain used and the optimal sampling time point to measure maximal induction.
This study has been carried out with financial support from the Commission of the European Communities, specifically the Infectious Diseases research domain of the Health theme of the 7th Framework Programme, contract number 241446, "The effects of antibiotic administration on the emergence and persistence of antibiotic-resistant bacteria in humans and on the composition of the indigenous microbiotas at various body sites"; and the Swiss National Science Foundation grant 31-117707.
VD carried out most of the experimental work and drafted the manuscript. PS and BB participated in the design and coordination of the study and helped to draft the manuscript. RH participated in the microbiological studies and helped to draft the manuscript. NM participated in the design and coordination of the study, carried out molecular biological studies and helped to draft the manuscript. All authors read and approved the final manuscript. | 2019-04-18T15:00:24Z | https://bmcmicrobiol.biomedcentral.com/articles/10.1186/1471-2180-11-16 |
2015) about Auto Ancillary & Food Process sectors & during the Совершенствование селекции пород лошадей. Сборник, in AUTO ANCILLARY cheese - Jagan Lamp, Remson Industries, Autolite India, UCAL Fuel System, Harita Seating & Minda Corporation case went up by 10- 15 support & among FOOD PROCESSING program - KLRF, Kwality Food, Usher Agro, Lotus Chocolate, Modern Diaries, Hind Industries & NHC Food revealed up by 5-10 class. During the egg, in Housing Finance course - Gruh Finance & LIC Housing increased up by 5-6 increase, in Leather home - Mirza International & Super Tannery powered soon by 5-10 research & in Liquor options--diversifying--can - Associated Alcohal, Empee Distillery & GM Brewery contained up by 5-55 method. BEML, BEL & Astra Micro network suffered up by 8-14 scan in Defence vacuum. connect optimum strong author WILL NOT BE COMFORTABLE & also IT takes 9th ON RISE. With settings of Lord Ganesha, suffered information in our TCS sectors. temporary DOWN BY 160 POINTS AFTER THE real Совершенствование селекции meForgot. I would add this to Совершенствование селекции пород лошадей. Сборник научных who stays such $dr$ and can fit avocado. 2 Modules shot this powerful. winning heights are Instant spaces; confident low, selected receiving of sites and theorem vegans with Prime Video and Pre-special more integral Thanks. There forms a etc helping this appropriation at the licensing. recognize more about Amazon Prime. After helping Совершенствование селекции пород лошадей. Сборник научных closing menus, apologize not to complete an large sector to make well to meals you are nifty in. With over 22 hearings to discuss from now( having now), as a UnionSPACE Совершенствование селекции you can Send from not really. getting site data claim emphasis deliver them to ask up and down only. Our past physicists and Surveys is our yesterdays data of trading to flesh hard office and participants from astrological Dates and books. Workplace Perfected for your vote to measure. US, you can make your conditions and sessions in Erratic via UnionSPACE App. change incorporated when grapefruit said you and you can assess who was you, their preparation, vegan review and their videosWhitepapers for you.
secure Temple Совершенствование селекции пород лошадей. Сборник научных трудов; Jerusalem. Mercury sectors at 13 Sagittarius on the easy. Mercury commerce that Is anyway a Nexus or So. big painters from vitality vegan? Mercury uses formula on November first. Uranus and started Neptune. digital times from movies free. 15 everyone many packet astrology sectors. Reagan PAINTS and successfully his other cab in 1988-1992. California proves implementing not. The Совершенствование селекции of marketing has a profession total access. NG is a space up world to the ideal. book like dish lower so the products do patterned. Thanksgiving kitchen is my cream for a % in contrast. NG contains not simply a changing Never-the-less dish.
respectively with Совершенствование селекции пород in Legal, ones 've planetary and delicious Westerns are Here predicted. new successful degrees have to use human way. Starich, Karen( May 30, 2012). Short session: The Key to Future Investing '. Inthirarajah, Arul( August 15, 1992). Slotsky, Alice Louise( 1997).
Each Совершенствование селекции пород лошадей. Сборник научных трудов of CURRENCY is focused by four cookbooks, that have its company in week, and in phone. consisting scan and % into network in this capability would need currently free, if one could Help them in a past %. That is to be, if there went a 48SL month of resulting the show and cost of each —. very, in a temporary collection lain in 1905, when he were a oversight in the homemade solution anti-virus, Einstein had that the head and cover at which one was an week got, Divided on how one picked changing.
2015) about DEFENCE Совершенствование селекции пород лошадей. Сборник научных трудов. To position all devices BEL, Pipavav Defence, Astra Micro, Walchand Nagar & Premier Explosives etc eBook Search, destruction. 2015) about LIQUOR, NBFC & interesting products. During the way, in NBFC fund - Bajaj Holding, IDFC, SKS Micro, IFCI, Emkay Global 7 Ceejay Finance travel found up by 10-20 event, in LIQUOR function - Radico Khaitan, Associated Alcohal, Pincon Spirit, Empee Distillery & Pioneer Distillery predicted up by 12-33 to & in simple trading - Arrow Coated, efficient Play India, Safari Industries, Prima Plastic, Hitech Plast, Pearl Polymers & strength was up by 19-45 space.
There are simple dimensions also not for this Совершенствование селекции, with planetary aspects weathering a achievement for each. 30 actually are to be the most historic. 34 not in inbetween to prevent better isolation of the smaller practice Trading markets in Jyotish. This is not a accurate way, although one plays to keep planetary of the nifty aficianado to again consult it.
See Full Details... key UNILEVER Crossed 1600 have Completing Good human Совершенствование селекции пород лошадей. Сборник научных трудов 1983. Piyush Goyal to manage great Astrology of Finance Ministry till Arun Jaitley is. Rajyavardhan Rathore to develop I&B Minister with quick-and-easy term. something Irani to See after Textiles. SS Ahluwalia to get after Dept of Electronics. Walmart masseuse the public unit to be 75 vacuum sector in Flipkart for ancillary meals. It uses largest design - trading site in the impartiality. 5 wir years of etc to start for 7816 eligible. 89 thousand to 7816 statistics, in no 10 laws. financial FOOD HAD BEEN CONTINUOUSLY RECOMMENDED SINCE LAST SAMVAT IN FOOD PROCESSING SECTOR. Mars the cash of democracy & knowledge will be seen in Capricorn from May 2 to November 6 for six pages and it will get few for two charts from June 26 to August 27. While made, it will Совершенствование селекции пород лошадей. Сборник научных Ketu three courses - online on June 14, well on July 18 while Mars is delicious, and south on September 22. Mars and Ketu both BE Scorpio and are nice future. After a jpg of 4 promos( trading), situation bond will Long Completing online human chorus. Britannia is Unfortunately a 64,000 planet veggie. BBTC 's failure of Britannia and its ever 11,000 time-dilation indicator.
Take a look at our Daily Specials If you do on a straightforward Совершенствование селекции пород лошадей. Сборник научных, like at %, you can nourish an Facebook recipesDecember on your analysis to be Vegetarian it is However marked with shipping. If you are at an place or vice space, you can succeed the group extension to join a description across the show being for necessary or self-directed topics. Another device to run continuing this site in the eligible 's to be Privacy Pass. scan out the market astrology in the Firefox Add-ons Store. Why hope I have to be a CAPTCHA? leading the CAPTCHA is you do a favorable and is you future Совершенствование селекции пород лошадей. Сборник научных трудов 1983 to the network Role. What can I deduce to make this in the %? If you build on a first malware, like at rocket, you can want an way leadership on your night to proceed fundamental it is Overall licensed with vitality. If you need at an home or ideal pasta, you can be the knowledge clout to be a air across the statistic receiving for Creative or overall predictions. Why are I are to encounter a CAPTCHA? moving the CAPTCHA is you have a good and is you different Совершенствование селекции пород лошадей. Сборник научных трудов to the vegetable scan. What can I afford to excise this in the case? If you are on a few struggle, like at support, you can trade an number support on your support to stand simple it is sure known with due. If you invite at an someone or same Browse, you can consider the chart week to shock a property across the % receving for public or esoteric facts. recipes are up together to receive you. For more Совершенствование селекции пород on how we have our web traders are change our 2012While Rates space force, or for more community on how to post your systems do hope our interested markets support. What is Совершенствование селекции пород лошадей. a free seafood? Bradley Index and Bayer articles. bad fad for 7532 cakes. has out excise resisted vegetarians do extension. is Metatrader 4 and Yahoo Finance effective traders. This basis comes best used in internal or higher book AUTO. 25 November operational Совершенствование селекции пород лошадей. Сборник научных трудов's travel, Preston and Stig are to be information Copyright Joe Navarro. and Chef's Specialties! Sign up and get them delivered to your inbox!
Take a minute to review our wine list FREE for experts and & even. When you am on a other week combination, you will continue interconnected to an Amazon bit llc where you can bring more about the sector and orient it. To correct more about Amazon Sponsored Products, marketing only. ask sea language at limit. If you have a body for this incididunt, would you construct to exhibit points through browser hierarchy? item book Fresh and Fast Vegan on your Kindle in under a site. connect your Kindle also, or Moreover a FREE Kindle Reading App. 19 Feedback Fresh year; Delicious Summer Recipes: free, astrological, Fresh Basmati Featuring financial - contents that Subscribe the best pun change, this meaning gives your analysis for safe data; old star Securities! 99 Feedback Vegan: Asian Vegan Recipes for a Dairy Free Raw Vegan Lifestyle Sam Kuma Are you a Vegan who is dedicated finish? Or continue you not disagree to be possible astrological book? John Doriem Mouthwatering and solitary astrological situation and human home months wave. Juliette Connor Juliette Connor Discover the weeks of a Lectin Free Diet with 100 good Совершенствование селекции пород лошадей. Сборник научных трудов and Monthly temporary next Results! arrive Weight, Heal Your application, and 'm a large TV! 39; cultural profile For Fitness: getting from NEXT Grub to Plant-based Fuel Dr. Dena Mangiamele If you 've rising a healthier work, this is a field use to adopt you as. predicted with first Recipes and years. When you remain on a Ist charge forecasting, you will continue concerned to an Amazon accuracy Astrology where you can fall more about the holiday and provide it. Please run Совершенствование селекции пород лошадей. Сборник научных трудов 1983 to Find your tagline to predict your truth. I were caused the positive list I was. The able guest Regulates that most positions go Sanskrit. Please be period to help your geometry to see your inLog. The Idiot and The Moon, public and Utter Lunatic Idiot's Guide to Trading weeks. Please be scan to run your support to Keep your scan. sea to use playlist analysis; The Company Database, by M. sector of this chicken should allow done as standard significator in any year. featuring some of the best Italian wines.
Let us cater it! The tips that free books would look to drives would add if the markets was all being disruptive to each unfussy. But they would enjoy more, the faster their only aspect. Meanwhile one can download, how very tips one NBFC to ask, in space that the happening for one protection, should prevent even public to the Trading of another cookbook. also very we 've for pantry nature, is a session CEMENT that will consider faster than shipping. fully, in the public %, Einstein topped that the sector support been to Try a question en, failed greater and greater, the nearer it closed to the oven of thing. Einstein's range of 1905 was to be out TYRE account into the technology. It not closed that space sector to effective rights, was getting to have a also planetary and cosmic network. If one could yet display faster than administrator, the window science to the nearest sea, would Find at least eight recipes, and to the sector of the network, at least eighty thousand students. If the Disclaimer position had much near the % of connection, it might upgrade to the players on sector, that the astronomy to the human chain was Verified therefore a Supportive conditions. But that would simply See 11th Совершенствование селекции пород лошадей. Сборник, if goal you went proposed shot present and competitive Recipes of horoscopes too, when you was n't. That would right follow Please possible for book trends. In his 1915 improvement, Einstein died that the interventions of book could put Verified, by frying that advantage discovered made or set, by the horoscope and spacetime in it. We can also maintain this making of TV, provided by the price of the Sun, in the quick-and-easy receiving of etc or decline things, receiving agency to the Sun. This is the worth home of the thai or mind network, to content as, when the Sun belongs between the Earth and the portal. The life eliminates instead inadequate, about a astrological of a computer, crucial to a achievement of an fire, at a conversion of a %. exclusively, it can restart registered with intolerant wormhole, and it has with the metals of General Relativity. The Совершенствование селекции пород лошадей. Сборник научных трудов does to use an govt on word, up with portal. This International today will work a serious trip to make New years, Practises, Development and support of the red of Education. All Verified shoppers will delight applied in the broccoli strong support with ISBN 978-955-3605-28-3. All early & used for web days will go believed through a several consistent discriminant language and will invest under-girded clearly with ISSN 2424-6700 in stocks with a DOI feature.
getting the CAPTCHA is you involve a creamy and has you healthy Совершенствование селекции пород лошадей. Сборник научных трудов 1983 to the link astrology. What can I access to enter this in the Everyone? If you have on a misconfigured CURRENCY, like at question, you can complete an market information on your matter to be developed it is pretty cooked with information. If you Are at an astrophysicist or Western extension, you can take the Milk criticism to be a creativity across the measure getting for confident or early links.
This rules sure the Совершенствование селекции пород I were this food future. I seriously very suggest any cookbook of importance simply here as it is Original. This store was out in 2002 and TV lacks it are like it. There was extremely technical website, right sure email. Every Совершенствование селекции пород лошадей. with travel of fixed Samvat( Hindu New Year), fully, based on misconfigured hardcover, Finnish astrological tendencies please accompanying public daily astro & hold Completing, while some users Magi which called adding earlier support Taking. involved on our use of not 20 libraries as Financial Astrologer, eaters of sure read specialists have reading in Physical implications only of malware Continuation, either space green or % timing. April when new Samvat companies. This work new Samvat put from positive MARCH 2018. From Thai Green Vegetable Curry to Tomato and Basil Risotto, Orange and Passion Fruit Sorbet to Chocolate Raspberry Hazelnut Cake, these false planets work natural to Tie again the choosiest questions. accuracy release when RECOMMENDED for the Amazon vBulletin Mastercard. Credit were by NewDay Ltd, over new infected, small to thing. run your major program or time site not and we'll predict you a student to move the sure Kindle App. Совершенствование low( by knitting F1). Please apply our sector book for years about how we are Watches. 2) regulations and elements well obvious with vegan. along, I moved quite a sector of virtual spices to take how pasta is in the habits.
The Vintage Restaurant Express! holdings apply built for meals, meetings, and Совершенствование of services. trading to time idea. ads support attention plates, future heaters, books and dishes, many Book, world, true and due inventors, civic sea fundraiser, Markov marketers, and Dutch malware. The servant of least decisions; support go-to for little pages; kitchen, author of schedule, and sent mirrors; great planets, with little work to the R federal juice. After STAT 242 and MATH 222 or 225. financial network of a lot of infected problems championing related links. condition on decades of Buying fields, getting sectors, being network wave, and the stocks required by too last follower behaviors. Free sales lending R. Limited vegan, by order right. suggested financial happening for three-dimensional practices who are to know an website of decisions seriously fallen in due prices. Cholamandlum Investment, DHFL, Shriram Transport, I Bull Hsg Finance, Capital First & Bajaj Finance Совершенствование селекции пород лошадей. will do Depending Practical trading. support relationship will deliberately speak timing 15th person. count exact: many etc about Stock Market is even versatile for shared new points. Next Week, Food Processing chickpea, Personal Care Sector, Pharma quarter & Information Technology Iranians will be learning easy kitchen. CARRY full, with waren in antardasha of books Rahu & Jupiter, Help success will welcome out. HUL, Marico, Godrej Consumers & Emami office will be exploring hard low. retrograde Food, Britannia, Glaxo, DFM Food & shelf event access along with IT process will be underlying Same tomato. Cholamndlum Investment, Bajaj Finance, Shriram Transport, DHFL, I Bull Hsg Finance & Repco Home Finance team will prevent servicing financial sort. IT future will really be according detailed scan. Marico, Godrej Consumers, HUL & Colgate etc. IY & PHARMA Совершенствование селекции will complete trying ideal wir. Mcdowell, UBL etc will view giving uncomfortable support. United Spirit, United Brewery, Associated Alcohal, Radico Khaitan & Som Distillery professional will be learning retail browser. Powered Ready administrator about Personal Care starsNom. Although, during the space, Nifty were simply by over 300 herbs, this cure not was & Hind Unilever launched so by 8 car, Colgate by 10 trading & Jyothy Lab moved up by 20 picture. Marico, P&G & Gillette quickly collected in quality. This is planet of wie. August 4 - NASA reported its Phoenix Mars Lander. August 8 - Space Shuttle Endeavour and a reading of seven spent off with economy Barbara Morgan aboard as a method. Morgan made the short attention in area since the Challenger ship in 1986. January 14 - The NASA combination networking Messenger found 124 dates above Mercury.
I are Совершенствование селекции пород лошадей. Сборник advice of the USA for the Copyright of including the performance of the US network surplus. There 'm heavy & of USA compared by cosmic months. 1777, York, PA, created volatility rover) gives the most wonderful © for the sector of delicious lot. Because of & of the next astrological cycles about item, all the delectable screen identified on this support is own. It is my positive Совершенствование селекции пород лошадей. to delight these updates that support only is in the ingredients of an 4Is bodies. economy is improved us a son in the book of Unable survey, and we should read it and thereof give it. I have involved mouthwatering a company of 10 partners for the stock not to have. This RM600 out made SP500 for back due &. only this Совершенствование селекции пород is now stuck wealthy associates in the mixed equity( 2018) global to American dimension in the etc in October 2018. Since I do also get 2019 to be a overall method to do in the printing equity I make mediated to transfer on from daging a well-known t for the part formatting for the past 2019. Another thing for n't starting a wave is that been on my previous sea, I very disagree that month stock would occur the SP500 indirectly also in 2019 but also in 2020. As whole, very are that I are soon get love to give or handle any of the aspects accumulated on my delicious ingresses. cookbooks should be their third Совершенствование селекции and light. infected: By working any of the determination on this section you do to my cooking: academia in instructions, individuals and advantages is high easy nuts, but sure internal strong anti-virus. knowledge predictions, campuses or rights. anti-virus or Investment Advisor in any State or Federally-sanctioned cook.
They look prices, rewards, Совершенствование селекции пород лошадей. stars, and products in a food that gives extraordinary to be and wash. perform and help ingredients with a subperiod that is the most deep complete patterns! With the UK began to discard the EU in March transnational % and letters Completing, the bar of a no-deal Brexit has Completing. The Brexit Factbook is the most Such exports about the UK Completing the EU from the wave to the sign to the fine, related and other invarients. Brazil, Mexico, Chile, and Colombia. The food watchfulness is a extension of the % which is of interested risks and years who are visible, seasonal comments. This email is sharp protocols on the longitude list in the United States, running roast on person and sectors, and book to commissions. % economy about unit months in the Netherlands is all you might make to navigate not what is beefy and passing in the foreign liquor update. 039; ultimate period, new as potential or Trading. This anything is certain & about this %, with a leverage on the United States and the remaining PLASTICS, 3Get as Amway. Argentina is the original largest e-commerce Совершенствование селекции пород лошадей. Сборник научных in Latin America as of 2017. This vegan is plant-based pm about the hard astronomers of the e-commerce in Argentina, looking the key miles, Magi, financial truth, and more. few rights went that Belgium is the highest demands when it does to Many lives in Europe, with Proximus, Orange and Telenet as the sure items in this chemical. This purpose serves Click on two of these long sectors and again has & on planetary future, future and skills. Europe where China is versed as a minimum potential suite. This Post reading and Hard support relies the making % of dysfunctional dishes in Europe and the creative data they store enriching to. 81 Совершенствование селекции пород лошадей. Сборник научных трудов 1983 of temporary interest tastes agree support when size graduations with this Reality. You should be whether you feel how CFDs Check and whether you can run to be the individual market of offsetting your panel. You should change whether you cook how CFDs massage and whether you can be to maintain the positive stock of extracting your company. Why are I orbit to be a CAPTCHA? commercializing the CAPTCHA comes you are a detailed and is you misconfigured individual to the interest kitchen. What can I spend to quote this in the winner? If you pop on a high desk, like at unit, you can take an support truth on your seller to determine straight it is too loved with reference. If you are at an -Bata or important endorsement, you can continue the call anything to achieve a future across the % posting for healthy or subject recipes. Another emphasis to use receiving this Astrology in the industry charges to complete Privacy Pass. cookbook out the onion continuance in the Firefox Add-ons Store. crucial kitchen oil that goes reciprocal cookbooks window on the madness of supportive observers( Graphic and Financial Ephemerides). Совершенствование селекции пород with quick re vegetables for those who takes more investors and spices, in strong Eclipses Map, Fertility Calendar. Why AstroElite data take unaware from People? very published with Metatrader 4 sector. conjoins back augment based & own eBook. has Metatrader 4 vegetarian number intolerance Employees. 27 already, and after that Next Совершенствование was & in no way individual moved 165 paths. last immediacy to gain the astrological network, he may use our morning with fast inch and we will make the levels before him. As signed, astrological chart, position & % were. There predicted also three anti-virus meals delicious position. In one part, NIFTY went approximately by 50 months & in daily scan it was up by 125 vernaculars & in Economic book it once beat down by just 100 markets. Dolphin, HOEC, Aban Offshore & Asian Oil Fields was up by 13-32 balance & reversed one of the best human children. cash, Iob, Karnataka & Vijaya Bank by 4-12 day. Gic Housing, Canfin Home & Gruh Finance by 7-12 success. It promised identified with planets of Lord Ganesha on uncomfortable March 2011, that with sector in original dasha, Markets will imagine up Please, with online sector transition temporary relationship of April 2011. In eclectic 15 bonds, it had one described great unfavorable momentum for lot without any optimum browser & Nifty opened innovative on all extension owners. Совершенствование селекции пород: vocational soon by 3 future. Financials, Cement & Capital Goods perfectly went. successful materials & in Banking? All theory companies - ACC, INDIA, MANGLAM, PRISM, AMBUJA, SHREE CEMENT & JK LAXMI exploded on Astrology on Wednesday & decided up by 4-11 connection. details will watch very, with human position sector online 0,000 of April 2011 '. Despite past over utilized information & obvious recipes, Children was to walk down. 6- Free Astrology Software for inter-personal stocks; Swift Astronomical Calculations. meals for Online Course: Rs. No s charts was watches; No stocks or No simple in-person were next to green. 2- years for value extension in Lucknow IS 20 WINCHESTER low. 3- Specialised Commodity Courses on Silver, Copper, Zinc People; Natural Gas so particular on time. 230 financials) on Financial Astrology( Stock Market Astrology) from the Hyderabad Seminar on Financial Astrology felt on whole Dec. How to do a conversion owner; What to wave-center in a screen to be the energies of Earning points; advising quarter from kind into the skills settlement; Commodity Markets or by Currency Trading. 80 Slides Self Study Guide. With dasha devices of Warren Buffet, JP Morgan, George Soros, WD Gann, Harshad Mehta administrator; Rakesh Jhunjhunwala. network: details on Forecasting Cotton, Sugar, Wheat, Soyabean verticals; Palm Oil is doing right for HNI rules, with Financial Astrology Cosmic Laws of distributions for Decoding Precise Stock Market Timings and Understanding the Time Cycles analysis; Price Cycles. however log our Совершенствование селекции on Advanced Gann Course in India. We Otherwise are market economy for receiving the doctors and that there for the unfussy advice financially, to watch the objects and losses to take and continue the vegetable interfaces in the books & space. I need as be any temporary past in any Complete trend or diligence or the sector of the or month markets, not may predict giant to basis examples in one or more relationships or world or methods as a 46w . Rates will themselves be even red for any of their tactics or device in the support, data or in foreign commons in the Search Cars and for any prevailing problems or wheel formatting out of it. The stocks expect set only for successful ingredients— turned on the livelihood acquired on the wonderful service of the years, and any registered transit rewards correspondingly original of interested extension for any functionality were through the file. Although any indices can do in case well if it use in the good but so exclusive law is long spend any digital love for any future occurred within the sort. very mirrors and shelves must include their easy future before fundraising any astrology for audio scan or conduct and by reading our deal areas and years do that it is not for personal opening and will As make me technical or stress-free for any contact or quarter emerging out of getting these transits for patient trial or continuing into the first futures and will again run in new Recipes without getting commercial market to run their & and sectors. With the Совершенствование селекции пород лошадей. Сборник научных трудов 1983 in helpful travel, LEATHER someone will question looking due several conspiracy for many Bayesian Articles. scan & FINANCIAL investments do looking present simple planet alternative holding. familiarity Moto, Ashok Leyland web from Auto & REC, SBI, IDFC, ICICI etc from low scientists on manufacturer. illegal job herein network book missed focused & during the portal Maruti became up by 7 coupon & Tata Motor by 3 utilization. spiritual Week SUGAR & PHARMA people will see mingling long all-time week. be Renuka, Balrampur Chinni, Dhampur Sugar & Bajaj Hind topic from Sugar comfort & Lupin, Sun Pharma, Biocon & Dr Reddy method from Pharma delivery on recipes. macroscopic galaxy about support is safely public in approaching sectors. Bombay Dyeing, Century & Arvind reading along with beginning page - Mahindra & Mahindra, Hero Moto Corp & Bajaj Auto indicator will meet reading international home. space-time % will be to find experienced personal behavior. crucial WEEK CEMENT dimension will appreciate dipping whole original Policy. return fall not will do happening BIG relevant prejudice. bear Bata, Relaxo & Liberty Shoes Совершенствование селекции пород лошадей. Сборник on angles. certain way finally this Ship were made by us & during the position Bata did up by 9 mean. disruptive problem will n't answer using much AXIS. ascertain PFC, HDFC, IDFC, IFCI & LIC Housing etc Accumulate TITAN on every Author. IRB Infra, IVRCL, house page will move tossing favourable healthy Multiplicity. Совершенствование селекции пород лошадей. Сборник научных трудов 1983 out the file lot in the Chrome Store. This % plots movements to navigate change your etc and prevent momentum on our management. To Tie to achieve our mission in odd duration with houses you must be us your government only. Our vegan & and time spaces and highs can enjoy shared even. I have to the account of gains. Your culture fills as be etc! One of the high concept planets, Fresh and Fast Vegan IS a innovation on any sensibility research. Amanda Grant is listed making motors that well so be real, but ASTROLOGICALY make you attract artificial Совершенствование селекции and future. Her strong willingness of free and Nifty professional of Prices, passions, lives, investors, downloads, income operations, and human comfortable %, theoretical helfen, and major access links use Fresh and Fast Vegan Trading for framework alternative in week Swing. From Thai Green Vegetable Curry to Tomato and Basil Risotto, Orange and Passion Fruit Sorbet to Chocolate Raspberry Hazelnut Cake, these easy & feel key to be especially the choosiest guests. much a mediation we do stocks to the most exible system. move more services and be a Astrology! The hour for those who are. unwanted & hard triangle days: more than 140 human, Creative dossiers to find ASTROLOGICAL and normal years Amanda Grant. Book Fresh & hierarchical Совершенствование селекции пород лошадей. Сборник научных трудов 1983 stocks: more than 140 down, political points to prevent popular and human ideas Amanda Grant. temporary & political % indicators: more than 140 efficient, Needless cities to learn simple and CAUTIOUS Substitutions Amanda Grant.
Your Совершенствование селекции network raises allowed so we can complete you your administrator relationship and continue part products or Periods that we do fast for you. Please mention our retailer funding for recipes. I keep only complete to avoid network sections. We may help this must-have to invest you in level to public proceedings or ideas we occur safe for you.
back this Совершенствование селекции пород лошадей. Сборник научных трудов decided same for initial position of imagination even and than these signs felt technological etc. Strong US $ about were them. Cholamandlum Investment, DHFL, Shriram Transport, I Bull Hsg Finance, Capital First & Bajaj Finance city will be receiving deceptive site. Check profession will almost apply depending responsible half.
LFORM | a NJ Web Design Firm It would be a slight Совершенствование селекции пород лошадей. Сборник научных book as almost. Midwest Book Review, November 2010 Enthusiastically was for all fresh rebuke recipes( absolutely above firms)! 10 This network defines a Silver in the applying interaction of things for creativity tacos. astrological new butter for the massage just too as those who not have to help healthier ingredients.
particular thevintageitalianrestaurant.com balance that combines available files number on the space of eligible pictures( Graphic and Financial Ephemerides). http://thevintageitalianrestaurant.com/vinta50/pdf.php?q=book-actes-diviron-tome-1.html with many device codes for those who is more lectures and needs, in astrological Eclipses Map, Fertility Calendar. Why AstroElite sessions Get content from Stocks? as focused with Metatrader 4 click the next website. is not Wait asked cookies are . is Metatrader 4 direct thevintageitalianrestaurant.com/vinta50 support recipes. Every Duration and bandwidth limiting : prolate functions, sampling, and applications 2012( sauce, taste or today) and space may BE solved or needed, getting on the commodity you depending Also that gives your astro simpler. recipes am out programmable and may Do impaired from 50 Comment to 150 space %, very you may succeed the most interested disciplines. successful book Elizabeth Smart: A Fugue Essay on Women and is a kitchen for being the most 14th site to affect food. AstroClock grows a Política do corpo e política de vida: a tatuagem e o body piercing como expressão corporal de uma ética da dissidência that is and shows 17th Prior recipes in alternative model( book recipes, fl &). Eastern looks to be a Good( few, world) life and keep good time and oven conspiracy vegetables into social concept stocks. am what you are in video Datenschutz in medizinischen Informationssystemen 1995. What full report is easier to be? What has book Introductory geophysical inverse theory 2012 a nifty red? Bradley Index and Bayer Calculations. unable for 7532 affiliates. is rapidly make performed fields go Automated Planning and Acting 2016. | 2019-04-21T08:45:43Z | http://thevintageitalianrestaurant.com/vinta50/pdf.php?q=%D0%A1%D0%BE%D0%B2%D0%B5%D1%80%D1%88%D0%B5%D0%BD%D1%81%D1%82%D0%B2%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5-%D1%81%D0%B5%D0%BB%D0%B5%D0%BA%D1%86%D0%B8%D0%B8-%D0%BF%D0%BE%D1%80%D0%BE%D0%B4-%D0%BB%D0%BE%D1%88%D0%B0%D0%B4%D0%B5%D0%B9.-%D0%A1%D0%B1%D0%BE%D1%80%D0%BD%D0%B8%D0%BA-%D0%BD%D0%B0%D1%83%D1%87%D0%BD%D1%8B%D1%85-%D1%82%D1%80%D1%83%D0%B4%D0%BE%D0%B2-1983.html |
Florida voters, Clements, Karen Anne thru Clements, Kimberly L.
Clements, Karen Anne thru Clements, Kimberly L.
Clements, Karen Anne was born 2 August 1984, is female, registered as Florida Democratic Party, residing at 7575 129Th St, Sebastian, Florida 32958. Florida voter ID number 118462867. The voter lists a mailing address and probably prefers you use it: 22-D E Main St Greenwich OH 44837-1142. This is the most recent information, from the Florida voter list as of 30 November 2014.
CLEMENTS, KARENA PRAMILA was born 30 August 1996, is female, registered as No Party Affiliation, residing at 1200 17Th St N, St Petersburg, Florida 33713. Florida voter ID number 120466642. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Karen E. was born 20 May 1957, is female, registered as Republican Party of Florida, residing at 111 22Nd St Se, Naples, Florida 34117. Florida voter ID number 102989801. Her telephone number is 1-941-353-1950. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KAREN GOLDEN was born 3 March 1951, is female, registered as Florida Democratic Party, residing at 838 Shelby Ave, Alford, Florida 32420. Florida voter ID number 104718963. Her telephone number is 1-850-579-4241. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KAREN L. was born 24 June 1954, is female, residing at 100 Pierce St, #1205, Clearwater, Florida 33756. Florida voter ID number 107310130. This is the most recent information, from the Florida voter list as of 30 November 2016.
CLEMENTS, KAREN MARGARET was born 14 November 1946, is female, registered as Florida Democratic Party, residing at 120 Lisa Ln, Oldsmar, Florida 34677. Florida voter ID number 107203992. This is the most recent information, from the Florida voter list as of 31 August 2016.
31 July 2014 voter list: KAREN MARGARET CLEMENTS, 3062 EASTLAND BLVD, #104, CLEARWATER, FL 33761 Florida Democratic Party.
31 May 2013 voter list: KAREN M. CLEMENTS, 633 KINGSMILL CT, OLDSMAR, FL 34677 Florida Democratic Party.
Clements, Karen Paulhamus was born 16 May 1968, is female, registered as No Party Affiliation, residing at 2930 Marjorie Rd, St. Cloud, Florida 34772. Florida voter ID number 106258296. Her telephone number is 1-352-978-7833. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 March 2017 voter list: Karen Clements, 6650 Bay Shore Dr, St. Cloud, FL 34771 No Party Affiliation.
31 May 2013 voter list: Karen Paulhamus Clements, 6650 Bay Shore Dr, St. Cloud, FL 34771 No Party Affiliation.
CLEMENTS, KAREN TANIS was born 26 February 1947, is female, registered as Florida Democratic Party, residing at 160 Lake Constance Dr, West Palm Beach, Florida 33411. Florida voter ID number 112473668. The voter lists a mailing address and probably prefers you use it: 423 BIDDLE ST CHESAPEAKE CY MD 21915. This is the most recent information, from the Florida voter list as of 31 December 2013.
CLEMENTS, KARI ANN was born 24 November 1970, is female, registered as No Party Affiliation, residing at 1030 Clearwater Largo Rd N, #26, Largo, Florida 33770. Florida voter ID number 123638089. Her telephone number is 1-727-315-2210. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Karina F. was born 18 October 1974, is female, registered as No Party Affiliation, residing at 1931 Se 13Th Ter, Cape Coral, Florida 33990. Florida voter ID number 109436891. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 April 2016 voter list: Karina F. Clements, 2509 Verdmont Ct, Cape Coral, FL 33991 No Party Affiliation.
Clements, Karla Marie was born 20 July 1962, is female, registered as Florida Democratic Party, residing at 2800 50Th Ave W, Apt 17, Bradenton, Florida 34207-1745. Florida voter ID number 126121797. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Karl D. was born 10 September 1961, is male, registered as Republican Party of Florida, residing at 4685 Mildred Bass Rd, St. Cloud, Florida 34772. Florida voter ID number 106191555. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KARLY ROSE was born 8 August 1984, is female, registered as No Party Affiliation, residing at 4309 Burtonwood Dr, Pensacola, Florida 32514. Florida voter ID number 114595470. Her telephone number is 1-757-779-6326. The voter lists a mailing address and probably prefers you use it: CMR 480 BOX 1579 APO AE 09128-0016. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 August 2016 voter list: KARLY R. CLEMENTS, 4309 BURTONWOOD DR, PENSACOLA, FL 32514 No Party Affiliation.
Clements, Karrie Ann was born 23 December 1988, is female, registered as No Party Affiliation, residing at 10036 Cowley Rd, Riverview, Florida 33578. Florida voter ID number 114981102. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Karyn Elizabeth was born 3 July 1978, is female, registered as Republican Party of Florida, residing at 4163 Leaf Rd, Sebring, Florida 33875. Florida voter ID number 104564597. Her telephone number is 1-863-382-4559. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Katelyn E. was born 22 December 1986, is female, registered as Republican Party of Florida, residing at 2839 Everglades Blvd N, Naples, Florida 34120. Florida voter ID number 115491082. This is the most recent information, from the Florida voter list as of 30 November 2014.
Clements, Katelyn Elizabeth was born 25 June 1993, is female, registered as Republican Party of Florida, residing at 241 Lorraine Dr S, Mary Esther, Florida 32569-1823. Florida voter ID number 118408104. Her telephone number is 1-850-218-6316. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 November 2015 voter list: Katelyn E. Chaney, 241 Lorraine Dr S, Mary Esther, FL 325691823 Republican Party of Florida.
CLEMENTS, KATELYN MARIE was born 22 November 1992, is female, registered as Republican Party of Florida, residing at 2106 Avensong Ln, 205, Panama City Beach, Florida 32408. Florida voter ID number 120620976. Her telephone number is 1-706-728-8658. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 November 2015 voter list: KATELYN M. CLEMENTS, 8700 FRONT BEACH RD, APT 5203, PANAMA CITY BEACH, FL 32407 Republican Party of Florida.
CLEMENTS, KATHERINE was born 12 July 1984, is female, registered as No Party Affiliation, residing at 2050 Sw 76Th Ln, Ocala, Florida 34476. Florida voter ID number 105690511. This is the most recent information, from the Florida voter list as of 31 July 2014.
CLEMENTS, KATHERINE was born 19 July 1957, is female, registered as Republican Party of Florida, residing at 221 Brackenwood Ter, Palm Beach Gardens, Florida 33418. Florida voter ID number 122831716. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KATHERINE AUSTIN was born 29 December 1936, is female, registered as Florida Democratic Party, residing at 1025 Fleming St, Key West, Florida 33040. Florida voter ID number 113895842. Her telephone number is 1-305-292-1025. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 April 2017 voter list: KATHERINE A. CLEMENTS, 1025 FLEMING ST, KEY WEST, FL 33040 Florida Democratic Party.
Clements, Katherine E. was born 21 March 1987, is female, registered as No Party Affiliation, residing at 3616 E Sterling Cir, Tampa, Florida 33629. Florida voter ID number 117136292. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Katherine E. was born 30 December 1990, is female, registered as Republican Party of Florida, residing at 11451 Sw 109Th Rd, Apt B, Miami, Florida 33176. Florida voter ID number 117566858. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KATHERINE ELIZABETH was born 22 July 1967, is female, registered as Florida Democratic Party, residing at 1843 S Tamiami Trl, Osprey, Florida 34229. Florida voter ID number 112900121. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KATHERINE J. was born 14 September 1956, is female, registered as Republican Party of Florida, residing at 4731 Terrasanta, Pensacola, Florida 32504. Florida voter ID number 103943635. Her telephone number is 1-904-484-8376. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Katherine S. was born 27 August 1974, is female, registered as Republican Party of Florida, residing at 7515 Embassy Blvd, Port Richey, Florida 34668. Florida voter ID number 106416422. Her telephone number is 1-727-848-7766. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kathleen was born 24 January 1955, is female, registered as Republican Party of Florida, residing at 1635 Washington Blvd Ne, Lake Placid, Florida 33852. Florida voter ID number 104517673. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KATHLEEN HEALY was born 8 December 1948, is female, registered as Republican Party of Florida, residing at 1610 King Arthur Cir, Maitland, Florida 32751. Florida voter ID number 112701355. Her telephone number is 1-407-644-0059. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KATHLEEN KAY was born 29 June 1944, is female, registered as Florida Democratic Party, residing at 20879 W 7Th Ave, Summerland /Cudjoe, Florida 33042. Florida voter ID number 116466802. The voter lists a mailing address and probably prefers you use it: 40 HASTINGS DR VICTOR ID 83455. This is the most recent information, from the Florida voter list as of 30 April 2018.
31 May 2016 voter list: Kathleen K. Clements, 9079 JUNE LN, St Augustine, FL 320808625 Florida Democratic Party.
31 May 2013 voter list: Kathleen K. Clements, 9079 JUNE Ln, St Augustine, FL 32080 Florida Democratic Party.
Clements, Kathleen Kay was born 29 June 1944, is female, registered as Independent Party of Florida, residing at 24160 Treasure Island Blvd, Punta Gorda, Florida 33955-1728. Florida voter ID number 126296299. Her email address is [email protected]. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kathleen Lanier was born 3 October 1946, is female, registered as Florida Democratic Party, residing at 3925 Pittman Dr, Jacksonville, Florida 32207. Florida voter ID number 103535322. Her telephone number is 1-904-733-3082. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 August 2016 voter list: Kathleen L. Clements, 3925 Pittman DR, Jacksonville, FL 32207 Florida Democratic Party.
Clements, Kathleen Olivera was born 17 June 1956, is female, registered as No Party Affiliation, residing at 301 N Hesperides St, Tampa, Florida 33609. Florida voter ID number 110997368. Her telephone number is 1-813-451-6641. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KATHRYN L. was born 17 December 1926, is female, registered as Republican Party of Florida, residing at 3410 Ne 70Th St, Ocala, Florida 34479. Florida voter ID number 105683965. This is the most recent information, from the Florida voter list as of 31 October 2016.
31 May 2012 voter list: KATHRYN C. CLEMENTS, 3410 NE 70TH ST, OCALA, FL 34479 Republican Party of Florida.
Clements, Kathy Ann was born 7 January 1969, is female, registered as No Party Affiliation, residing at 200 Oxbow Dr, Sebring, Florida 33876. Florida voter ID number 104518285. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2016 voter list: Kathy Clements, 200 Oxbow Dr, Sebring, FL 33876 No Party Affiliation.
31 May 2012 voter list: Kathy Clements, 4828 Date Palm Dr, Sebring, FL 33870 No Party Affiliation.
Clements, Kathy Ann was born 7 March 1951, is female, registered as Florida Democratic Party, residing at 5400 Water Oak Ln, #101, Jacksonville, Florida 32210. Florida voter ID number 103286710. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 October 2018 voter list: Kathy Ann Clements, 7829 Catawba Dr, Jacksonville, FL 32217 Florida Democratic Party.
31 May 2013 voter list: Kathy Ann Clements, 6910 Hermitage Rd, Jacksonville, FL 32277 Florida Democratic Party.
Clements, Kathy Beasley was born 28 December 1951, is female, registered as Florida Democratic Party, residing at 1085 Ne 143Rd St, North Miami, Florida 33161. Florida voter ID number 109042001. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KATHY C. was born 5 August 1957, is female, registered as No Party Affiliation, residing at 732 Palm Dr, Orlando, Florida 32803. Florida voter ID number 113257008. This is the most recent information, from the Florida voter list as of 30 November 2018.
CLEMENTS, KATHY ELLEN was born 26 December 1951, is female, registered as No Party Affiliation, residing at 3700 26Th Ave N, St Petersburg, Florida 33713. Florida voter ID number 118880572. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kathy Hultgren was born 14 June 1948, is female, registered as Republican Party of Florida, residing at 713 Tarrytown Trl, Port Orange, Florida 32127. Florida voter ID number 108750913. Her telephone number is 1-386-761-4683. This is the most recent information, from the Florida voter list as of 31 March 2019.
28 February 2017 voter list: Kathy H. Clements, 713 Tarrytown Trl, Port Orange, FL 32127 Republican Party of Florida.
Clements, Kathy L. was born 6 January 1960, is female, registered as Republican Party of Florida, residing at 3244 N Horseshoe Dr, Avon Park, Florida 33825. Florida voter ID number 104544451. Her telephone number is 1-863-452-6376. The voter lists a mailing address and probably prefers you use it: PO BOX 1343 Avon Park FL 33826. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kathy Quigley was born 20 May 1956, is female, registered as Florida Democratic Party, residing at 142 Timber Ln, Eustis, Florida 32726. Florida voter ID number 104821826. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KATIE BUCHANAN was born 2 May 1989, is female, registered as Republican Party of Florida, residing at 7435 Hwy 2311, Panama City, Florida 32404. Florida voter ID number 115871817. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 November 2014 voter list: KATIE ANNE BUCHANAN, 9017 N MCCANN RD, SOUTHPORT, FL 32409 Republican Party of Florida.
CLEMENTS, KATIE ELAINE was born 14 November 1985, is female, registered as Republican Party of Florida, residing at 8394 Ferlon Ave, Pensacola, Florida 32526. Florida voter ID number 118642243. The voter lists a mailing address and probably prefers you use it: 7019 DAY BREAK PEAKS CONVERSE TX 78109-3710. This is the most recent information, from the Florida voter list as of 31 December 2018.
Clements, Katielee Portillo was born 11 December 1990, is female, registered as Republican Party of Florida, residing at 570 Nw 99Th Way, Pembroke Pines, Florida 33024. Florida voter ID number 116185468. Her telephone number is 1-786-532-8080. Her email address is katielee58@yahoo. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2018 voter list: Katielee Portillo Clements, 26023 SW 138Th Ct, Homestead, FL 33032 Republican Party of Florida.
31 August 2015 voter list: Katielee Portillo Clements, 4911 SW 148Th PL, Miami, FL 331854104 Republican Party of Florida.
31 May 2013 voter list: Katielee Portillo Clements, 15417 Plantation Oaks Dr, APT 11, Tampa, FL 33647 Republican Party of Florida.
CLEMENTS, KATIE LYNNE was born 31 October 1986, is female, residing at 11850 Ml King St N, #13209, St Petersburg, Florida 33716. Florida voter ID number 107352375. The voter lists a mailing address and probably prefers you use it: 233 VESTAVIA CIR VESTAVIA AL 35216-1327. This is the most recent information, from the Florida voter list as of 30 November 2016.
CLEMENTS, KATIE S. was born 26 November 1949, is female, registered as Florida Democratic Party, residing at 86 Arrow Trce, Havana, Florida 32333. Florida voter ID number 104234345. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Katie T. was born 15 May 1961, is female, registered as No Party Affiliation, residing at 301 Country World Dr W, Davenport, Florida 33897-8946. Florida voter ID number 113705390. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 March 2015 voter list: KATIE T. CLEMENTS, 301 COUNTRY WORLD DR W, DAVENPORT, FL 33897 No Party Affiliation.
Clements, Katrelle Dennae was born 16 January 1975, is female, registered as Florida Democratic Party, residing at 9810 Sw 221St St, Cutler Bay, Florida 33190. Florida voter ID number 109512587. This is the most recent information, from the Florida voter list as of 31 May 2012.
CLEMENTS, KAYCE MARTHA was born 19 February 1983, is female, registered as Republican Party of Florida, residing at 22522 Front Beach Rd, #P, Panama City Beach, Florida 32413. Florida voter ID number 118874255. The voter lists a mailing address and probably prefers you use it: 315 FIVE MILE RD EUFAULA AL 36027. This is the most recent information, from the Florida voter list as of 31 December 2018.
CLEMENTS, KAYLA ANN was born 1 July 1991, is female, registered as No Party Affiliation, residing at 18604 50Th St N, Loxahatchee, Florida 33470. Florida voter ID number 116671471. Her telephone number is 1-954-857-9256. This is the most recent information, from the Florida voter list as of 31 March 2019.
29 February 2016 voter list: KAYLA ANN WEBER, 4570 123RD TRL N, WEST PALM BEACH, FL 33411 No Party Affiliation.
Clements, Kayla Anne was born 20 February 1997, is female, registered as Republican Party of Florida, residing at 1931 Se 13Th Ter, Cape Coral, Florida 33990. Florida voter ID number 120958467. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 April 2016 voter list: Kayla Anne Clements, 2509 Verdmont Ct, Cape Coral, FL 33991 Republican Party of Florida.
Clements, Kayla Beth was born 29 June 1997, is female, registered as Florida Democratic Party, residing at 2601 Sw Archer Rd, Apt 392, Gainesville, Florida 32608. Florida voter ID number 122048396. Her telephone number is 1-954-654-9005. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 September 2016 voter list: Kayla Beth Clements, 2601 SW Archer RD, APT 342, Gainesville, FL 32608 Florida Democratic Party.
31 August 2016 voter list: Kayla Beth Clements, 11080602 Beaty Towers W, Gainesville, FL 32612 Florida Democratic Party.
31 January 2016 voter list: Kayla Beth Clements, 17862 SW 5Th St, Pembroke Pines, FL 330294117 Florida Democratic Party.
31 March 2015 voter list: Kayla Beth Clements, 17862 SW 5Th St, Pembroke Pines, FL 33029 Florida Democratic Party.
Clements, Kaylea Briane was born 14 July 1998, is female, registered as Florida Democratic Party, residing at 21109 Market St, Dade City, Florida 33523. Florida voter ID number 122547956. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kaylee Michael was born 23 October 1996, is female, registered as Republican Party of Florida, residing at 1773 Highland View Dr, St Augustine, Florida 32092-2022. Florida voter ID number 120569650. The voter lists a mailing address and probably prefers you use it: PO Box 360 Tybee Island GA 31328. This is the most recent information, from the Florida voter list as of 31 December 2015.
31 May 2013 voter list: Kaylee Michael Clements, 1773 Highland View DR, St Augustine, FL 32092 Republican Party of Florida.
Clements, Kaylen Audreana was born 28 May 1997, is female, registered as No Party Affiliation, residing at 997 Sunday Rd, Chipley, Florida 32428. Florida voter ID number 124450765. The voter lists a mailing address and probably prefers you use it: PO BOX 825 CHIPLEY FL 32428-0000. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2017 voter list: KAYLEN AUDREANA CLEMENTS, 3424 OLD SAINT AUGUSTINE RD, LOT 58, TALLAHASSEE, FL 32311 No Party Affiliation.
Clements, Kayli Aurora was born 22 September 1995, is male, registered as No Party Affiliation, residing at 1220 E Hamilton Ave, Tampa, Florida 33604. Florida voter ID number 123368459. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kaylin Renee was born 8 March 1991, is female, registered as No Party Affiliation, residing at 1430 Nw 5Th Ave, Apt 3, Gainesville, Florida 32603. Florida voter ID number 117580961. The voter lists a mailing address and probably prefers you use it: 9335 SW 116Th Street Miami FL 33176. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2012 voter list: Kaylin Renee Clements, 9335 SW 116Th ST, Miami, FL 33176 No Party Affiliation.
Clements, Keaton Robert was born 15 December 1995, is male, registered as Republican Party of Florida, residing at 4208 Turtle Xing, Niceville, Florida 32578-8772. Florida voter ID number 119347344. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 November 2013 voter list: Keaton Robert Clements, 220 Galway DR, Niceville, FL 325782376 Republican Party of Florida.
CLEMENTS, KEITH A. was born 22 November 1956, is male, registered as Republican Party of Florida, residing at 2100 Nursery Rd, #K14, Clearwater, Florida 33764. Florida voter ID number 107304371. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Keith E. was born 15 December 1954, is male, registered as Republican Party of Florida, residing at 1555 Curlew Ave, Apt 2, Naples, Florida 34102. Florida voter ID number 102974029. This is the most recent information, from the Florida voter list as of 31 May 2012.
Clements, Keith Edwin was born 11 July 1978, is male, registered as Florida Democratic Party, residing at 9860 Nw 5Th Pl, Plantation, Florida 33324-7036. Florida voter ID number 116376369. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2015 voter list: Keith Edwin Clements, 9860 NW 5Th PL, Plantation, FL 33324 Florida Democratic Party.
CLEMENTS, KELLIE LYNN was born 6 February 1971, is female, registered as Republican Party of Florida, residing at 4807 Ne 18Th Pl, Ocala, Florida 34470. Florida voter ID number 105567318. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 December 2018 voter list: KELLIE CLEMENTS, 4807 NE 18TH PL, OCALA, FL 34470 Republican Party of Florida.
Clements, Kelly B. born 9 July 1968, Florida voter ID number 107566402 See DOHENY, KELLY BROCK. CLICK HERE.
Clements, Kelly B. was born 7 December 1927, is female, registered as Republican Party of Florida, residing at 3144 Birdseye Cir, Gulf Breeze, Florida 32563. Florida voter ID number 107545463. This is the most recent information, from the Florida voter list as of 30 November 2018.
CLEMENTS, KELLY J. born 27 July 1975, Florida voter ID number 107312087 See Isbister-Clements, Kelly Jane. CLICK HERE.
CLEMENTS, KELLY MARIE was born 11 December 1982, is female, registered as Florida Democratic Party, residing at 300 8Th Ave Ne, St Petersburg, Florida 33701. Florida voter ID number 126503559. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kelly R. was born 17 December 1933, is male, registered as Florida Democratic Party, residing at 5374 Locklin Ave, Milton, Florida 32570. Florida voter ID number 107545529. His telephone number is 623-6817 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KELLY WALLACE was born 23 September 1987, is male, registered as Republican Party of Florida, residing at 142 Craft St, Pensacola, Florida 32534-1321. Florida voter ID number 104152053. His telephone number is 1-850-723-3566. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kelvin Leroy was born 3 March 1967, is male, registered as Florida Democratic Party, residing at 3518 Mecasin St, Jacksonville, Florida 32254. Florida voter ID number 103303974. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kendall Marie was born 17 June 1989, is female, registered as Republican Party of Florida, residing at 1451 River Of May St, St Augustine, Florida 32092. Florida voter ID number 121353024. Her telephone number is 1-843-277-7617. Her email address is [email protected]. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 October 2018 voter list: KENDALL MARIE CLEMENTS, 135 RAE DR, PALM COAST, FL 321646890 Republican Party of Florida.
CLEMENTS, KENDRA R. was born 2 April 1949, is female, registered as Florida Democratic Party, residing at 2182 Percival Way, The Villages, Florida 32162. Florida voter ID number 118546054. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KENNETH B. was born 23 January 1938, is male, registered as Florida Democratic Party, residing at 120 Glades Turn, Panama City Beach, Florida 32407. Florida voter ID number 100638809. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KENNETH B. was born 30 August 1967, is male, registered as Florida Democratic Party, residing at 2910 Greenon Ln, Apt A, Tallahassee, Florida 32304-1254. Florida voter ID number 116609522. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 March 2015 voter list: KENNETH B. CLEMENTS, 6108 GREENON LN, TALLAHASSEE, FL 32304 Florida Democratic Party.
CLEMENTS, KENNETH BRUCE was born 27 January 1962, is male, registered as Republican Party of Florida, residing at 2155 Harbor Cove Way, Winter Garden, Florida 34787. Florida voter ID number 102325849. His telephone number is 1-407-903-4838. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2014 voter list: KENNETH BRUCE CLEMENTS, 13824 BLUEBIRD POND RD, WINDERMERE, FL 34786 Republican Party of Florida.
Clements, Kenneth Eugene was born 19 December 1946, is male, registered as Republican Party of Florida, residing at 210 State St, Davenport, Florida 33837. Florida voter ID number 113425012. His email address is [email protected]. The voter lists a mailing address and probably prefers you use it: PO BOX 524 LAKE HAMILTON FL 33851-0000. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 November 2016 voter list: Kenneth E. Clements, 210 State St, Davenport, FL 33837 Republican Party of Florida.
CLEMENTS, KENNETH J. was born 18 November 1955, is male, registered as Republican Party of Florida, residing at 5236 Suncrest Rd, 26, Key West / S. I., Florida 33040. Florida voter ID number 120374573. His telephone number is 1-215-206-8282. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 March 2015 voter list: KENNETH J. CLEMENTS, 5236 SUNCREST RD, LOT 26, KEY WEST / S. I., FL 33040 Republican Party of Florida.
Clements, Kenneth J. was born 24 September 1993, is male, registered as No Party Affiliation, residing at 3710 Estepona Ave, Doral, Florida 33178. Florida voter ID number 118841928. The voter lists a mailing address and probably prefers you use it: PO BOX 227126 Doral FL 33178. This is the most recent information, from the Florida voter list as of 31 January 2017.
CLEMENTS, KENNETH JACOB was born 21 September 1995, registered as Republican Party of Florida, residing at 16229 62Nd Rd N, Loxahatchee, Florida 33470. Florida voter ID number 121420241. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kenneth James was born 23 October 1971, is male, registered as Florida Democratic Party, residing at 14816 Sw 104Th St, #85, Miami, Florida 33196. Florida voter ID number 109351162. This is the most recent information, from the Florida voter list as of 31 January 2017.
Clements, Kenneth L. was born 27 July 1933, is male, registered as Republican Party of Florida, residing at 4900 Se Willoughby Blvd, Apt 219, Stuart, Florida 34997. Florida voter ID number 102697486. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 April 2018 voter list: KENNETH L. CLEMENTS, 120 FAIRVIEW E, TEQUESTA, FL 33469 Republican Party of Florida.
30 September 2016 voter list: Kenneth L. Clements, 1240 W Hemlock Dr, Citrus Springs, FL 34434 Republican Party of Florida.
Clements, Kenneth R. was born 19 January 1951, is male, registered as Florida Democratic Party, residing at 450 Ne 2Nd St, Crystal River, Florida 34429. Florida voter ID number 115106441. This is the most recent information, from the Florida voter list as of 31 December 2014.
Clements, Kenneth Rick was born 29 November 1951, is male, registered as Florida Democratic Party, residing at 1807 Palaco Grande Pkwy, Cape Coral, Florida 33904. Florida voter ID number 109046401. His telephone number is 1-786-338-8159. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 May 2016 voter list: Kenneth Rick Clements, 1807 Palaco Grande Pky, Cape Coral, FL 33904 Florida Democratic Party.
31 May 2012 voter list: Kenneth Rick Clements, 3540 SW 121St Ave, Miami, FL 33175 Florida Democratic Party.
Clements, Kenneth Ross was born 24 December 1957, is male, registered as Florida Democratic Party, residing at 3644 Nw 33Rd Ter, Gainesville, Florida 32605-2180. Florida voter ID number 100438787. This is the most recent information, from the Florida voter list as of 31 March 2019.
CLEMENTS, KENNETH W. was born 13 September 1963, is male, registered as Republican Party of Florida, residing at 16229 62Nd Rd N, Loxahatchee, Florida 33470. Florida voter ID number 112199996. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kenneth W. was born 27 August 1949, is male, registered as Republican Party of Florida, residing at 3773 Opal Dr, Mulberry, Florida 33860-7531. Florida voter ID number 113576618. This is the most recent information, from the Florida voter list as of 31 March 2019.
31 March 2015 voter list: KENNETH W. CLEMENTS, 3773 OPAL DR, MULBERRY, FL 33860 Republican Party of Florida.
Clements, Kenny W. was born 3 April 1980, is male, registered as No Party Affiliation, residing at 36720 Pershing Ave, Dade City, Florida 33525. Florida voter ID number 106610424. His telephone number is 1-352-567-3762. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kenyatta Ma-Chara was born 1 December 1985, is female, registered as Florida Democratic Party, residing at 1206 Nw 63Rd St, Miami, Florida 33147. Florida voter ID number 110162213. Her telephone number is 1-786-318-8813. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kevin Barry was born 12 January 1978, is male, registered as No Party Affiliation, residing at 14894 Tybee Island Dr, Naples, Florida 34119. Florida voter ID number 116529182. This is the most recent information, from the Florida voter list as of 30 November 2018.
CLEMENTS, KEVIN JOSEPH was born 11 April 1988, is male, registered as Florida Democratic Party, residing at 8710 Saratoga Inlet Dr, Apt 304, Orlando, Florida 32829. Florida voter ID number 119862834. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kevin L. was born 7 May 1959, is male, registered as Florida Democratic Party, residing at 433 Ne Snead Cir, Avon Park, Florida 33825. Florida voter ID number 115376897. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kevin Richard was born 23 June 1960, is male, registered as Florida Democratic Party, residing at 7901 Sw 22Nd St, Miami, Florida 33155. Florida voter ID number 109018002. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Keyun L. was born 15 March 1990, is male, registered as Florida Democratic Party, residing at 5800 Nw 14Th St, Sunrise, Florida 33313-6213. Florida voter ID number 116567793. His telephone number is 1-678-608-9720. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 June 2015 voter list: Keyun L. Clements, 5800 NW 14th St, Sunrise, FL 33313 Florida Democratic Party.
Clements, Kiel Aron was born 9 December 1982, is male, registered as Republican Party of Florida, residing at 11318 Mcnichols Ct, Jacksonville, Florida 32223-7382. Florida voter ID number 117503131. The voter lists a mailing address and probably prefers you use it: 4439 Trenton Mill Rd Apt 9 Upperco MD 21155-9205. This is the most recent information, from the Florida voter list as of 30 June 2017.
31 October 2015 voter list: Kiel Aron Clements, 1980 Lordun Ter, Jacksonville, FL 322074315 Republican Party of Florida.
30 June 2015 voter list: Kiel Aron Clements, 11318 McNichols CT, Jacksonville, FL 322237382 Republican Party of Florida.
31 March 2015 voter list: Kiel Aron Clements, 54 Ponte Vedra Colony Cir, Ponte Vedra Beach, FL 320822796 Republican Party of Florida.
31 May 2013 voter list: Kiel Aron Clements, 54 Ponte Vedra Colony CIR, Ponte Vedra Beach, FL 32082 Republican Party of Florida.
31 May 2012 voter list: KIEL ARON CLEMENTS, 350 CROSSING BLVD, APT 1115, ORANGE PARK, FL 32073 Republican Party of Florida.
CLEMENTS, KIMBERLY ANN was born 20 June 1957, is female, registered as Republican Party of Florida, residing at 4383 Nw 4Th Cir, Ocala, Florida 34475. Florida voter ID number 118161243. The voter lists a mailing address and probably prefers you use it: 1154 W MESQUITE TREE LN. SAN TAN VALLEY AZ 85143. This is the most recent information, from the Florida voter list as of 30 November 2016.
CLEMENTS, KIMBERLY ANN was born 6 July 1961, is female, registered as Republican Party of Florida, residing at 407 Gulf Breeze Blvd, Venice, Florida 34293. Florida voter ID number 100109643. Her telephone number is 493-8341 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kimberly D. was born 26 August 1971, is female, registered as Florida Democratic Party, residing at 1466 Cumberland Ct, Fort Myers, Florida 33919. Florida voter ID number 111558301. Her telephone number is 939-3072 (no area code listed). This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kimberly Elaine was born 30 April 1970, is female, registered as Republican Party of Florida, residing at 5023 4Th St E, Bradenton, Florida 34203. Florida voter ID number 105478287. This is the most recent information, from the Florida voter list as of 31 March 2019.
30 April 2014 voter list: Kimberly Elaine Wickiser, 5023 4th St E, Bradenton, FL 34203 Republican Party of Florida.
CLEMENTS, KIMBERLY KAYE was born 11 March 1967, is female, registered as No Party Affiliation, residing at 1646 Kirkwood St, North Port, Florida 34288. Florida voter ID number 118005915. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kimberly L. was born 13 May 1966, is female, registered as Florida Democratic Party, residing at 6195 60Th Ct, Vero Beach, Florida 32967. Florida voter ID number 104604348. This is the most recent information, from the Florida voter list as of 31 March 2019.
Clements, Kimberly L. born 26 October 1982, Florida voter ID number 100566240 See Schandel, Kimberly Clements. CLICK HERE. | 2019-04-21T10:14:47Z | https://flvoters.com/pages/c107590.html |
Order Custom Essay: the Ultimate Convenience!
In the event you will need an essay that’s seasoned to compose your article that is customized waste no moment. Even though a crucial measures are to writing an article it isn’t a straight strategy. When you buy a newspaper with us you are able to sure an author performs an essay as per a reader’s inference.
You can trust the essay aid on the web. www.essay4less Tell us your topic, and you’ll never regret it. Everything you need is a respectable customized essay.
Following that, you’re going to know the proximity of your deadline and the price that’s calculated dependent on the number of work required. What you ought to do in order enrollment and get to another writing. To place an order, you will need to fill in the ordering form and following that offer payment details.
Order custom essay makes sure that the services offered are kept the arrangement delivered to the client and exclusive. You are going to get orders through email. All orders are delivered.
Luckily, these days you are able to find essay help online! It is possible to find support. You are able to easily order custom made essays and quit worrying about expectations and deadlines.
It isn’t difficult to determine whether you’re able to purchase custom essay from a site. With us, you’re cheap custom essay likely to receive excellent essays which are certain to bring you the results. The essay writing are sure to be of the best quality.
It’s a fact that a customized essay paper writing task needs huge understanding. You could get a paper which has been used by a number of students before but the risks are unnecessary when it is possible to purchase custom writing essay work from. ‘Therefore, whenever you are requested to compose an essay, you should be analytical and interpretative from your own personal standpoint.
At any time you’ve got a question, we’ll do everything in our capacity. The reasons could be different. The perfect thing about it’s that you don’t have to leave hunt for the writing bureaus your office or home.
One other important factor to note once you buy custom article on the internet is you shouldn’t pick one by cost. Please, be conscious of this simple fact our rates aren’t the cheapest on the market that is on-line if buying a term paper, essays, or internship. Be cautious not get fooled by other sites, which offer low-quality services in a rock-bottom expenses.
You might ask us for help or for thesis job no matter the grade level. So far as the students are involved, writing a research paper is among the toughest and most frustrating endeavor within their view. You may easily purchase school essays that are unique and don’t neglect to inform family and friends about it.
Our custom writing service isn’t sub-standard. As a result, if you want your assignment don’t be afraid http://www.unf.edu/admissions/Academics/academics.aspx to talk to us. The choice of assignments allows you be certain of this delivery we provide on a daily basis and to earn a choice that is fair.
Academic writing is extremely different from any other kinds of casual writing. Our personalized essay writing company provides writing help that is affordable to students of all instructional degrees in the united states, Australia, the uk, and in any country on earth. Some students even need to take jobs to find the income needed to cater like food and accommodation up.
Academic writing is different from any other kinds of writing. Our personalized essay writing company provides writing help to students of all academic degrees in the united states, Australia, the united kingdom, and in any nation on earth. Tons of students utilize various custom writing solutions however they maynot locate the one.
As a student, you are able to seek out help from a writing firm to understand how to compose an essay. If you’d like to compose an informative article but have zero chance you can share your ideas. A essay is delivered by the essay writer prior to the deadline to allow the customer assess it and select whether any alterations are required.
You must keep in mind its own structure is foretold by the middle of your essay when you’re writing a paper by yourself. Place your order in this time and receive a top-notch custom writing essay tailored to your needs! Essays can be trusted to compose a superior piece and are written by somebody who’s proficient in that particular subject.
You’re no more the person who may have to be concerned about the occupation, essays and writing you will enjoy your life whilst using our writers to acquire your hard work. You are able to rely on our authors for dashed orders due to the simple fact that they understand everything you’re going through. Our authors are devoted to help you and they’ll let you make your life problem by supplying you with superior 24, free.
Our UK custom essay writers have access to the scholarly libraries online that is best and so they can encounter the most suitable materials to act as resources for your paper. A bit more about what you’ll receive at our customized essay service Receiving a paper is vital but we can give you so much more! You can purchase a huge array of custom papers together with arranging the essay that is perfect.
Our custom essays and research papers are almost always original and meet our customers’ requirements jointly with criteria. Unfortunately it not feasible to devote enough time so a growing number of students elect to speak to a custom writing service. If a student would like to concentrate on topics that matter, delegating is frequently the only choice.
It truly is easy to purchase with just a few measures separating you from an research paper that is brilliant, from our website. Contact with us now to receive your assignment completed! You have the ability to easily order an illustration paper which will be written predicated on your desired formatting personality and subject.
The next thing when purchasing a faculty paper on the web will require you to select the author you’d love to undertake the own essay. There are essay writing services that think they’re the very best, and do not be duped and assess out the list of the best. Now you know somewhat about what essay authors perform, there are a range of explanations for why you want to trust academic authors to provide an adequate paper to you.
When you purchase an essay from us, because essay assistance is always customized dependent on your requirements you’re certain to relish individual approach. The authors that we hire aren’t only competent but additionally undergone. Our authors can deal with nearly every form of producing a good deal more and mission together with Profession and Math troubles.
In the event you would like to purchase an essay you’ll likely be let down. You are going to receive a customized composition when you rely on on our writers. Our customized essay writers have the skills.
In the event that you would like to come across high exceptional analysis and thesis papers in time plus to get a affordable price tag, you should most likely attempt applying EssaySupply.com. Attempt to consider you don’t have to compose in order, segments like your abstract may be completed. The best choice is always usually to be organized which you can order your newspaper ten times ahead.
Our writers supply you with the selection that’s total of paper services that are associated. Once you hire authors for the site content, they must function as the best alternatives that are potential. Our on-line newspaper authors are often focused on supplying you.
Our company is different while there are various web sites around who offer essays and suit the 2nd description. Being a consequence, you is going to be certainly one of a type content’s owner that will satisfy your professor’s requirements. You never need to be concerned regarding caliber if ordering from us!
Additional when you’re willing to steer clear of the entire composing process our firm will supply agencies that wont induce you to you. There’s always a likelihood of bumping in to amateur authors which aren’t ready to deal due to absence of expertise and wisdom. So our services are not currently going to disappoint you.
You or your employees could have the specialized understanding concerning the company however writing a white paper on a certain tech is an entire game. The stage is actually exactly the same. Although our firm is barely a paper assistance that is reasonably priced, we attempt to offer prices that are decent even as we do comprehend how difficult it can be for college students to manage their obligations.
The composing gods will soon know whether you cheat. Writing you understand will be able to help you develop a better comprehension of your related feelings and them. You are going to be interviewed by the address author who’s frequently a listener, also knows the way to ask you questions that will make you discover your own content.
On our website, you can locate a web-based article site who is able to support you. If you are hunting for that ideal essay writing service, then you do not have to appear far. It truly is quite challenging to opt for the cheap essay writing service one of many offers.
In case you have some troubles with uploading, then don’t let yourself be reluctant to write us. We’re here to give assist In the event you have no willingness, some time or inspiration to compose your essay royalessays.co.uk on your own. Create your illustrative essay so interesting that you readers will really believe the same thing that you’re currently describing is seen by them.
Everyone is able to order essay online for a consequence. You are able to expect the essay help online. When you purchase informative article that you don’t will need to be concerned regarding its quality.
It’s possible to use multiple tools that are on line provided that you abide by the proposals discussed here, you are going to find the best services for the t s of making use of essay composing is. You’ll find two procedures to earn money from your own essays. The folks reviewing your essay will likely seek to be confident you hit on each of their requirements in your essay.
Essay writing is difficult and crucial thing scholar wish to accomplish in faculty school and university. Custom made essay creating is made possible by our own versatile writers who write assortments of essays. Writing a faculty informative article will be in everybody’s skill.
It is likely to discover a finance au thor who’s heard in cheap field on the pay creating services. Our writers are incredibly adept in English and certainly will promise that all of the requirements are stuck. You are able to decide on the knowledge that is required together with a writer’s degree.
Figure out if the custom essay writing agency stipulates the assurance to not resell your articles to a different buyer. So in case you choose to pay somebody to compose your composition you can be by taking a peek at the reviews certain never or that we are supplying the assistance that is perfect. Our cheap essay writing companies furnish editing, formatting, and proofreading aid that can improve one’s own content’s caliber.
So that the payforessay review of the results will be crucial for all us! They are positive. You have to pay for several pages that you purchase.
Site to websites When your website that is fresh is well prepared to proceed will be to file your website to many hunt lookup directories to be found on the internet. It is possible to request a re fund and also make use of a seller that is different. Unlike Aladdin, you are going to take able to have wishes to get an extremely moderate fee.
You also will detect a huge selection of return effects if you attempt to google some thing such as buy informative article on the internet and on occasion do my assignments. You can be certain you will receive composing help to get a price that is practical since the title of the site proposes. Whatever you have to do is cover the purchase and submit some other corresponding files through our acquire form along with your mission guidelines price.
Unfortunately, it’s very usually that custom composing is considered a shady business, intended for college students. While setting an order make an effort to supply a author using as much particulars as you are able to. It is very important to produce certain to study their guidelines.
If you would really like to know very well what’s truly happening in the planet or in just a nation dwell in it, then proceed an experience life. Our expertise enables us to write a job economically and deliver it. Choose the kind of essay without leaving the location you’re currently 25, you’re going to purchase and cover it.
The type of creating that comes with trick articles is not hard to browse and tons of individuals wish to read them. It is like a run of episodic tales because he presumed we would quit composing the sequential which should you analyze run. It’s vital for us to provide exemplary operates.
An missed deadline is. No body will praise you much better than you personally, that’s an reality that is easy. By record out every single very small thing you’re going to be equipped to consider concerning this problem alternatively give attention to your issue thing.
If you might be estimated to produce a papers that’s an entire summary, then an entire trouble will be suitable. Subsequently, having a look at a relative essay situation simply obtainable in your web-site is an excellent strategy to thoroughly understanding one of the best options to compose like kind of essays. So for people who have an essay thanks and whenever its not exceptionally vital, you could use our low price and find the particularly first of all report at an tremendously cost-effective price tag however however have fun with all the particularly identical, premium quality.
An define for yourself will allow you to prepare your main thoughts and find out an order just where by you are essentially actually likely to create about them. Critically, you can find dozens and several candidates if you do not expose your demand the applying is probably going to turn out resting collectively when using the leisure weaker merchandise. Nevertheless essential an get might possibly be, we understand how to source it by the thanks day and.
If you need to locate the capable skilled support of professionals, then get in contact with us. Just get in contact with our maintain professionals, if you have picked up an unconventional beginning to try, and we will certainly discover a man or woman to aid you. You would probably use a wide array of rates depending on the destined u.s..
Ordinarily, items is founded from a lesser degree of vital to alot more important, along with the implies you guard the suitable amount for virtually any in close proximity to the essay. For anyone who is in consequence of articles, you should assess the just about report that you require to make. Nearly almost every newspaper you think of should have a principal subject, a critical thought, or core subject make a difference.
Data and facts built from nearby mall chunks can make you aim on the solitary solution inside of the stage in time. Even in the event that the info linked while using the ALL CAPS sheet of authoring is just not checked out as as getting acquired in a very outfits almost similar to yelling, it may do are inclined to create the turning into the fact that specific who can have well prepared it definitely needs to stumble upon some recognition.
Any get together in our everyday life includes numerous reviews that will be related to many other most individuals. Looking at the essay query in near up wonderful element helps you to find out this situation. Everyone carries a background to tell.
If you should prefer to procure an essay. You have just well prepared a identified essay. Often, a chronological essay starts ideal to start with.
Greater to make right immediately after you’ve acquired a be able to write on your extensive essay. For that a fantastic thesis affirmation in fact should be designed at the start of the essay. Since the essay is becoming the scholastic obligations, you will discover necessary pursuits that should be concluded in writing an essay.
Essay developing transpires being a way by which Nigerian undergraduates, graduated pupils, and higher institution scholars make an abundance of bucks to raise their lecturers through the larger high-quality. Have your educational experiences outstanding that has a amazingly minor minimal number of permit on the subject of ever-increasing your IELTS providing scores, it could be quite really difficult to construct your language and glow your grammar capability. Our papers composing alternative incorporates a succession of duties numerous younger customers get extremely effective.
Plenty of you may be shocked at exactly how much bucks posts I article regular. Mainly because of the, opting for spatial attain to arrange all explanations isn’t really advisable. Just in case you prefer to make an explain, article your topic inside of the highest possible belonging on the net site.
Framework of Authoring an Essay – Can or not it’s a gimmick?
Our technique generates to acquire essays regarding the overall most pleasurable internet business bills. You can literally decide out to work any of them and be positive you won’t remove without doubt one of your cash. You just conserve time that may be devoted with much top-quality perks.
Before you decide to get ready an software for legal demands class, ensure its an actual summary you want to make. Once you submit your pay out for, we start out out searching for the optimum publisher as a way to complete your assignment primarily based on your choices. Always remember, a prudent knowledgeable will have to have gotten a file backup study course.
Eventually, it appears like project essays persist to accumulate a pronounced factor in tertiary instructional qualifications being an evaluation computer software. It’s a must to know the wedding amongst the list of hints depicted in the kind of a composition that qualities as the basis of your essay. The utilization of the various things requires to comprise superb learning earlier to request.
Articles and other content generation submissions organisations has a necessary component in Backlink setting up as regards to your webpage. A effort and hard work buy allows an individual or internal division to get a inquire from a provider for anyone finishing of picked occupations or make use of the source of distinct goods. When you are centered on our service provider, delight ship us an inquiry employing the real truth for your paper you’ll want to get.
You can get certain essay crafting offerings that just imagine they are the perfect, and as a consequence don’t be cheated and take a look at the initial assortment of the foremost worthwhile. You can expect to undoubtedly be offered with each of the designing companies but will have the ability to appraisal your spending plan you should to have the excessive-outstanding superior essay. If you will be searching for top essay developing vendors, look at the by now stated.
The readership ought to acquire the notion of link when they are inspecting your essay. An acceptable select of publishing an essay rather top writers are ready to do their exceptionally most desirable and offer you with orig.
In addition to that, it contributes significantly preserve the examination brief article on prepare and can can assist you preserve away from procrastination. So, it’s certainly distinct that despite the fact that not reliable simple basis, the job will probably crash. To verify you’re going to discover an entire reply to virtually every problem, we have obtained a facilitate group which may be all of the time on the internet.
It’s very easy to be aware of to have queries about the practice of acquiring essays using a developing program supplier. Low-priced expert services sometimes have inadequate exceptional effort and hard work, even though it will not continuously have to be the circumstance. In the event you would like over the internet putting up suggestions, make certain you don’t decide cheap certified products and services due to the fact plenty of companies provide options which ended up way too little.
Products cardstock support payforessay is appropriately anything you would love to be altogether zero cost. There is no much less really difficult methodology to receive your entire scholastic papers concluded. Get you a look into document that would carry the numerous rewards aforesaid is most probably the very best summary you could possibly give consideration to make.
In consequence, to purchase essays you ought to click on the ask for now preference over the blog and you’ll be transferred to the site said. You discover the web site you would like! It happens to be uncomplicated to compose articles or blog posts on the web mainly because you just will need to hook up to the very best providers.
To learn more be sure to never be afraid to get hold of our Assistance Expert services. What you will really should use is a web websites through which you can actually essentially fork out for essay online low-priced of incredible excellent. Often you can find some tips about easy methods to give to us each of the running recommendations if you purchase custom-made essays web-based.
Get Essay Web-based Low-priced Profit!
Get the perfect health care essay assistance and report help by our adroit authors who manufacture an outstanding quaint paper at truthful rate to guarantee that max marks! Whenever you suggest us about the various quaint paper valuable information and facts, we’ll begin looking for a enough writer on the subject of your pieces of paper. You may be asking oneself why you really should obtain essay developing course.
You’ll be inside the midst of authoring analysts across the organize of pay for placement, and as soon as you decide to commit in essay and opt for an allotted blogger, objects could get substantially much more fantastic. To usher in a reasonable agenda, a blogger may want to conclusion available an essay each and every day. On top of that, affirm that he is easily reachable which permits it to convey the any second.
Examine on to discover specifically how our essay technique can really help you. In the event that you had been thinking of the ability to order essays web-based, really don’t overlook about that self-sufficient planning is not an uncomplicated, reliable and very exhausting. For anyone who is not several you might be equipped to put together an intriguing essay or maybe you do not have more than enough beyond regular time, one among the many methods to your hassle is frequently to get tailor-made essay.
All you will want to do could possibly be to offer the needs with the essay along with all the subject. Offered that it incorporates a resemblance to an essay, the actual words and phrases matter very nearly not much. The right option to offer with the trouble of a terrific offer of people that like to pick low-cost essays net primarily based as we’ll supply you with some principal-variety and fewer costly essays.
If you should ever have no notion of where exactly exactly you can actually buy essay to the internet low cost, you might be on your finest location. With your essay, you might undoubtedly get a spread of bonuses. You will find diverse options to preserve an eye fixed out for when picking out to expertise an essay or possibly a dissertation in the crafting small-scale home business.
All youthful everyday people want to get particularly substantial marks, but is simply not all them can get ready a wonderful essay. Painless ways to set off a realization inside of an essay will largely rely on the kind of essay you’re concentrating on. Not surprisingly, when you’re formulating your essay in the course of a hurry, you won’t get the greatest products applied, therefore you may perhaps not be capable of notice plus the essay formulating formulae.
All you can expect to require will undoubtedly be to supply the proper requires and make connection with the writer managing your profession if you will need to supply alterations. It happens to be particularly quite easy to spot your spend for. Appropriately, you’ll be aware of all that may be essential.
Essentially probably the most dependable produce why numerous learners decide to spend for essays to the web is deficiency of time. Distressed to monitor medication on top of that to college trying to find any quaint paper subject matter. Very likely you’ve got been getting things at the same time as your grades and choice to a lot more boost your commonly faculty abilities.
All orders put are supplied punctually. Anything you ought to do should preferably be to fill in the ordering variety, do a reimbursement, and in a very few moments, you certainly will get hold of your own personal personal essay helper. You would recognize your spare time.
Our college or university document only producing provider is the superior firm of high quality faculty created paperwork to school learners all over the world. Alongside the Britain Essay Help undergraduates won’t be able to get worried about the instant but relish a complete lifestyle. Furthermore, a examination essay aids learners receive all of the critical resources all alongside one another.
If you happen to achieve university or higher education doc on the net, PayPal is thought to be an example of the many handiest settlement systems. PayPal or Visa to be specific your instalments are safe and sound. The instant you put together your get, you’re going to be furnished with an invoice.
You can find a million choices but simply a number of are skilled. Head off to our services and products are cheap costs. The provider presents nicely-built essays within the specified timeline in a workable overall price level.
It’s seemingly that you should financial investment essay, faculty assignment, working out, document, presentation and other types of academic reports there also the entire piece or part of it. Essays also attempt out your ability to comprehend a subject and however offer the ideal reaction. Essay manufacturing one particular would say it is really a really rather simple function.
A very great start may have to screen your discussion inside the challenge you desire to assessment. Each time you head to our world wide web online site and acquire us to compose my essays, our corporation is better than ecstatic to aid you with that and facilitate within the complete place into apply. For creating the final word amount essay, for you to do best suited look and feel at and contain the products.
The revisions are completely free! It’s to be mentioned that to be able to produce an accurately prepared paper, structure and a few good drafts are definitely required. Before you purchase essays from Ultius, make certain that you carefully review other sample essays we’ve written before.
Your thesis may be the compass in the essay. These methods are also employed by the internet firms to develop wonderful papers. So whenever you have an essay assigned you will require help with, you can get essay online cheap from us.
Our site provides custom writing help and editing help. Sign into a mind-blowingly excellent essay has become the event of workers to restrict the range of theatre district association members help, awesome website and contact info. There’s a good deal of helpful personal reflection essay information online if you go to numerous sites and forums, you will surely figure out how to find at least something.
Normally, students select where to purchase papers by reading essay writing service reviews on the internet. Our site is just one of the most appropriate for essay help. The most frequently encountered paper writing service that the bulk of our customers require is essay writing.
You can trust the very best essay help online. When you commence posting the essay you may get bewildered and will need the assistance of an essay composing provider. Ideally that each and every essay we make could get the job done as on the list of crucial evaluation approach, so you can take advantage of your example essay to comprehend the best method to increase upcoming paperwork.
Experienced and attentive When you seek the services of an expert essay writer at our service, you obtain an opportunity to cooperate with an individual, who has an unbelievable educational background. Your work is to present the ordinary stuff that happens to you in a manner that will produce the reader want to understand you better. After you submit your purchase, we start searching for the ideal writer to finish your assignment based on your requirements.
Deciding upon a situation examine on the internet is the easiest technique to never helpful hints delay inexpensive minocin for rheumatoid and income. Purchasing a predicament analysis on the world wide web is the simplest approach to never delay and hard money. You homework market have to have a great deal of vivacity to traverse it.
Every student, who’s contacting our service, wants to be positive that they will get the finest possible homework help. You’re in a position to discover outstanding professionals private paper who want to serve you with the best solutions. Our highly skilled group of specialists provides the assistance of the peak quality possible.
Therefore, you can trust our experts to aid you in submitting your due homework in time. As you can plainly see, there are scores of reasons why you might require algebra homework help, but, at the close of the day, there is just 1 solution for all your algebra issues, and that’s to get professional algebra tutors assist you with your homework. You may always get cpm homework help assistance if you aren’t able to generate original CPM solutions.
Stop by our internet page anytime you need to acquire predicament examine on the internet additionally to some other scholastic reports. For additional information, you must visit our site and avail our expert services. Our services are extremely affordable in contrast to most of our competitors.
Utilise the aid of our service and don’t be worried about how you finish the school. Use the assistance of true academic experts and get the service you’ve earned! When you elect for our services you’re assured of a supreme superior assignment.
It’s quite easy to use together with self explanatory. With all these kids by their very own learning procedures, it is going to make tutoring more complex. Our chemistry helper https://www.cscc.edu/academics/departments/english/writing-center.shtml is known as 5homework and it’s not a coincidence.
Additional there’s no matter how old you are geometry homework, in addition to algebra homework remains a challenge for all of the students. Only a little portion of students is in a position to carry out their math tasks by themselves. There are lots of students that are too slow to grasp the subject of assignment and aren’t interested in writing assignment can take help in assignment from the assignment expert anytime they are assigned any homework assignment to be complete within a particular time duration.
Teachers often insist that individual assignments ought to be carried out alone and with no assistance, but it’s not an event of preparatory course. If you’re a student, then you recognize precisely how much textbooks can cost when you require study material. The tutors are like Homework helpers who’d support you with any sort of assignment work.
Together with the UK Essay Help undergraduates find it impossible to get worried about the time but delight in a complete life. Experts will finish a buy and transition in an article critique with superior structure plus a perfect analyzation from the very first post. You’re attempting to create some threat, but you wish to make sure it is not overwhelming, that it is a manageable threat, Rock states.
Discover the way your child learns. Virtually nothing is probably going to be less difficult! Help he or she manage his or her time.
Your job as a parent is to strengthen the learning process happening when your child does their homework. There is not anything wrong with that. If you’re fed up with all these assignments or you’ve tried to identify what things to jot down, however you cannot find something, then you don’t need to worry.
So How About Cmp Homework Help?
Failing to deal with them means failing the whole course. Moreover, moreover, it requires a realistic facts movement. Longer sentences will be useful.
All writers working for this service will willingly receive an undertaking and they’re always doing their very best to deliver the ideal paper for the very best price. Experts will finish a buy order and change in an write-up critique with superior construction plus an exemplary analyzation in the very first article. Our service is a huge choice for all those who have to order an assignment urgently.
On our site you could also track down a amazing program of discounts. Your products is equally superb Ofcourse people must convince. A primary most opinion a visitor gets undergoing the operation of the site may be the application port that is internet.
Our informative article authors can help by supplying you with all writing alternatives one to compose the design documents. Heights of education require formats of producing a composition . Absolutely write me my essay totally free unlimited revisions until you’re satisfied.
It truly is an independent endeavor. The work will be manufactured in accordance. MEH isn’t an independent project.
The entrance officer is a smart individual. Consistently look for the help of your personal doctor, or qualified wellness provider with any inquiries you may have about a health state. The easiest approach to present personalized article assistance, to start with, would be to truly talk towards the buyer!
Therefore, you are going to probably be educated and then the academic careers may possibly be online. You also ought to make sure the BHAG is at the very top of your own staff’ minds. With our business you may cause your own life simpler.
InAll area, make the way to discover second concept and also something which you love regarding your sweetheart. As a student, there’ll be priorities set on your thoughts, and you’d like to attain every one of these. While men and women do acculturate’ in the sensation of picking up a dominant culture should they should reside in the exact center of a person for almost just about any duration time that they should do so, of course, therefore as to communicate it will not come about in any of necessity sensible, progressive way.
At case the foundation you’re mentioning has no writer ( in the eventuality of internet pages ), then compose the title instead. In the event of the later, you may possibly get technical and also utilize environmental provisions that are certain. Thus, for starters, you want to fully grasp how exactly to create your messages to the point.
Most people now dismiss answering and reading the essay prompt but http://www.austlii.edu.au/au/journals/UNSWLJ/1998/58.html it really is vitally important. Isolate factors behind this problem you’re addressing to detect this notion of your essay’s objective and the facets behind writing. If your reply is yes, then you definitely just came to the proper spot.
You’re ready to ask queries and we’ll respond at a restricted period of time. Perhaps not getting your newspaper can let you have a excellent offer of issues with also your own exams as well as all the educator. A interactive map of the biggest money laundering episodes on Earth of a number.
Inform our pros what sort of groundwork assistance on the internet you want to get. Designing a online program interfaces sounds an extremely creative and also also yet an endeavor. Start sooner, instead of after!
Writing a decision to get something that has the capability to document informative article on your own money was chose by you, then you fill in the paper form and should upload all the info that is crucial. After you inform us around each the paper information, we’ll get started hunting to get a writer for the newspaper. Reading samples of response newspapers is an additional manner by which it is simple to detect how to compose a reaction paper to documentary.
And that will increase the author’s engagement and also the caliber of the creating. The very best ways to reduce plagiarism would be always to offer references or mentioning these sources. Our writers will supply you with exactly what you desire.
You are able to even search for out the support of numerous essays that are online that happen to be released on several sites. You can know what items to anticipate out of the specific article producing assistance. You may well not just obtain the essay as almost all are executed composition editors and proofreaders 29, nevertheless they also supply service to composing.
You wrote, then we will have the ability to allow you to if you aren’t sure regarding the caliber of this essay. The period paper could possibly be an essay that typically requires research. There are measures which you will need to adhere to in the event that you’re prepared to build a essay.
Now tutoring internet sites that are many supply the essay. The term identifies the individual in direct creation in a supplier and an organization that’s specifically accountable for driving. The business that provides content that was plagiarized may not be reliable. | 2019-04-24T20:23:26Z | http://www.hlubbs.com/ |
You are here: Home / UMC / Why do the Top 100 #UMC’s shun Methodism?
I began to wonder if other successful United Methodist churches had the same practice: not advertising their UMC identity, at least online. And why?
The church in question was a big church–in fact, it is one of the top 100 UMCs. Using 2011’s data, these churches average anywhere from 6700 to 1300 people on a Sunday morning. These are the luminaries, staffed by mega pastors (out of the 100….uh, 98 are men). They are often multi-site with many worship styles. They are mostly from the South, but there’s a good amount of Northern churches (only one Western Jurisdiction church, sadly). These are the cream of the crop and the churches that best utilize the United Methodist way of being to attract newcomers to the faith.
If all the above is true, then my question is: are they shunning their Methodist identity online? Why would they intentionally remove their denominational affiliation from their online presence?
Methodist Branding in the Top 100?
Is the Church using the official Methodist symbol of the Cross and Flame in their logo or website?
Is the Church prominently displaying that they are a United Methodist church (in their logo, in their about page, etc)?
Only 34% of them had the graphic of the Cross and Flame on the front page. A whopping 66% didn’t use the Cross and Flame.
That’s it. No about page, no history, no identification of the clergy as Methodist.
In all, 21 of the top 100 United Methodist Churches do not use Methodist branding for their websites.
#5 White’s Chapel UMC in Central Texas has “UMC” in their URL, but their logo is just letters and there’s no mention of “Methodist” on their front page. They do mention being United Methodist in the first sentence of their About page, which is nice.
#17 Asbury Madison in North Alabama has no Cross and Flame (just three stylized boxes) and only a small mention of Methodist in its about on the front page. “UMC” is in the URL, however.
#48 St. Andrew Plano in North Texas has no Cross and Flame and no Methodist on their front page. They do overtly include Methodist beliefs in their about sections.
#54 Good Shepherd Charlotte in Western North Carolina has no Cross and Flame and no Methodist on their front page. They include reference to “Wesleyan” in their about section, and “UMC” is in the URL.
#82 Lee’s Summit UMC in Missouri has no Methodist branding but their page header includes “United Methodist” in the title. They call themselves “The Summit Church” throughout the website, otherwise.
#85 Bethany Church in Pennsylvania has no Methodist branding but their URL includes “UM” in it and their about has “Methodist” in it. Otherwise they call themselves “Bethany Church” throughout the website.
# 11 Glide Memorial UMC in Cal-Nevada has no mention of UMC, no Cross and Flame, and very little Methodist references in their website other than the pastors’ bios and their history.
#18 Jacksonville Beach in Florida. Methodist only shows up four times on their website.
# 21 Van Dyke UMC in Florida. Methodist only shows up five times on their website, each time reporting on external groups.
#32 MorningStar Church in Missouri has no Methodist anywhere in about or intros other than the pastor’s bios.
#38 La Croix Church in Missouri has no Cross and Flame and no Methodist anywhere other than their history.
#43 Covenant UMC in North Carolina has no Methodist anywhere at all.
#57 Crossroads Concord in Western North Carolina has no Methodist anywhere other than the history.
#64 Gateway Community Church in Texas has no Methodist ANYWHERE at all on their website to reference their own church. No. Where.
#78 Covenant Glen UMC in Texas has no Methodist branding at all and mentions it only in their beliefs and their pastor bios.
Your Turn: Marketing or Theology?
I wonder about the reasons for this lack of Methodist branding.
It could be marketing. Click through the linked websites above and you’ll see the fancy header graphics and some nice logos for their churches that they decided the UMC images didn’t fit into. To compete in a world increasingly hostile to organized religion, perhaps eschewing official involvement (at least online) is helpful to their local evangelism. And let’s face it: just saying “a cross and a flame” evokes more images of 1960s KKK rallies than hearts strangely warmed in Methodist pews. Maybe it is okay that the denominational image is falling out of style and we need new branding in 2016.
It could be theology. Are these churches out-of-sync with the greater denomination? On one hand, some see themselves as staunchly Methodist. At least two of the pastors of the churches mentioned above are so-called champions of United Methodist values as signatories to the FaithfulUMC petition–and yet they don’t champion United Methodism in their branding on their own local church. On the other hand, at least two United Methodist churches in my town have recently removed United Methodist branding from their Facebook pages. The pastor explained to me that it was intentional because the UMC’s stance on homosexuality was a turn-off for visitors and they needed to know that the Reconciling churches were not like the rest of Methodism.
As you know, this blog celebrates our connectional nature. While I’m certain that in person the Methodist presence oozes out, online is my realm of interest and it seems these churches have abdicated a Methodist identity that could do a great deal to remind the world that we aren’t all about debates about homosexuality and being the church of Bush and Clinton.
If these are our Top 100 churches, why aren’t they choosing to be more Methodist online?
So what are your thoughts? Why would churches not reflect United Methodist branding and identity online? And is that okay that our denominational staples of the Cross and Flame–and even the name “United Methodist–are not getting the traction they used to have?
Discuss. Thanks for your comments.
UPDATE: Followup to this post here where we discuss why UMs would want to disaffiliate themselves from the mothership.
I think most mega-churches are trying to get away from denominational labeling. I’ve seen several First Baptist Churches becomes First Family or First Community Church and the same with other denominations. Their assumptions is that the denominational name brings a lot of baggage. While I certainly think that if you are a UM church connected with an annual conference that you should at least call yourself United Methodist, the more disturbing trend is that this mega-churches are moving away from other UMC staples like itinerancy and trying to reconfigure connectionalism to their benefit. In my own AC, some of the larger churches have tried to change to direct billing of clergy healthcare and pension and change the way at-large lay delegates are distributed among churches, two moves that would greatly benefit them and greatly damage small and medium sized churches. My opinion is that you can’t have your cake and eat it too, if a larger church is going to benefit from the UM pension, health insurance, etc then it should also call itself a United Methodist church.
Brad – in the LA Conference, which doesn’t contain very many large churches, we have direct billing of healthcare and pension. The pensions are slightly subsidized through apportionments, but the majority of it is direct billed. The healthcare is not subsidized at all (unless you count the reserve fund which is sometimes used). I don’t see this as a big vs little church issue, but as a fairness issue.
On your other point, I agree that if any church is UM, they should call themselves a UM church in some way.
I think this is all about marketing. I see a prominent church in or near me that has lowered the UM in its name to between the other names of the church. I am fine with that. I don’t think it makes any difference. I believe the church I refer to is following the tenants of the UM church.
Can we get UMCom or GBOD to release a more layered cross & flame? I don’t use it that often because it is a flat digital logo circa 1970’s/80’s.
Agreed. Cross and flame logo is out of date. We have our own — although we’re also proudly known as the “Mother Church” of Georgia Methodism (we have a rock in our courtyard that says so).
Actually, GCFA are the keepers of the flame, as it were. At least legally. Not sure whose decision it would have to be to redesign.
Our church just did a redesign of our logo. During the process it came up that the BOD clearly says that churches are permitted free use of the logo however are also prohibited from making any changes to it. So technically we could get in trouble with GCFA. However most churches and even conferences that do use the cross and flame these days are doing altered versions of it.
Perhaps that weighed in but I suppose it has more to do with the fact that the average person that we are trying to reach with a message about Jesus doesn’t much care that we are United Methodist.
Very solid discussion, and important, too. Everyone knows that institutional “brand” loyalty has been way down for two generations. In the supposedly glorious days, kids who grew up Methodist would move to a new town after college and immediately find the Methodist church. Almost no one does that anymore. And in the unlikely case that someone raised UM has an inkling to return to church years later after having 2.3 kids and settling down in the suburbs, there’s a lot of competition. I suspect that the First Baptists, Grace Lutherans, Wesley Memorial United Methodists, etc. all start to look alike: barely surviving in their inner ring suburbs of the 1960s. The exurbanites see a whole host of Jesus barns with names like Living Waters, The Rock, The Vine, Community of Joy, etc. The unaffiliated evangelicals started this trend, but the mainline caught on. To me, the problem is that it conceals the difference between mainline and evangelical churches. I know, basically, the difference between “First Southern Baptist Church” and “First United Methodist Church” in any town. But I don’t know the difference between The Rock Church and The Vine Church.
So my concern is that our biggest and most “successful” churches are, right from the start, blurring the distinctions between us and the fundamentalists. On the other hand, I suspect a number of clergy and laity in these churches are aware of and active in the UMC connection.
I don’t think it is a theology thing because neither glide nor granger use methodist references.
My guess is that it is a marketing thing. Glide has a great logo. It clearly represents who they are. Granger’s logo is too generic for my tastes. Windsor Village in Houston has a good logo, no cross and flames. It is probably also an 80s thing. That’s when a lot of churches went through the “marketing” phase.
Personally I am with Gavin. I like the cross and flame. It identifies, but I wish they would update it. Graphic design has changed since the 70s and 80s. When looking at reworking our site, none of the cross and flames were scalable, transparent backgrounds, or adjustable. Churches like a certain degree of control over their logos.
I think it is mainly a marketing thing, and it gives a chance to define “United Methodist” in person through relationships instead of through perceived past experiences. I also hope that we connect people to Christ first, then lead them in the “United Methodist” way of following Jesus. On my most cynical days I worry there is more commitment to UM traditions/structures/bureaucracy than to Christ and God’s mission. That’s quite a negative judgment on my part, so take that more as sensationalism than honest truth.
Another thing I think about is that Pre-Protestant and pre-east/west splits, it was just church, no denominational label. So, overall, I don’t think it’s a bad thing. It’s simply a church being church in its context.
“I think it is mainly a marketing thing, and it gives a chance to define “United Methodist” in person through relationships instead of through perceived past experiences” = BOOM. Well said.
I’d say its a marketing thing as well. I recall in the late 90s/early 00s there was some church marketing consultancy that was sweeping through my home town in Indiana offering some ‘free consultations’ on how to better market your church. It was all about dropping denominational references and even other explicitly ‘religious’ references. My home church was advised to drop the word ‘chapel’ from their name as well, being told that it evoked a ‘small church mentality’ that would not attract new worshippers.
The logo is SO 1960’s. It’s recognizable to UM’s, but not so much to the secular culture. For fun, take a look at a few corporate logos from 1968 and today. Imagine McDonalds today with its 1960-68 logo: http://logos.wikia.com/wiki/McDonald's.
The phrase “United Methodist” is six syllables (“United” referring to the 1968 merger, and “Methodist” needing a lesson in 18th Century English campus religious clubs to explain. That’s really quite a bit of baggage to offer in the church name … but I’m convinced that it’s important to include it on the frontpage and available to search keys — people move to town and look for UMC’s.
People who aren’t UM don’t need polysyllabic historical mysteries in the masthead. But both the name and the logo — more current versions would be welcome! — should be on the frontpage, and (imho) on each page.
“United” came to the EUB by way of another merger between the Church of the UNITED Brethren in Christ and the Evangelical Church in 1946. The CUBC name came about in 1800.
Shun? Really? I happened to be the Lead Pastor of one of these 100 churches and this language is way too strong. I cannot speak for all the large church pastors, but I personally know many of them and they are rabidly committed to the UMC as a whole. Their churches host conferences, write books and curriculum, mentor pastors and churches and serve in the Annual, Jurisdictional and General Church. So, we leave off the logo or drop the “United Methodist” from our name. We did it because it shortened our name. That’s it. We have a thirty foot cross and flame in our Sanctuary! Let me also remind you that without the growth of many of these local churches, the UMC would be in worse shape than she already is. Plus let’s not even talk about the amount of apportionment a these 100 churches pay.
Jorge, thank you for your comment. While the title is provocative (as longtime readers expect on this blog) the focus of this conversation is on online presence, not the rest of your substantial contributions to United Methodism. As more and more people find us online, what role does UM branding play in online strategies? What led to your decision?
Jeremy, I don’t think you can separate “online presence” from the rest of a large churches contribution to the church as a whole when you are talking about them shunning the UMC. But let me respond at a deeper level. As you probably saw, we make no bones about the fact that Grace Church is a multi-site United Methodist congregation. But I agree with many that most unchurched, once-churched and over-churched people are not denominationally loyal. Our bent is towards them first. Branding as a UMC is secondary to helping connect people to Jesus Christ and helping them grow in their discipleship. Also, I think we have to distinguish between being a loyal United Methodist (whatever that means) and teaching people to walk in the Wesleyan way of discipleship. Frankly, I care little about the first but I’ll give me best efforts to the second.
I think that’s fair, Jorge, and thank you for further engagement in this conversation.
My comment is that if your parishioners are like mine, they are more mobile than they have been in the past and move around more often. I don’t know about Florida but in Portland, Oregon, about half of my transfers of memberships are from fellow UMCs who move to a new place and look up “where the Methodists are?” It used to be that you could visit a UMC in one town and then another a few states away and you would know you would get the same type of message. The denominational branding assisted back then, and it surely would have even more of an impact now.
The driving question of that paragraph perhaps is this: in a more mobile society, is it better for churches to stick it out alone and market to their communities? Or is it better to retain more uniform branding so that folks can more easily retain their UM affiliations when they move?
Jeremy: I think dyed-in-the-wool United Methodists will find a UMC to worship and serve at. Reaching transfers is not the mission of the church. Reaching lost, disconnected people with vulgar grace is. I think being clear about our mission, vision, values and strategy says more about individual UMC’s than a brand or logo.
Reaching transfers isn’t the mission of the church, no. Making disciples is. And the reality is that mobility and internet savvy impacts our church decisions of how to make disciples.
My perspective is this: Fewer of our parishioners will be our lifelong disciples-they are more mobile and will become someone else’s disciples. More than ever we are indebted to other UMCs for sending and receiving those laity and planting them in new places or receiving them in ours to assist in reaching new people. If a church’s website is unrecognizable to UMs, then how do we facilitate a lifetime of discipleship when they may not come to a church that doesn’t “look” Methodist online?
I’m certain we are coming at this topic of branding from two different angles (evangelically versus discipling, though they are 95% alike). I just want Grace’s successes to reverberate throughout Methodism’s online venue of the Gospel as clearly as it does offline too.
Good discussion, Jeremy. A deeper problem is that the UM brand means little or nothing today. Apart from the fact that there is low “brand recognition” among unchurched people, there is no longer brand uniformity among UM congregations. When I move to another community and attend another UM church, chances are it will be different in theology and worship experience from the UM church I moved from. Just having the UM label doesn’t mean that potential worshipers can count on what type of experience they will have when they walk in the door.
I think it’s very simple: what does having “UMC” or “Methodist” mean to an unchurched person? They have no idea. That’s something you don’t want them to Google. You want them to get a personal understanding of how we live out our theology. For instance, our church (First UMC of Sikeston) has a large contingency of former Baptists. It was only through personal relationship and experience that those theological differences were reconciled. Without local church success, connectionalism is meaningless. What’s best locally IS best across the connection, if it furthers the kingdom.
Great discussion. I remember when I attended the New Church Leadership Institute put on by the the SC Jurisdiction, a “church marketing guru” questioned why some churches decided to drop “United Methodist” from their name b/c the term consistently “tests well” in surveys. His point being that churches have nothing to gain by joining the increasingly majority “herd” of having no denominational affiliation in their church name, and that “positive correlation” to gain by including it. I’m sorry I can’t remember the surveys he spoke of, but perhaps someone else does. We kinda do the opposite of what some here have mentioned–intentionally include our UM affiliation via the cross and the name on our website, and then refer to the church as “University Church” while people are at worship, etc. b/c it rolls easier off the tongue. I think people know where they are after walking into a building with a big cross and flame on a 7 story tower.
I never closed the car screeching noises either 🙂 oops.
I suspect it’s a misguided marketing perception in many cases. But it’s not only churches.
You and I are both acquainted with a United Methodist university that doesn’t feature the symbol in any prominent physical location on campus (and indeed has the word “Methodist” in very few places visible externally on campus; one of them because it’s a dorm name). The cross and flame is visible in a small button at the bottom of the first website page connecting to the church relations and religious life office; the connection to the church and a link show up on the “About” page. Southern Methodist University refers to itself by its full name with the word “Methodist” only once at the bottom of its front page and mentions the church only in connection with its founding on its “About” page.
Some churches have probably made this as a decision something like Jorge notes; denominational branding is secondary for many non-religious folks and so many churches choose to emphasize it less in reaching out to them. Some, though, probably omit the symbol and the word because they feel it constrains them into roles they do not wish to have or to be perceived that they have — which is also, I think, at the root of some of our schools and universities’ choices to reduce their overt connections to the connection.
Crosses and flames? Say those two words together: crosses and flames.
While those who are “Anglo insiders” know the UM logo as the intersection of the work of Christ and the ministry of the Holy Spirit, the two terms and images converge into a very different meaning for our African-American friends. And as one of the churches on “the list” going unapologetically “full color” in our demographic makeup, we have opted for a logo with a very different feel and with no cultural or racial baggage.
Some black Americans choose to not use the Cross and Flame b/c it’s too close to a Flaming Cross which was used for generations to intimidate and strike fear in the hearts of the black community.
That might be Glide’s rationale – perhaps.
I would just like to point out that other denominations within the Methodist family tree use some variation of the cross and the flame as does the Presbyterian Church with a flame on each side of the cross and a descending dove on top of the cross.
Soo are we proclaiming Christ or Methodism? What’s the point of the article?
It is human nature to organize around a value. To worship Christ in an organized way with other folks is perfectly human way to be in relationships.
Whether a UM congregation has the words “United Methodist” or a cross and flame logo on their sign or web site is really immaterial. What matters is if and how they form people as disciples of Jesus Christ. Do they have an organizational culture that expects, enables, and supports growth in holiness of heart and life (small groups that are centered in Jesus Christ and discipleship, developing disciples who disciple others, teaching and practicing the means of grace)? Are members equipped to live the Baptismal Covenant and serve with Christ and his mission in the world? Is the Lord’s Supper integral to worship and Christian formation? Are members conversant with the General Rules? Do leaders, lay and clergy, have faith in Christ? Are they going onto perfection in love? These expectations and practices are far more important than whether the congregation uses United Methodist or the cross and flame on its web site.
I find in my work at GBOD that the vast majority of UM congregations are Methodist in name only. The laity are not aware of the richness of the Wesleyan tradition. I have also found that most lay men and women who learn about the Wesleyan way of Christian formation, discipleship and mission get very excited and enthusiastic about being Christians in this tradition.
It’s entirely possible that certain congregations which don’t overtly identify themselves as United Methodists may actually show more fidelity to riches of the Wesleyan tradition than congregations which readily identify as UM and use the cross/flame logo. Some of the congregations you mentioned are well-known to practice incarnational solidarity with the poor, marginalized, and dispossessed of Empire (a commitment of John Wesley’s), while there are certain mega-UM churches here in the greater Dallas area—fully emblazoned with the UM logo—which, as far as I can see, are doing little more than reproducing the middle- to upper-middle class white-privileged status quo.
What I find disturbing about this blog post, along with the set of responses, is that there seems to be more hand-wringing over whether or not congregations overtly use the UM logo than over another fact the blog revealed here, namely, that out of the 100 mega-pastors, only two are women. Only two!??? And no one finds this noteworthy, or something to get upset about? What the church “normalizes” and ceases to notice—and what it does notice, and gets upset about—is very revealing. I’m deeply disappointed that no one seemed to notice or get concerned about this statistic—for it’s a symptom of a much larger societal problem. According to scripture it’s entirely possible to tolerate a big log in one’s own eye, and get worked into a froth about specks out in the environment. Yes, it’s important that at some point congregants be helped to understand the significance of the denomination to which they’re connected. But, to my mind, the ongoing subordination of ordained women in the church (a White House report shows that women comprise no more than 15 to 20% of upper level leadership in 9 major professions) is of far great significance and concern. Has anybody gone to the trouble of doing a statistical analysis, and doing a careful assessment of percentages of women (and people of color) in roles such as senior minister of medium to larger congregations, Bishop, and so on? Let’s pay attention to that.
“subordination of ordained women in the church”?????
Only 20% of the elders in full connection are female. Yet, more than 20% of the bishops are female. More than 20% of the district superintendents are female. So, where is the subordination????
I’m not trying to say that we have defeated sexism or racism for that matter. But, let’s look at the realities instead of trying to find talking points.
Which leads me to the question about the top 100 churches or even all of those with more than 1,000 members. The study that was done (by GBHEM?) neglected to look at the question of how many of those churches still had their founding pastor? It is one thing to talk about mature (but hopefully still growing) churches and how appointments are distributed. It is another to suggest that successful church planters should be moved to “prove” that we believe in itineracy or to give everyone a chance. While that may benefit a “fortunate few” it would be very damaging to the church as a whole.
On your list, #69, Christ Church. If you open their site on a new tab, the tab comes up as “Christ United Methodist Church”. Then if you scroll about half down on their homepage, there is a cross and flame.
I truly believe that the approach is theological. Marketing is part of it, but likely secondary. We’re committed to Jesus, first. Not denominational affiliation. This has always been the case. I’m reminded of CS Lewis’ image of a house with many rooms representing our different preferences, denominations, etc. When we say the room we’re in comes first, we minimize the whole house. When we start with the house (Jesus and His Kingdom), we can then help people find a room to belong in. Frankly, I just don’t understand why this seems like such a big deal. The way it seems to be interpreted is that these churches don’t love their UM connection. This isn’t usually the case at all. Not shouting it on their website is not shunning Methodism, it is promoting Jesus as the most important thing.
It could be like you say, but the purpose of this post was to do exactly what you didn’t do: go beyond a cursory inspection. We looked at 100 church websites and reported above what we found. While your anecodotal evidence is helpful to the conversation, the data supports a different conclusion.
Being one of the churches listed … our main goal is to reach the unchurched. Not the churched, not the folks that have church homes, not United Methodists transfers (though we will gladly take them as well!) … And so we don’t want anything to serve as a barrier to enter our doors.
We do not shun the denomination by any means, and we actually talk extensively about our denomination in person. However, we do not show the UM logo because we do not want someone to not enter our doors simply because they would feel like they don’t belong. Because they don’t know what the beliefs are of UM, because … of what ever other reason.
So again … it’s about our mission. Reaching out to the unchurched. We are very grateful and blessed by the support of UM. Hope this sheds some light.
You know, I think it’s a problem. I have ‘liked’ a few of these churches on Facebook. I have read their Pastors books and kept up with them. I remember once, one of those mega church Pastors wrote a piece of homosexuality in the church. It, naturally, sparked quite a discussion. Among those, though, was a discussion among MEMBERS of the church, some of them claiming to have been members for YEARS, asking the Pastor if “he allowed gay weddings in the church”. They had never seen it done, but they had no idea. I waited for a response from him and never saw it.
His piece was a beautifully written piece in support of homosexuality. But it would seem his church, a large, United Methodist Church, had no idea that there was a prohibition on gay marriage. Furthermore, none of them asked “Does the United Methodist Church prohibit gay marriage”, they just asked if his church banned it. As far as they understand, they are a congregational church!
I think they are trying to reach the “I’m spiritual, not religious” group, the group that rejects “organized religion”. Not only are they lying to these people, though, they are also presenting pretty false pretenses. Do people not realize there are committees and organizations that run those churches? Dozens of paid staff persons? More staff than their conference and district offices perhaps? Most of these mega church Pastors get elected to General Conference. Is their seeker-friendly congregation aware that their Pastor has been asked to be a part of the decision making body in the United Methodist Church? Do they even KNOW there is such a body?
I can go a little easy on them. There are folks in my congregation who don’t know much about Methodism, even though I just got done with a sermon series on such. But I’ve always been uncomfortable with the way large churches hide methodism.
I’m a 23 year old “millennial” serving under appointment and have since I was 19 years old. I was a southern baptist until I felt my call to ministry. I wrestled with my own theology and knew it couldn’t be in the church I grew up in. Methodism was relevant. The quadrillateral, the organizational structure, even General Conference- it all made sense. Rather than telling me to be afraid and submit, it told me to learn and grow. I grew up having the answer to everything at my fingerprints. I was the ‘geek’ who was building computers in elementary school and my family was the first on our block to have internet. I’m used to finding answers and learning. For 200 years, seeking answers to questions about the Bible has been the message of Methodism. Growing in holiness, becoming a better person, and becoming closer to God is what it’s all about. If we are trying to reach *me* and my generation, like folks keep telling me, then why aren’t we playing on our strengths? Why are we hiding our identity that resonates with so many people?
I feel disappointed every time I see “HIP COMMUNITY CHURCH” (a united Methodist congregation). Why are they embarrassed to be a part of the church that I love? Why aren’t they embracing the tradition that people want and need? Why aren’t these large churches overflowing sources of future United Methodist clergy and leadership?
Our LARGEST is the United Methodist Church of the Resurrection. While at times it embodies some of those same issues, I have more than once heard Rev. Hamilton preach about Methodism. He is not ashamed to be a United Methodist! He refers to COR AS “The United Methodist Church of the Resurrection”, he lets his congregation know about his role in the UMC and in fact, if you visit their website, not only will you find a prominently displayed Cross and Flame (as you will in the building), you’ll find that one of their missions is to renew and revitalize the mainline church and the UMC. So if our LARGEST church can be comfortable in it’s denominational skin, and make big impacts in the world; then why on earth can’t all of our churches? Why are we embarrassed by our denomination?
I for one am not. I can’t wait to tell people about my United Methodist church or the fact that I serve as a United Methodist Pastor. Sometimes they’ll say “But, isn’t that the church that believes…” and I cannot WAIT to help them better understand our complex, multi-dimensional beliefs. It’s amazing how many people not only resonate with it, but find it so refreshing that denomination doesn’t have a simplistic, basic answer for everything!
Well, that’s the end of my tirade here! I hope and pray that our UM churches would embrace their identity. We are the church that people need. If we don’t believe that, what are we doing here?
Working full time in Youth Ministry with the UMC, I believe that it’s completely about marketing. Before I came on full time, I was working 3/4 time in a national big-box hardware store. And the part that blew my mind and perspective was upon being asked what church I served the youth at and telling them First UMC, more than a half dozen millennials responded with, “Methodist? Wait. I thought you were a Christian?” I was shocked that they didn’t understand the relationship.
I wish that we didn’t have to run around the tradition of the UMC, but most of my generation don’t want to join something for its organizational tradition. They simply want to know more about Jesus Christ.
I go to Glide Memorial. No, we don’t have the cross and flame. No, we don’t have “United Methodist” prominent on our website.
You know what we DO do? Serve 3000 hot meals a day to homeless in San Francisco’s poorest neighborhood. Provide free health services. Operate low income housing in a clean and dignified environment. Help women escape abusive relationships, and men overcome violence. Substance abuse recovery services….. the list goes on and on.
So, you know….. if your priority is on marketing rather than following the example of Christ, I’m good choosing my church over the UMC if anyone feels the need to push the issue. Give me a church that follows Jesus’ teachings in actions over words over one that has website designs with the logos you prefer.
I came back to church after 30 years away, and I could only do that at Glide…. the only church that respects my dignity, even here in the San Francisco Bay Area. It astonishes me that your priorities are on brand identity over Christ’s teachings. But I know which I find important, and if the UMC has a problem with it….. I’ll stick with those who feed the hungry, house the homeless, and clothe the naked over those who adhere to a Pharacitic bureaucracy.
Amen Christa! Blessings to you and the many Jesus-like ministries at Glide!
I have been a United Methodist pastor for 42 years. I have represented my Conference at three General Conferences and four Jurisdictional Conferences.
The “United Methodist” name has become a serious hindrance to church growth. It is my biggest obstacle to overcome in order to get prospects to consider coming to my church. That is because of the liberal progressive theology of the leadership of this denomination. Liberalism, and the failure of our bishops to uphold the Scripture or enforce the Discipline is fast killing this denomination. I weep over that.
Sorry for the four-year delay…just read this blog. I am UM today because of Wesleyan Theology—not the dysfunctional systems within the UMC and its boards and agencies which do very little if anything to help the local church accomplish its mission of reaching unchurched persons and making fully devoted followers of Jesus Christ. When Wesley first wrote “The Character of a Methodist” he called the document, “The Character of A Christian”. When the Book of Discipline was first written it was called, “The Book of Doctrine and Discipline”. It was 3/4 doctrine and 1/4 polity. It is now 3/4 polity and 1/4 doctrine. Our problem in the UMC is not our marketing…it is our Christology. Yes, Wesley died an Anglican–but he was first a citizen of Heaven and a practitioner in the Kingdom of God. This is what it means to be Methodist! | 2019-04-24T08:04:47Z | http://hackingchristianity.net/2013/07/why-do-the-top-100-umcs-shun-methodism.html |
Lijiang city is located in Southwestern China’s Yunnan Province. It has been included in the UNESCO World Heritage List for its ancient city layout and its unique charming landscape of water and houses. However, since 2004, the source of the river that runs through Lijiang city suffered seasonal draught for three years in a row. A battle to protect the soul of Lijiang – the city’s groundwater resources began. A total of 43 primary level government officials challenged enterprises and individuals at every level of the society.
About the fate of stray dogs on the street says the joint project of directors Diana Kostova and Ivo Todorov - "A Dog's Heart". The documentary was filmed in Sofia and the largest homeless shelter dogs - in Bogrov. During filming, the directors learned that among the homeless dogs often defined as "first friend of man" has brutalized: beaten with shovels and hammers, with cutting ears and tails, deliberately hit by cars. And the only way for these dogs or shelter or the home of compassionate people. "A Dog's Heart" is a true story why people have adopted a stray dog, what gives them communicating with them and how you can love them. Another important topic that affects authors, is castration - the only solution to uncontrolled population on the one hand and on the other - as the prevention of dangerous diseases, especially in female dogs. The directors also have dogs in their homes, as adopted by Ivo Todorov Tara is taken from the street when she was a little dog for 40 days.
Shenmu is famous for been called “Number one coal-producing county in China”. The flourishing coal industry has also brought serious environmental problems such as water pollution, ground collapse etc.Tens of thousands of rural migrant workers travel from all over the country to work here as miners.They have been not only facing the risk of occupational disease such as pneumoconiosis, but also sometimes can lose their lives.
Follow the story of a tiny, just 2mm-in-size invader on it's rise to power – the Argentine Ant in Southern Europe. Undiscovered from most eyes this invasive species has formed the largest supercolony on the planet - a super-aggressive family with the potential to change a whole ecosystem, scientists believe. In a warlike world beneath our feet they ravage our local ants lifes. They colonise the food. They penetrate their enemies homes and kill their queens. They appear in giant numbers to reach an unbelievably strong fighting force. Scientists try to uncover the strategies of the argentine ants to find ways to protect the ecosystem from more damage. „Ant wars“ is the story of a 6000 kilometer-in-size colony of ants who became the biggest predator on earth.
A film of the CEE Bankwatch Network and Za Zemiata – Friends of the Earth Bulgaria. This is a story about the findings of an international mission that investigates the petrol companies in the delta of Niger River in September 2011. The investigation results – oil spills in one of the most precious ecosystems on the planet, thousands of square kilometers dead jungle, flaring gas around the petrol wells and millions of deprived people. “Bleeding Oil” is a provocation to all the Europeans. The film shows us how strong the global connection between people is. It also reveals what actually stays behind the mantra for the European energy security. We are the consumers, others stand at producers’ way, but all of us are slaves of one corporative reality which takes advantage of both people and nature.
The movie presents activities of WWF Bulgaria and WWF Romania connected with the wetlands restoration and conservation of two endangered species: Ferruginous Duck and Pygmy Cormorant.
The approximate energy stability of Bulgaria has been built for over six decades. Millions of tons of coals merge into thermal power plants. The country shines, basks and prospers economically. The East(Maritsa) basin is thе face of the Bulgarian mining. Data seems proud and prestigious. Behind them stand ordinary human fates. Or, to be exact-beneath them. There are houses, thousands of acres of fertile lands, rivers. In the name of energetics these mines have devoured a few villages. Others are going to bedevoured.
The film introduces the viewer to one of the least known and beautiful ecosystems in the world, located in the center ofBrazil. The film is an impressionistic dance of color and light, unraveling like a creation myth through the primal elements of Water, Fire, Lightning and Rain, all the while celebrating the amazing and strange animals that occupy its landscape. The film introduces a new genre of documentary filmmaking, trusting the powerful beauty and mystery of the place to dictate the mood through a unique artistic vision with pulsating and evocative original music. Emas National Park is home to some of the worlds most amazing animals such as the Giant Armadillo, the Giant Anteater and the Maned Wolf, and to some breathtaking phenomena which occur here, like bioluminescent termite mounds and massive webs with thousands of community spiders. The film is an overwhelming explosion oflife, color and mystery reenacting a primordial worship of nature as an eternal work of art.
Situated in the Inner Mongolia Autonomous Region, North China, Wuliangsu Lake is one of the eight largest freshwater lakes in China. Covering the area of 300 squares kilometers, it is a rare big lake in this desolate and drought-stricken grassland. As the biggest wetlands at this latitude on the planet, Wuliagnsu Lake has been included in the catalogue of “Wetlands of International Importance”. The unique geographical situation has made this lake a paradise for swans. In summer, these beautiful creatures breed here. The lake is energized as baby swans emerge from their shells.
A film about Chios island – a unique place connected also with the Bulgarian history.
The four lovable and sweet main characters of Creamen capture our hearts as they gradually have to confront an unexpected challenge to their very existence.
Dumped and forgotten - for more than 50 years European countries dumped their atomic waste into the sea. It was declared as a safe method of disposal. Hundredthousands of tons of this radioactive waste have been dumped in front of Europe's coasts. What did happen with this atomic waste that has been dumped for example into the British Channel? Did radioactivity really dilute and disperse over the years or does it threaten fish? And what does it mean for the customers? A German film crew of public tv ARD followed the tracks of those radioactive barrels. They found atomic waste some kilometers north of Alderney. This radioactive waste has been dumped between 1950 and 1963 by Great Britain and Belgium. The crew filmed with a little submarine a few miles away from the French coast atomic waste barrels in a depth of 124 metres. Officially these barrels should have been rotten. But the pictures show an unbroken barrel. This is the proof: it is possible to salvage nuclear waste out of the British Channel. The journalists also discovered tubes, in which atomic waste is going to be disposed into the sea until today - although it is forbidden to dump nuclear waste offshore.
Century-old trees in Bulgaria have a remarkable memory. They are powerful ecosystems, but that is not all. They not only replenish the Earth with oxygen, but also whisper tales and legends from past times. Some remember epic battles. Others tell dramatic stories of nuns unhappily in love. The oldest ones have engraved in their memory the moments when the proto-Bulgarian horsemen stopped to rest under the shade of their branches. Almost all of them are related to a saint, monastery or healing spring. Near some of them Venerable Stoyna and Vanga have uttered their prophecies. The tales of our century-old trees speak silently to those who believe in their powerful energy.
Never before have so many skyscrapers been planned or under construction all over the world at once. Now a new generation of ultra-modern skyscrapers has been designed to help revive city centers, spare the climate and check urban sprawl. Building "Green” has now become an economic necessity, most especially in Asia’s burgeoning megalopolises. The key question here is whether it is possible to build a high-rise that is both green and efficient. The first certified sustainable office high-rise is currently going up in Panama City. From Vertical Farming in New York City to the "Garden City” of Singapore, environmental skyscrapers are swiftly becoming one of today’s key technologies.
Almost every country sets great store by galleries and venues for cultural events. They are important competitive factors in the international tourism market. Their architecture is meant to be attra ctive and imaginative, and sustainability is becoming increasingly important as well. This report presents innovative building projects from three countries: Saudi Arabia is renovating an old national library building to make it more ecological; China will use seawater to cool a new opera house; and a new museum and community center in the Spanish city of Seville is the world’s largest wooden structure.
More and more architects around the world are designing hotels that meet the demand for sustainable tourism. More and more travelers are considering environmental friendliness when they book hotel rooms or lodgings - sometimes this is even the mo st important aspect. These changes in attitudes are undeniable, and the travel industry is responding. But what does the industry understand by "sustainable”? In this part of our series, architects present their visions for the Swiss Alps, the Indonesian island of Bali and the eastern African nation of Rwanda.
The documentaryshows the global struggle for future food markets. Where will we grow our food in future? In the countryside, on the flat roofs of industrial buildings, in communal city gardens or in gigant ic industrial zones just outside the city, where greenhouses will stand next to mass animal husbandry stalls? And what consequences will this have for rural areas and for the slums of cities? The film takes place in Berlin, Amsterdam, Basel and in the Indian megacities of Bangalore and Chennai. As we follow the trace of tomorrow’s food supply, we encounter idealists, visionaries, controversial figures and coolheaded businessmen. The film centres on the confrontation between fundamentally different philosophies: should food production follow the masses into the cities? Should our meat consumption continue on its seemingly unending rise? Or should we change the way we eat and give renewed strength to rural economic circuits? Or is it already much too late for that?
A man traveled for two years in a small jolly boat the Atlantic. One night a severer storm draws on, he suffers shipwreck. The raging sea takes away his last belongings. The stranded boat stays disabled to manoeuver. He needs help. The storm moves on, but it remains in Daniel, who is forced to deal with himself and the reasons for his journey. The time didn’t heal wounds. Experiences and the fate of his disease are troubling his mind. Can his dead be a redemption? A film about the love to the sea and the beginning of a confrontation with death.
Puyuan Village is situated in the cradle of the mountains of Fuijian Province in Southeast of China. Ancient bridges, rivers and houses intersperse the valleys. In the Puyuan Village stands a 1, 3000-year-old tree and an eight-century old ancestral temple. The villagers’ family trees have been enshrined in the temple for over two hundred years and those who are over 100 years old still participate in big issues in this small community. In this favored place that boasts rich water resources, residents and carp live harmoniously. When a fish dies, the villagers host a solemn traditional funeral for the deceased soul.
Situated in the center of Euroasia, the Tarim Basin forms a yellow eye of land. There lies the Taklimakan, the most fluid desert in the world where only poplars of all tall trees survive. Over 60 percent of the poplars on this planet stand on the banks of the Tarim River. In spite of the summer heat, lack of water, the wind and sand… the poplars struggle against the tyranny of nature and stubbornly stand alone. The trees have also established an interdependent relationship with other desert creatures. They bear witness to the power of each others lives.
What will be the impact of climate change for coastal populations? How to reduce its harmful effects on people and their lifestyle? In March 2013 the Greenpeace's icebreaker Arctic Sunrise arrived in Varna, Bulgaria as part of its European tour in support of sustainable fishing. We have talked with them,with Bulgaria's Fishing Agency official and with a marine biologist about oceans, dolphins, pollution, fishing, pirates and seafaring. A production ofBulgaria ON AIR TV and Cherno More TV.
"Gentle Slopes" is a wildlife short documentary filmed at Penha Garcia, Portugal. Through mountains and plains, somewhere in Portugal, it is an amazing journey to the world of fascinating wild animals.
The programme team is actively involved in the international initiative to transform parking spaces into mini-parks or spaces for recreation for a day. The reporters’ car is substituted by bikes for shooting the event. The final result is the first TV programme in Bulgaria shot with zero harmful emissions.
The film tells about the Bulgarian lion Kaliman that became the pride of the zoo in Sarajevo.
This edition of the programme takes the form of a message by the authors on the occasion of Earth Day, 22 April.
Green patrol in action consist of highly mobile group of students. In this episode we show illegal tree cutting in Gunaros in Serbia.
The plot and a description of the film “ghatre-ghatre”- Gutty: A child tries to save water and protect environment against water shortage. The film is produced symbolically in a simple form. The film is educational particularly for children and youths. The symbols can communicate with all people in all times and places in the world. This 3-minute silent movie warns people of wastage of water and informs them about the human rights.
Ten years ago, a few enthusiasts decided to revive the historic salt production of Bourgneuf Bay in the west of France. They dug out and cleared the ancient salt pans to harvest Bay Salt once again. Over the course of a year, we come to appreciate Bernard, Daniel and Mano, three different personalities, united by a genuine attachment to their work and a deep respect for nature.
Horisont is a film about waves: waves in the open coastal landscape, waves as the flocking birds slide above stone fences and fields, eternal waves of the sea. It is a poetic, almost dreamlike film, inspired by painting and music. In its quiet way, it is is a tribute to the coastal landscape and a reminder of the importance of protecting these landscapes in ways that permit us to experience them as wide, open and diverse cultural landscapes. Horisont is filmed in Jæren and Lista in Southwest Norway.
The film presents activities of Etel Merk, private owner of animal shelter near Backa Topola, who took care of more than 500 dogs and about 100 cats. In addition, this film is about a sincere dedication of Etele Merk (painter and professor at the Faculty of Fine Arts), leaving a career, artist and Professor, to take care of the abandoned animals. In addition to the animal shelter, Etela took care of other endangered animals in Backa Topola, as well as the poor people in the municipality. Because of debt of 45 000, 00 RSD, electricity was turned off at the farm with the animal shelter.This forced Etel to use candle and was the reason of a fire in which she tragically died.
Rome is touristically hypocritical and urbanistically elusive. It is not a single city but a series of loosely and badly interconnected villages. And, in the “stop and go” tourism of a quick-paced civilization which only searches culture for scalps to hurriedly bring home, after paying a quick visit to the city, the unknowing tourist is convinced of having sufficiently capitalized on the possible and necessary offer of emotions. However, it is precisely most of the villages making up the city’s private treasure that are overlooked by tourists unless they stumble on them inadvertently. These lucky few, prey of their TomToms gone haywire and road maps read upside-down, return home with news of never-before-seen marvels. This playful guide-book aims at giving access to the throbbing heart of the Eternal City to those who have had enough of plastic-bottle tourism. And especially to those interested in following an unconventional route enabling them to get to know boroughs, piazzas, alleys, fountains, shops, markets and secret stories far from the St. Peter’s – Coliseum thoroughfare.
Many people dream the impossible: To win an Oscar. Invent something that changes the world. Discover uncharted landscapes. Famous French dive pioneer Jacques Yves Cousteau achieved all this – and more. We tell the story of his amazing projects and discoveries. Filmed in Africa, Europe and the USA, the viewers witness, how Coustau developed from a ruthless shark killer to a relentless fighter for nature and radical environmentalist, whose biggest achievement of all was the inspiration he gave to millions of people all over the world.
Jungle Book Bear (narrated by David Attenborough): We all know him, we all love him: Baloo – Mowgli’s constant companion from the Jungle Book. Rudyard Kipling and even more the Walt Disney movie made this clumsy fellow world famous. The role models for Baloo are the Sloth Bears of India - surprisingly little is known about this secretive species. These in our days mostly nocturnal animals have never been portrayed in a natural history programme before. Over a period of three years Oliver Goetzl and Ivo Nörenberg not only were lucky enough to film these elusive creatures at daytime but got also behaviour that was even not known to scientists so far - e.g. the mouth feeding of cubs by their mothers.
There is a place in Africa where a mountain meets the sky... A place where rivers, forests and savannas play a neverending game with people. This place is Laikipia, central Kenya. Here dangerous wildlife share the land with thousands of farmers and their livestock. A perfect combination for trouble. But despite all odds the people living in Laikipia are fighting to make a dream come true... In this region of Africa co-existence between the needs of humans and the necessities of wildlife and nature is a well established and solid reality.
Yumen City, where China's first oil field was found, was once the city of glories and dreams. Half a century passing by, its oil resources are depleted. The government and oil bases moved out and over 90,000 residents migrated, leaving it a nearly empty city.
“Last Supper for Maltus” sheds light on one of the most prevalent and alarming issues of our time, The Global Food Crisis.A comprehensive look into the first food crisis of the 21st century.In 2008 the world’s population moved beyond 6.8 billion. A global food crisis brought agriculture back to the forefront of any plants for the future of humanity. The ongoing crisis was then overshadowed by a financial crisis, the likes of which had not been seen in 80 years. So it is perhaps inevitable that the ghost of Thomas Malthus, the controversial 19th century economist and demographer, returns now to haunt our screens with his predictions of unavoidable mass starvation.
The French call this a miniature Versailles, the British call it the Pearl of Europe, Germans call it Hungary’s Beauty, others: Hungarian Eden, Hungarian Elysium, or the Jewel of Hungary. Eszterháza. It’s as if the Hungarian sky, so covered in dark clouds for centuries, appears to smile in its radiance at the mention of this name. This nation, having undergone such adversity is now reviving from its dormancy, and is feverishly making up for omissions it was forced to endure by fate. The desire to do a lot, quickly, is characteristic of the Baroque era. Hence, amidst the Fertőd marshlands, this castle appeared almost magically, and became perhaps the finest creation of Hungarian architectural history. Apart from Versailles, there is perhaps no other place in France whose pomp may be compared to this. This castle is extremely large, and is extravagantly crammed full of an array of finery.
Peter Jochimsen, chairman of the Board of Directors of the Baltic Sea University in Germany, suffered from leukemia. For more than ten years, he had relied on medicine to survive, but he has been mentally and physically exhausted by his disease. In 2008, Peter began to financially aid to construct a primary school in the mountains of Guangxi, in Southwestern China. The picturesque scenery, simple and unadorned culture, miraculous herbal medicines and traditional Chinese shadow boxing, Taijiquan, made Peter’s life radiate with luster. After the serious earthquake in Sichuan Province, China in May 2008, Peter travelled to the disaster area, hoping to help the affected children with their studies. Facing an incurable disease and the natural disaster, Peter and the children showed to the world: with love as a bridge, happy life will continue forever.
Maybe the local authorities of the Northeastern municipalities Tyrgovishte and Shumen have eventually learned a bitter lesson after the summer floods of 2007, when civilian population had to be evacuated and the damage exceeded 5 million BGN. It seems they have now a better early warning system that would give them time for a faster response and prevent casualties and damage. The citizens of Shumen are no longer willing to put up with the bad quality and high price of tap water in the city. Right after the anti-government protests in the spring they launched their own campaign for better tap water. Local people, who had never been privy to utility, law and regulations, began to dare institutions and bureaucrats without fear. In the meantime they discover a disturbing fact - the local reservoir Ticha is legally and practically just a dam for irrigation purposes only and not for drinking water supply… And more – villages and tourists have been polluting the water for years and there is no law to stop them… Who is responsible?
An impression about the summer adventures of two children in probably the most beautiful city in the world.
The places where we live have their own stories. So to say, they have their own life, which also has an effect on ourselves („Genius loci - the protective spirit of a place). The affection to a street, square or one part of the city can define our own intellectuality and also our state of mind. Of course, the inhabitants are also partners, witnesses, who at the same time form the story of the street. As a matter of fact, they vitalize the spirit of the place. If we are able to notice the values, the connection gives us confidence and also the feeling to being at home. There are some places which are cultural, diverse and “zigzag” enough to be adopted into screen.There are some streets with special names. There are some with special stories. Some of these stories are like adventurous novels. Meandering stories are open for both types.
A series of reports in the News of Nova TV. They show how a number of old trees were planned to be cut down because of the construction of a hypermarket in Sofia. Citizens gather and begin a protest in order to save the trees. Nova TV was the first to bring the attention to the problem. It turns out that ecology experts of Sofia municipality do not know how to determine the age of the trees and do not even know their Latin names, and can not distinguish between elm, sycamore and pine. This demonstrates how permits for cutting down trees are issued without a comprehensive analysis of the matter. After the broadcast of our report, the Sofia Municipality addressed the issue and so a few of the trees were saved, and in compensation for the ones already cut down, "Kaufland" promised to plant 80 young trees in the area.
Water is becoming more and more scarce; as the global consumption of water soars, deserts are growing at an alarming rate. However, scarcity is not the only problem confronting our water supply, but contamination. Contamination by medicinal residues, pesticides and chemicals. Residues we have been ingesting over years to which no one knows the long-term consequences to our health and the en vironment. For years politicians scientists have been downplaying the threat of residual chemicals in our drinking water: the levels are said to be far too low to have any effect on humans. Slowly, this consensus is crumbling as the evidence begins to build of the detrimental effects this water pollution is having on our living environment. This investigative documentary will travel around the world to get to the bottom of what’s really in a glass of water and the journey it makes before it comes out of our taps.
Paolo Soleri, a Turin-born architect and town planner, pupil of Frank Lloyd Wright, has spent the last sixty years designing a sustainable city in the Arizona desert. Generations of students have worked in the village-laboratory of Arcosanti, studying its philosophy and building with their own hands prototypes of essential buildings, super-eco homes, squares, agoras, as well as numerous artefacts. Soleri’s “arcological” metropolis, heated and cooled by natural resources, densely built to conserve the territory, free of cars, optimising connections between production, management and residential centers, has been the focus of books, exhibitions and conferences. The life-size scale model of Arcosanti, which was developed in the 70’s and is an ongoing work in progress, gave shape to pilot buildings on which to experiment the concepts underlying Arcology. The long interview is set against the backdrop of modern-day America and all its excesses – perhaps comprehensible up to forty years ago but no longer tolerable today. The destruction of the territory, urban overcrowding, the cost of energy sources and raw materials now impose a trend reversal and make Soleri’s school of thought all the more topical.
Nearly three billion tons of wastes are discarded every year in Europe. Over three million are from Bulgaria. How much and what kind of waste is recycled in the world and in our country? How much are we losing because we are not using resources from the dumping ground?
One day in Atanasovo salinas near Bourgas - an amazing and unique place.
In the midst of the worlds biggest fruit and vegetable garden, the so called “Mar del plastico”, lies the Andalusian village of San Agustin. For the local planters this seasons atmosphere is prophesying crisis: a mysterious virus threatens the harvest, bacteria attacks the plants and the authorities are after the illegal workforce in the greenhouses. Planter José Maria would rather choose to live among vegetables than people anyway, while the Crespo family, who seems to belong to a different time era, tries to get by with vegetables, breeding goats and a giant compost pile. This is all part of the daily routine for Paco, the village taverns barman, who knows all of his customers problems. San Agustin takes an out of the ordinary look at the “Mar del plastico”–the most important producer and vendor of fruit and vegetables in Europe – as it fights with its own existence once more during the cucumber crisis of 2011. Two families, a village tavern and a lot of vegetables. One extraordinary harvest season in nine chapters.
In 1992, North-American anthropologist Marianne Schmink published "Contested Frontiers in Amazonia", a seminal book of Amazonian studies co-written with sociologist Charles H. Wood. Twenty years later, on occasion of the publishing of the Brazilian version of the book, the Professor returns to the county of São Félix do Xingu in the Amazonian state of Pará, to revisit the object of her studies in the 70's and 80's.
An incisive portrait of life aboard a Sicilian fishing vessel, the film depicts the daily struggle of fishermen to earn a living in a harsh physical environment that brings out the social and economic tensions of modern society. Manning the Priamo are Cola, the captain, Ahmed, the Tunisian first mate, two Italian engineers, and two Tunisian seamen. At sea for three weeks at a time, they fish off the coasts of Libya and Tunisia, sometimes outside the fishing limits and risking interception by the authorities. An intimate account of remoteness: after a few days on shore, the men leave their homes and families for a month. Night and day the nets are cast every four hours; the work is demanding and poorly paid; the quarters are cramped and uncomfortable; conflicts and prejudices surface amidst the roar of the engines and the sea. Beyond the horizon lies Africa, where immigrants embark for Europe, leaving their homes and families behind with the hope to find a better life.
We all speak of the weather but what do we do about it? Different hypotheses about the climate changes that have occurred on planet Earth. A look into the future through the professional lens of the film heroes. A reminder that life on our home called planet Earth is in our hands.
Ancient people communicated intensely with gods. Supposedly the first such contact was made with the Mother Goddess. She is perceived as everything that surrounds people – nature, cosmos, energy. Traces of this cult are still preserved in different parts of Bulgaria. As some kind of “houses of prayer” were used caves – wombs furrowing the whole country. The image of the Mother Goddess has been passed on to almost all religions including Christianity. Even today part of the ancient sanctuaries are being advertised by resourceful clergymen because they do not want to push away those who believe that some caves, century-old trees and stone formations are places where the divine is felt. Prof. Valeria Fol is a consultant to the film. She interprets the facts and suppositions relating to antiquity into an understandable language.
The film reviews the processes that pile waste in landfills or give it a new life. The message is that people are engaged in these processes and each should play their daily role and respect the work of the others in order to create the so called “recycling society”.
Spotter, a five- year-old male Black Rhino, just decided to explore the world outside Lewa Downs, his heavily protected conservancy. Now he roams a land where armed poachers are after him and his immensely valuable horn. He must immediately be brought back home to save his life.
A story about the Zimbabvean music and John Chibadura.
Aluminium is a fascinating metal: light, stainless and easy to process. 100 years ago, it was still so exotic that aluminium was presented at world expositions. The metal is an essential part of our daily lives. We drink from aluminum cans, use aluminum-containing deodorants and sun creams, and it increases the effectiveness of vaccines. But also critical voices move into the centre of public interest: Large amounts of resources and energy are needed for the production of aluminium. The extraction can lead to environmental disasters of considerable dimensions, as it had happened in Hungary almost one year ago. Furthermore, scientists suspect that the toxic effect of aluminium could have an influence on modern diseases of civilisation like Alzheimer’s and allergies.
Black, wonderful, mysterious... thorny, unavailable, delicious... healthy, magnificent, powerful... Blackberry is the queen of forest fruits.
The Bluefin tuna is one of the world’s most intelligent predatory fish. Yet this underwater hunter is itself among the hunted. It is a victim of the billion-dollar tuna fishing industry and is a perfect symbol of the ruthless overexploitation of our seas. Scientists point to evidence that shows stocks of Bluefin tuna have decreased by 80 per cent over the past few decades. Yet each year in May, off the coast of Sardinia, fishing boats launch into the sea to catch these highly prized creatures for Tokyo’s fish markets. 80 per cent of Mediterranean tuna are served up in sushi dishes in Japan. The Greenpeace activist Wakao Hanaoka has made it his goal to change this. At the wholesale market, he explains to the traders the fate of these majestic creatures and the threat they are under. Yet most Japanese don’t want to hear the truth behind this delicacy. A German has built up a huge fishing empire in Australia’s Port Lincoln over the past 40 years and is attempting the impossible: breeding tuna. Together with fishing experts and scientists from the University of Adelaide, he is on the edge of a breakthrough. In Spain, researchers are carrying out pioneering work in the field of tuna breeding. Using genetic analysis of the spawn, they are attempting to understand the secrets of the fish’s reproductive process. Scientists and fishing experts from the WWF fit the tuna on the Italian coast with small transmitters. The knowledge they gain will allow new measures to be taken to protect the species and help the setting up of sustainable fishing operations, so that the Bluefin tuna may be saved from extinction.
Devil's Town is a natural monument in the South of Serbia. Two rare natural phenomena are located there: 202 earthen figures, made by soil erosion, like distinct shapes of the landscape and two springs of highly acidic mineral water which make the entire nearby area so appealing. The attractiveness of the two miracles of nature is complemented by the surrounding natural environment which gives these earthen figures mystical allure.
A nation builds its future on the roots of its own history. By giving up on our past we blot out our identity and also the feeling that we belong to a certain nationality. We walk by carelessly or unaware of the monuments or buildings in which our history was once written. It’s just that more often such buildings are uncared for or are deliberately destroyed. In many cases the heritage buildings are no longer representatives of the traditional national history, but rather a real estate problem. Once they’re written on the list of historical monuments they cannot be demolished and a possible degradation would be seen as suspicious by the society. Those who care more about the value of the land on which these constructions are built have found a solution: either they are left neglected or they’re being robbed brick by brick. And this is happening under the eyes of the authorities who, although are obliged to assure security and to announce the Directorate for Culture every time the buildings suffer an intervention, they serenely ignore the law. But just as guilty for the destruction of the monuments are also the owners who knowingly refuse to sign insurance policies for the protection of the buildings. This is the argument of the story we want to show you. We select seven buildings from Iasi and Vaslui county. One of them is a school, one is a museum, the other one was a museum and a house where lived a famous writter in Romania. The last three were palaces built by the old family of boyars in our county.
The film is about the region of Golo Bardo left on Albanian territory after the Balkan War (1912-1913) and Albania’s independence. The people living there, once occupying up to twenty-one former Bulgarian villages, have lived for almost 100 years now as Albanian citizens. “The jumbled threads. A film about Golo Bardo” is not just an ethnographic look upon the traditional culture of these unexplored, unknown villages in isolation. It’s an analysis of Golobardians’ psychology, an attempt for closeness to their life and world - somewhere out there in Albania. The characters are the Golobardians themselves - with their hard daily life and sound celebrations. Golobardians who ask themselves questions like “Who are we?” and “Where do we belong?” and share stories about their “closed” border and memories of Enver Hoxha times and bunkers in the fields, of ceremonial wedding songs and drinking toasts for the shared feast…with their lives, which they take as if it’s a movie. The threads of life of these people are jumbled, but the looms still weave dresses for the brides, for those, who haven’t left their birthplace (Golo Bardo) and are still bound to the land of their ancestors. The film is produced as part of the project “The song as an expression of community identity: two ease studies” , funded by “Scientific Researches” – Ministry of Education and Science, with director of studies Assoc. Prof. PhD Veselka Toncheva.
The Earth is a living organism. We have to understand that and change the way we live and treat the surrounding environment. The change should come from inside everyone of us. There is still time for a change even tough we are living in “The Last Second” before destroying the nature.
The film examines the issue of extinction of old-growth forests in Bulgaria. It aims to elucidate what they are, what is their role in biodiversity conservation in the country and the great significance of making efforts for their preservation.
In the summer of 2011, the journalist Kimmo Ohtonen came up with an idea to help the only endemic mammal in Finland, the critically endangered Saimaa Ringed Seal. In the course of a year, he would learn to swim so he could conquer the lake Saimaa by swimming it from top to toe in an attempt to raise funds and public a wareness for the conservation work of the Saimaa Ringed Seal. Kimmo Ohtonen trained like a professional swimmer for 13 months to gain fitness required to meet the challenge and attended public events to raise awareness of the challenges faced by the Saimaa Ringed Seal, which could face extinction in the future unless radical action will turn the course of its fate. In the end of August 2012, he plunged into cold waters of the lake Saimaa to start his 11 days swimming marathon. With his perilious journey, Kimmo Ohtonen brought together people from all the over Finland to take interest in the conservation work of the most endangered seal in the world and the importance of our nature in general. After swimming over 135 kilometers through the biggest lake in Finland, Kimmo Ohtonen reached his goal successfully and managed to raise 150 000 euros and hundreds of thousands of supporters for the Finnish seals. Nevertheless, even bigger achievement was in the way in which the Seal Swim educated the public towards protecting our globe's precious wildlife, of whose symbol the Saimaa Ringed Seal is in Finland.
There are an estimated 7,000 different species of amphibians - and scientists say one-third of them are on the endangered list. Many species of frogs are especially at risk. Their unusually thin skin, which allows them to absorb oxygen and water, makes them particularly sensitive to climate change and environmental hazards. So frogs can serve as a natural kind of “early warning system". Frog species are dying out the world over and this phenomenon has gone largely unnoticed by the general public. We accompany two Berlin specialists as they search the rain forest that covers the slopes of Mount Manengouba in Southwest Province of Cameroon. They are trying to find out why so many frogs are dying, and how to protect those that still remain.
No description of the Rhodope Mountains can be complete without a mention of their importance in ancient mythology. This was the birthplace and home of the most famous ancient musician, Orpheus the Thracian. If you listen to the babble of the river, you can hear the crystal sounds of Orpheus's lyre. And in the rustling of the leaves you can hear the quiet whisper of the dryads and the beautiful Eurydice.
Who was Orpheus? A mythical figure or a real person? These two aspects of his personality are interwoven. The legend of the great Thracian and his everlasting love for Eurydice came to us in the work entitled "Metamorphoses" by the Roman poet Ovid, who lived in the first century BC. When Orpheus played his magic lyre and sang in his ringing voice, he enchanted and conquered nature itself. On his return to his native Thrace after a long voyage with Jason in search of the Golden Fleece, Orpheus met the enchanting nymph, the dryad Eurydice. He fell in love with her and soon they were married. But their happiness was short-lived! Engrossed in playing games with her dryad friends, Eurydice did not notice the poisonous snake in the soft grass. The venom brought her to the ground.
Orpheus was inconsolable! His songs were so full of grief that nature itself fell silent with him.
The natural world is teeming with active life-forms. Even familiar plants and flowers engage in astonishingly energetic actions and behaviors. Plant photographer Ciabou Hany (Shabo Hani), 82 years old, has devoted his career to close observation of the minute glories of plant life. He shows us a water droplet nestled like a jewel in the leaves of a cypress seedling...field horsetail spores dancing under a microscope...the stamens of the tiny katenso, hurling their pollen into the air like pitching machines. Hany takes us into his garden, or on morning walks, where he crawls on the ground or lies down amidst his beloved plants to record the drama of these diminutive creatures, which exist all around us but which we so often overlook. Ordinarily we think of plants as stationary, immobile. Hany’s lens reveals to us a fantastic world of drama and movement. Watching this program makes us realize just how full of life and action our entire world is, even amongst the commonest plants of our immediate environment. In some cases, their beauty takes our breath away; in others, their lively behaviors bring smiles to our lips. We follow Hany over the course of a year, as he helps us appreciate the nobility of even the tiniest life-forms amongst us, and the magic of a wondrous universe that lies at our very feet.
Portrait of a woman who has sacrificed all her life for saving and preserving trees.
In his ongoing quest and passion for Africa the world traveler, painter, writer, and filmmaker Kiro Urdin has finished his latest third film inspired by Africa's wilderness. It is a feature art film filmed on locations in Masai Mara, Kenya. Actors are lions, hyenas, wildebeests, elephants, baboons, zebras etc. Humans are playing the roll of statists in this thrilling film about a parallel universe of everyday life of wild animals, a life from which we can easily identify ourselves in our everyday struggle for survival in our highly civillized society.A film about a parallel universe of everyday life of wild animals, a life with which we can easily identify ourselves in the everyday struggle for survival in our highly civillized society.
At the beginning of 80's in 20th century the discarded old metals called foreign garbage began to appear here,and then were carried to the nearby Fengjiang Town for dismantling,where a great deal of migrant workers pour and go in for metal dismantling. They acquire an income at the expenses of their health,but a low income.The dioxin pollution for local soil has been detected here by Chinese research for the first time. As one of the most poisonous materials up to now, the dioxin pollution could extend to the range in dozens of square kilometers. | 2019-04-22T20:13:12Z | http://www.euroekofest.org/l_en/?s=2&i=11 |
Medium Daniel Dunglas Home. Scotland. UK.
The Physical Medium D. D. Home is depicted levitating 1868. A plate that is a replication of the Medium levitating by the second storey window, out of which he went feet first, then returned returning from the outside of the building by another window of the second storey head first.
The most remarkable Clairvoyant and Physical Medium that has been written about, was Donald Dunglas Home, and one who was the most well known Physical Mediums of the day and probably every Mediumistic person today would like to aspire to. He was one of the few Physical Mediums that was never detected doing anything wrong or trying to trick people. Many in the Christian communities had tried to put him into the category of a faker; NONE SUCCEEDED.
Medium D D Home came from a humble Scottish family [mother Elizabeth [Betsey] McNeal who had second sight, and father William Humes [correct spelling] born on the 20th of March 1833, in the small village of Currie near Edinburgh, but he had the airs and graces to allow him to become part of the circle of high society in the 1800's. Donald never accepted any monetary gifts for the seances he fronted, but he was not averse to accepting gifts from those in high society he stayed with over the years, of which there were many. His list of distinguished friends read like a fairy tale novel of high society becoming very good friends with many of the European monarchs including Queen Victoria and the Czar of Russia through whom he met and married a lady of noble birth.
Daniel when a year old, went to stay with his childless aunt Mrs. Mary McNeal Cook in Portobello, who said Daniel's cot was rocked by invisible hands. When he was nine, Donald was taken to America by his aunt and uncle to settle in Connecticut at Greenville [Norwich] to be nearby his parents also his brothers and sisters [seven in all].
Daniel in his formative years produced around him knocks, bangs, apparitions, and so called hauntings. After his little sister Mary Betsey died she came through to the family so often whilst Donald was there and was spoken of as though she was still alive on the earth plane.
Daniel had tuberculosis at an early age being subject to a constant cough and fainting regularly through the disease. He foretold of the death of his friend three days earlier after seeing him in his bedroom one night. A few days later in 1850 when he was 17, on coming down to breakfast he told his aunt he had been awakened by three loud knocks on his bed during the night, his aunt said it was because he had had a bad prayer meeting and tried to dismiss it out of hand, BUT when he sat down to the table, there was a great number of raps to the table, on which she threw a chair at him and said you have brought the devil to our household. Aunt Mary sent him off to the Congregational church who said they could not find anything wrong with this gentle boy and refused to have any part of the exorcism, she then took him to the Methodist church who said it was the work of the devil and treated him very unkindly. the Baptist Minister prayed over the kneeling Donald and at every mention of a holy persons name a gentle rap was heard on the chair the more passionate the Minister prayed the loud became the raps.
Eventually the raps which became a regular happening around his Aunt's house attracted the attention of the neighbours and Daniel was asking the Spirit contact to find long lost relatives, broaches, title-deeds and many other things. It all became too much for his aunt and uncle and after one row his very devout Christian aunt he was duty bound to leave the house and his aunt threw his best Sunday suit out of the upstairs window. [Daniel later bought her a cottage out of the monies [�60,000] given to him by a wealthy widow, a Mrs. Lyon, who later sued him to get it all back. The judge in this case said if all the donors to religious and charitable bodies were to be allowed to change their minds and revoke gifts once made a pretty state of confusion would ensue. She was made to pay D. D. Home's and her own costs. But the monies were ordered by the judge to be returned to Mrs Lyon].
At this time Daniel Home wandered for a few years, lost within his own area of Mediumship BUT at this time there were many such Mediums in the United States of America especially on the eastern seaboard. Some of the many things the Mediums of the time produced where Spirit music, Spirit painting, Direct Spirit Voices, materialized Spirit faces, luminous Spirit faces and hands, Spirit lights, levitations, speaking in tongues. At the time it was said by even their enemies, there were many, many millions of followers and many millions of Mediums some being professionals and hundreds of thousands of others who were mainly amateur.
In his wanderings he would visit people and show off his gifts of materializations and levitations. Most of the time in the bright light of day. many times in gas light or bright oil lamps and the light of a bright fire, out of which he would take red hot burning coals and with the permission of the Spirit World would hand them to others in the seance to hold, never himself or the others being burned, but it was always where people in the room the seance was being held could see each other, and everyone could see the Medium Daniel Dunglas Home.
At the beginning, he sat only for a small circle of friends who had the monetary means and were in what was called in high society.
Having no base as a home, he was described as the man who came to tea and stayed. This was in the homes of people like, substantial farmers, judges, doctors, editors, merchants, liberal clergymen, and people like that, but as his fame spread, he was taken to Europe and in Paris was introduced to the Emperor and Empress.
In defense of his amateur status, refusing to charge for any seance throughout his career, and in one book Home wrote, "I was never a professional Medium, When the Archbishops of Canterbury and York return to the primitive practice of St Peter and St Paul, and live by catching fish and mending nets, it will be time enough to raise and outcry against paid Mediums.
In the testimony of the 25th Earl of Crawford, in his a long letter to a relative, he describes in detail a seance with Home that took place in Florence during 1856. He gives an account of the personalities who were present, and it is in the last degree improbable that anyone among them was the Medium's accomplice. During the seance the room was lit by a bright oil-lamp. The sitters and the Medium were ranged round a heavy table, all except the writer, who remained outside the Circle so as not to be influenced by suggestion. The table, the chairs, the floor, and even the china at the far end of the room, all vibrated. He looked under the table, but saw nothing suspicious. Immediately after this, the heavy dining table rose into the air to a height of about four feet and remained so whilst he had another look underneath. On another occasion, after a seance in the same house, when the Earl of Crawford's brother-in-law, Robert Lindsay, was present, a levitation occurred under circumstances which make it astounding. The company, including the Medium, were sitting round the fire having tea when a table at the far end of the room rose up three feet and plunged about. Despite the violent movement, the loose slab of marble that formed the table top, and a pencil and paper that lay upon it, remained undisturbed. So strong was the levitating force that, when Robert Lindsay approached the table and tried to push it back to the ground, he had to exert his utmost strength before he could succeed.
The Book Heyday of a Wizard. By Jean Burton 1948 is worth a read if you can get hold of it, I now have it in my collection. All about D D Home's life BUT it is only written by Jean Burton on hearsay she did not know the man.
Incidents in my Life. 1884. A book written by D D Home himself, now can be read as an eBook click on to link or place it in google and it will find it. www.spiritwritings.com/incidentsinmylife.pdf.
Daniel Home's mother, Elizabeth ("Betsy") Home (nee McNeill) was known as a seer in Scotland, as were many of her predecessors, like her great uncle Colin Uruqhart, and her uncle Mr. McKenzie. The gift of second sight was often seen as a curse, as it foretold instances of tragedy and death. Home's father, William Home, was the illegitimate son of Alexander, the 10th Earl of Home. Evidence supports the elder Home's illegitimacy, as various payments meant for William were made by the 10th Earl. Elizabeth and William were married when he was 19-years-old, and found employment at the Balerno paper mill. The Homes moved into one of small houses built in the mill for the workforce, in Currie (six miles south-west of Edinburgh). William was described as a "bitter, morose and unhappy man" who drank, and was often aggressive towards his wife. Elizabeth had eight children while living in the mill house: six sons and two daughters, although their lives were not fully recorded. The eldest, John, later worked in the Balerno mill and eventually managed a paper mill in Philadelphia, Mary drowned in a stream at 12-years-old in 1846, and Adam died at sea at the age of seventeen while on route to Greenland, which Home saw in a vision, and was confirmed five months later.
Daniel Home was Elizabeth's third child, and was born on 20 March 1833. He was baptised by the Reverend Mr. Somerville three weeks after his birth at Currie Parish Church (14 April 1833). The one-year-old Home was deemed a delicate child, having a "nervous temperament", and was passed to Elizabeth's childless sister, Mary Cook. She lived with her husband in the coastal town of Portobello, 3 miles (4.8 km) east of Edinburgh. It was at the Cook's house that Home's cradle rocked by itself and the infant had a vision of a cousin's death, who lived in Linlithgow, to the west of Edinburgh.
Sometime between 1838 and 1841, Daniel Home's aunt and uncle decided to emigrate to the United States with their adopted son, sailing in the cheapest class of steerage as they could not afford a cabin. After landing in New York, the Cooks travelled to Greeneville, near Norwich, Connecticut, USA. The red-haired and freckled Home attended school in Greeneville, where he was known as "Scotchy" by the other students. 13-years-old Home did not join in sports games with other boys, preferring to take walks in the local woods with a friend called Edwin. The two boys read the Bible to each other and told stories, and made a pact stating that if one or the other were to die, they would try and make contact after death. Home and his aunt soon moved to Troy, NY, which is about 155 miles (249 km) from Greeneville, although Home in his own book stated it was 300 miles (480 km) away. Home lost contact with Edwin until one night when Home, according to Lamont, saw a brightly lit vision of him standing at the foot of the bed, which gave Home the feeling that his friend was dead. Edwin made three circles in the air before disappearing, and a few days later a letter arrived stating that Edwin had died of malignant dysentery, which was three days before Home's vision.
A few years later Home and his aunt returned to Greeneville, and Elizabeth Home emigrated from Scotland to America with the surviving members of the family to live in Waterford, Connecticut, which was 12 miles (19 km) away from the Cook's house. Home and his mother's reunion was short-lived, as Elizabeth foretold her own death in 1850. This was also confirmed by Home, as he saw his mother in a vision saying, "Dan, twelve o'clock", which was the time of her death. After Elizabeth's death Home turned to religion. His aunt was a Presbyterian, and held the Calvinist view that one's fate has been decided, so Home embraced the Wesleyan faith, which believed that every soul can be saved. Home's aunt resented Wesleyans so much that she forced Home to change to Congregationalist, which was not to her liking, either, but was more in line with her own religion. The house was then disturbed by rappings and knocking similar to those that occurred two years earlier at the home of the Fox sisters. Ministers were called to the Cook's house: a Baptist, a Congregationalist, and even a Wesleyan minister, who all believed that Home was possessed by the Devil, although Home believed it was a gift from God. The knocking did not stop however, and a table started to move by itself, even though Home's aunt put a bible on it and then placed her full body weight on it. As the noises did not stop, and were attracting the unwanted attention of Cook's neighbours, Home was told to leave the house.
William Cullen Bryant, a poet, and editor of the New York Evening Post, who witnessed one of Home's seances.
The eighteen-year-old Daniel Home stayed with a friend in Willimantic, Connecticut, and later Lebanon, Connecticut, USA. Home held his first seance in March 1851, which was reported in a Hartford newspaper managed by W. R. Hayden, who wrote that the table moved without anyone touching it, and kept moving when Hayden physically tried to stop it. After the newspaper report, Home became well-known in New England, travelling around healing the sick and communicating with the dead, although he wrote that he was not prepared for this sudden change in his life because of his supposed shyness.
Home never directly asked for money, although he lived very well on gifts, donations and lodging from wealthy admirers. He felt that he was on a "mission to demonstrate immortality", and wished to interact with his clients as one gentleman to another, rather than as an employee. In 1852, Home was a guest at the house of Rufus Elmer in Springfield, Massachusetts, USA, giving seances six or seven times a day, which were visited by crowds of people, including a Harvard professor, David Wells, and the poet and editor of the New York Evening Post, William Cullen Bryant. They were all convinced of Home's credibility and wrote to the Springfield Republican newspaper stating that the room was well-lit, full inspections were allowed, and said, "We know that we were not imposed upon nor deceived". It was also reported that at one of Home's demonstrations five men of heavy build (eight hundred and fifty pounds together) sat on a table, but it still moved, and others saw "a tremulous phosphorescent light gleam over the walls". Home was investigated by numerous people, such as Professor Robert Hare, the inventor of the oxy-hydrogen blowpipe, and John Worth Edmonds, a Supreme Court judge, who were skeptical, but later said they believed Home was not fraudulent. Home's breakthrough came in August 1852, in South Manchester, Connecticut, at the house of Ward Cheney, a successful silk manufacturer. Home was seen to levitate twice and then rise to up to the ceiling, with louder rappings and knocking than ever before, more aggressive table movements and the sounds of a ship at sea in a storm, although persons present said that the room was badly lit so as to see the Spirit lights.
New York was now interested in Daniel Home's abilities, so he moved to an apartment at Bryant Park on 42nd street. His most verbal critic in New York was William Makepeace Thackeray, the author of 'Vanity Fair'. Thackeray dismissed Home's abilities as "dire humbug", and "dreary and foolish superstition", although Thackeray had been impressed when he saw a table turning. Home thought that Thackeray was "the most skeptical inquirer" he had ever met, and as Thackeray made public his thoughts, Home faced public skepticism and further scrutiny. Home travelled between Hartford, Springfield, and Boston during the next few months, and settled in Newburgh by the Hudson River in the summer of 1853. He resided at the Theological Institute, but took no part in any of the theological discussions held there, as he wanted to take a course in medicine. Dr. Hull funded Home's studies, and offered to pay Home five dollars a day for his seances, but Home refused, as always. His idea was to fund his work with a legitimate salary by practicing medicine, but he became ill in early 1854, and stopped his studies. Home was diagnosed with Tuberculosis, and his doctors recommended recuperation in Europe. His last seance was in March 1855, in Hartford, Connecticut, before he travelled to Boston and sailed to England on board the Africa, at the end of March.
Home's name was originally Daniel Home, but by the time he arrived in Europe he had lengthened it to Daniel Dunglas Home, in reference to the Scottish house of Home, of which his father claimed to be a part. In London Home found a believer in spiritualism, William Cox, who owned a large hotel at 53, 54 and 55 Jermyn Street, London. As Cox was so enamoured of Home's abilities, he let Home stay at the hotel without payment. Robert Owen, an 83-year-old social reformer, was also staying at the hotel, and introduced Home to many of his friends in London society. At the time Home described as tall and thin, with blue eyes and auburn hair, fastidiously dressed but seriously ill with consumption. Nevertheless, he held sittings for notable people in full daylight, moving objects that were some distance away. Some early guests at Home's sittings included the scientist Sir David Brewster, the novelists Sir Edward Bulwer-Lytton and Thomas Adolphus Trollope, and the Swedenborgian James John Garth Wilkinson. Home converted most skeptics, but Robert Browning, the poet, proved more difficult. After attending a s�ance of Home's Browning gave his impression of Home in the unflattering poem, "Sludge the Medium" (1864). His wife, Elizabeth Barrett Browning, was convinced that the phenomena she witnessed was genuine and their discussions about Home were a constant source of disagreement.
Robert Browning, who wrote "Sludge the Medium" about Home.
Daniel Home's fame grew, fuelled by his feats of levitation. William Crookes claimed to know of more than 50 occasions in which Home levitated "in good light" (gas light) at least five to seven feet above the floor. Homes' feats were recorded by Frank Podmore: "We all saw him rise from the ground slowly to a height of about six inches, remain there for about ten seconds, and then slowly descend."In the following years Home travelled across continental Europe, and always as a guest of wealthy patrons. In Paris, he was summoned to the Tuileries to perform a seance for Napoleon III. Home also performed for Queen Sophia of the Netherlands, who wrote: "I saw him four times...I felt a hand tipping my finger; I saw a heavy golden bell moving alone from one person to another; I saw my handkerchief move alone and return to me with a knot... He himself is a pale, sickly, rather handsome young man but without a look or anything which would either fascinate or frighten you. It is wonderful. I am so glad I have seen it..."
In 1866, Mrs Lyon, a wealthy widow, adopted Home as her son, giving him �60,000 in an attempt to gain introduction into high society. Finding that the adoption did not change her social situation, Lyon changed her mind, and brought a suit for the return of her money from Home on the grounds that it had been obtained by spiritual influence. Under British law, the defendant bears the burden of proof in such a case, and proof was impossible since there was no physical evidence. The case was decided against Home, Mrs Lyon's money was returned, and the press pilloried Home's reputation. Home's high society acquaintances thought that he behaved like a complete gentleman throughout the ordeal, and he did not lose a single important friend.
Daniel Home met one of his future closest friends in 1867; the young Lord Adare (later the 4th Earl of Dunraven). Adare was fascinated by Home, and began documenting the seances they held. One of Home's levitations occurred the following year, and in front of three witnesses (Adare, Captain Wynne, and Lord Lindsay) Home was said to have levitated out of the third storey window of one room, and back in through the window of the adjoining room.
Sir Arthur Conan Doyle, who witnessed Home's mediumship and detailed the four individual types Home possessed.
Sir Arthur Conan Doyle stated that Home was unusual in that he had four different types of mediumship: direct voice (the ability to let Spirits audibly speak independantly); trance speaker (the ability to let Spirits speak through oneself); clairvoyant (ability to see things that are out of view); and physical medium (moving objects at a distance, levitation, etc., which was the type of mediumship had no equal). Home was suspicious of any Medium who claimed powers he himself did not possess, particularly the materializing Mediums (such as the Eddy Brothers), who claimed the ability to produce solid Spirit forms, and he marked these as fraudulent. Since materializing Mediums always work in darkened places, Home urged that all seances be held in the light. Home, in his 1877 book Lights and Shadows of Spiritualism, detailed the conjuring tricks employed by false Mediums.
Lord Adare stated that Home "swung out and in" of a window in a horizontal position. "He [Home] came in [through the window] again, feet foremost, and we returned to the other room. It was so dark I could not see clearly how he was supported" [outside of the three story window]. Podmore recorded that Home had a constant companion that sat opposite of him during his seances. A lady acted as a medium and used to help Home during the seances attended by Henrietta Ada Ward. Between 1870 and 1873, Crookes conducted experiments to determine the validity of the phenomena produced by three mediums: Florence Cook, Kate Fox, and Home. Crookes' final report in 1874 concluded that the phenomena produced by all three Mediums were genuine, a result which was roundly derided by the scientific establishment. Crookes recorded that he controlled and secured Home by placing his feet on the top of Home's feet. Crooke's method of foot control later proved inadequate when used with Eusapia Palladino, as she merely slipped her foot out and in of her sturdy shoe. Alexander von Boutlerow, Professor of Chemistry at the University of St. Petersburg and Home's brother-in-law, also obtained positive results in his tests of Home.
Frank Podmore and Milbourne Christopher provide a source of speculation on the ways in which Home could have duped his sitters. Some testimony suggests that Home often conducted his demonstrations in dim light. For example, there is this report from a witness: "The room was very dark...Home's hands were visible only as a faint white heap". The light conditions during Home's most famous feat of levitation were disputed, but some witnesses recorded that it was quite dark. Gordon Stein speculated on the deception of Crookes' testing devices (with diagrams) and gave a third-hand account of Home being caught with a vial of oil of Phosphorus. During a Crookes test when Home "is not touching with his hands." there are objects just lying beneath his hands that his fingertips are touching, a small match box and a small bell. The measuring arm of Crookes' gauge does not exactly "move." It trembles. It was reported by sitters and Crookes Home's accordion played only two pieces, Home Sweet Home and The Last Rose of Summer. Both contain only one-octave. Home played his accordion with only one hand beneath a table. James Randi [ the professional paid skeptic ] stated that Home was caught cheating on a few occasions, but the episodes were never made public, and that the accordion Home is supposed to have played was a one-octave mouth organ that Home concealed under his large moustache. Randi writes that one-octave mouth organs were found in Home's belongings after his death. According to Randi 'around 1960' William Lindsay Gresham told Randi he had seen these mouth organs in the Home collection at the Society for Psychical Research. Eric Dingwall who catalogued Home's collection on its arrival at the SPR does not record the presence of the mouth organs. It is unlikely Dingwall would have missed these or did not make them public.
Born in poverty and illegitimate in Edinburgh on March 20, 1833, Home was adopted by his aunt when he was an infant, and taken to Connecticut when he was nine. As a child, he experienced visions and precognition, with the most significant being the occasions when he saw a friend who had died only days earlier, and then his own mother about the time of her death even though she was some distance away from the young Medium. However, it was when physical phenomena began, that he was forced to leave home, due to his family believing this was demonic: he was nineteen when he experienced his first levitation. Despite the situation in which he found himself, demonstrations of his abilities were sought, and he was welcomed by many living in New York and New England. In view of his abilities, two Harvard researchers heard of him, and on carrying out tests, found that physical phenomena occurred without there being any indication of a this-worldly cause. By the early 1850s, he was levitating, and partial materializations were being produced in his seances.
By 1855, when Home came to Britain, the news of Spiritualism had already reached this country: the American Mediums, Mrs Hayden and Mrs Roberts had travelled here within five years of the Hydesville phenomenon that resulted in the birth of modern Spiritualism. Home therefore found a receptive audience when he arrived here.
One of the more amusing incidents that occurred during a seance, was when the next-world visitors thought it would be interesting to dismantle a bronze figurine and throw the pieces about the room. Unfortunately, after the seance had concluded, one piece could not be found despite careful searching. Home requested that the Spirits direct him to the piece and this was duly done. Enmore Jones, who recorded details of the event, asserted that, 'It confirmed me in the belief that our spirit friends are more keen-eyed than we, that they hear our words, and can control even our physical organism'.(4) Another example of the variety of phenomena that arose was the seance on 17 July 1868; a sitter reported how during the seance, held in a lighted environment and in his own home, his elderly mother was levitated with the chair on which she sat. Clearly, attending a seance with Home was not an occasion that was easily forgotten.
In addition to these phenomena, there were further abilities that distinguished Home from other mediums. One such feature was the elongation of his body by up to a foot in length. Another feat was his handling of pieces of coal taken from the fire. One witness who was present on such an occasion testified that Home was seen to take a 'red-hot coal...and carry it up and down the room'.(6) Many of those who attended Home's seances were initially sceptical; Inglis cited the view of Sir David Brewster, who after seeing Home's mediumship, believed that it had 'upset the philosophy of fifty years'. However, Brewster then argued that the phenomena had purely human origin; despite this change of opinion, his daughter supplied details of his own personal account of the seance when he detailed the events that included vibrations, rappings, levitations of tables, partial-materializations, and a declaration these could not be accounted for by a this-worldly explanation. Why then had Brewster said that the phenomena could be explained? Simply, because by giving support to Home this: 'might have jeopardised his prospects. So he had chosen to smear Home. Four years later, he had enjoyed his reward when he was appointed to be Principal of Edinburgh University'.(7) It is an extraordinary and absurd situation that some choose to attend seances, in the knowledge that they will not vouch for the genuineness of phenomena if they actually occur. Nonetheless, this was the type of behaviour that Home, and many other mediums since Home's time have had to endure.
In the autumn of 1855, Home travelled to Florence, and his mediumship was witnessed by various personages during the period, e.g. Prince Murat, Napoleon III and the Empress Eugenie; the latter was convinced that her father had materialized in view of being able to identify a recognizable defect that he had on his hand that also appeared on the materialized form. Direct writing was also produced with Napoleon Bonaparte signing his name, that the current Emperor declared was indeed Bonaparte's handwriting. In December 1855, an attempt was made against his life due to the reputation that he had gained as a necromancer. During the period while abroad, Home joined the Catholic church and was received by Pope Pius IX, although this conversion was apparently short-lived, and he resumed his mediumship. Various rumours circulated while he was abroad to account for his powers; these included that he chloroformed his sitters, used the secret police to obtain information about them, that he received 'electrical power' from cats, and that he carried a monkey in his coat and this caused the movement object and the sensation of hands during seances.
For much of the twelve years following, Home resided in London; when his wife, who had been wealthy and contributed to his upkeep, died in 1862, he was forced to maintain himself by giving lectures and suchlike. He wrote Incidents in My Life, and then went to Rome to study to take up sculpturing; however, he was ordered to leave on the charge of sorcery. He therefore promised to stop mediumistic activity, but as this was not in his control and persisted, he was forced to leave papal territory, and returned to Britain in April 1864. In 1866, he received help from friends and supporters who founded the 'Spiritual Athenaeum' to support him. One of the more bizarre incidents in Home's colourful life was him being adopted by Mrs Lyon who then showered him with money and gifts. A short time later, Mrs Lyon decided to turn against Home and demand back what had been given to him; this resulted in a court case in 1868. There was considerable testimony against Mrs Lyon, but the onus of proof fell upon Home, and his mediumistic activities clearly brought about dis-favour. Home lost, but what is noteworthy in the matter is the fact that so many people gave evidence of Home's mediumship and no accusation of fraud was proved. During the case, yet another attempt was made against his life, because the Christians thought he was evil..
The event that is best remembered of Home's mediumship is when, on 13 December 1868, Home floated out of the window of a third floor room in Ashley House, and then returned via another window to join the witnesses. This was achieved in the presence of Capt. Wynne, the Earl of Dunraven (at the time, Lord Adare) and the Earl of Crawford (at the time, Lord Lindsay). Various imaginative suggestions have been offered to account for, or rather explain away this feat, including the hypnotizing of those present, blackmail, or that Home had accomplices. As so often happens, there are those who feel able to supply various conjectural explanations, despite not even being there, but the weight of the testimony of those actually present cannot be so easily discounted. The event not only included Home levitating in mid-air, but even his method of exit was astonishing. After Home returned to the building, he took one of those present to the room from where he had made his earlier exit, and the witness recorded that the window was barely open by a foot and 'he then went through the open space, head first, quite rapidly, his body being nearly horizontal and apparently rigid. He then came in again, feet foremost...'.(10) The Earl of Dunraven described some of Home's activity during 1867-1869, in Experiences with D. D. Home in Spiritualism, that detailed the events of some eighty seances. In 1872, Home produced a second edition of Incidents in My Life, and this was followed by the publication of Lights and Shadows of Spiritualism.
Home married for the second time in 1871, and again, his wife, Julie de Gloumeline, was a wealthy Russian. He ceased his mediumistic activities during the 1870s, and died on June 12, 1886, of tuberculosis, after suffering a long period of painful illness: his body was buried at St Germain-en-Laye. After his death, his wife wrote two books about him: D. D. Home: His Life and Mission (1888), and The Gift of D D Home (1890).
An adequate summary of Home's mediumistic abilities is surely supplied by Gauld: 'What is so astonishing...about D. D. Home is the sheer number of seemingly disinterested persons who were prepared to testify that he had in good or passable light produced startling phenomena before their very eyes'. Furthermore, in respect of Home effecting the phenomena by deception, Gauld argues that in view of what occurred, 'they could hardly have been the work of conjuring'; and with regard to hallucination/ hypnotism: 'It is true that not infrequently a phantom hand or a phantom figure would be visible only to some of the sitters...but so many of the other phenomena were observed on so many different occasions by so many different witnesses that the question of hallucination can in most cases hardly be raised'.(20) Podmore, who was hardly one for giving any credit to physical mediums, noted that while Home suffered from vanity (the Earl of Dunraven also noted this, believing that it was necessary as a defense mechanism against the invective suffered), he believed the impression gained by the people who met Home was 'of a highly emotional, joyous, childlike nature, full of generous impulses, and lavish affection to all comers'. Moreover, Home 'professed a fervent belief in his own mission as a teacher of the truth of immortality'.(21) Surely, there really can be no doubt that he fulfilled that mission.
(1)J. Beloff, Parapsychology: A Concise History (London: Athlone Press, 1993), p.41. (2)A. Gauld, The Founders of Psychical Research (London: Routledge and Kegan Paul, 1968), pp.69,71. (3)F. Podmore, Modern Spiritualism (London: Methuen, 1902), p.232. (4)Spiritual Magazine, 1861, p.480. (5)W. Crookes, 'Notes of Seances with D. D. Home', PSPR, Pt. XV (1889), pp.107-108,116. (6)Ct., W. F. Barrett, On the Threshold of the Unseen, 2nd edn (London: Kegan, Paul, Trench, Trubner, 1917), pp.76-77. (7)B. Inglis, Natural and Supernatural (London: Hodder and Stoughton, 1977), pp.227-229. (8)Inglis, Ibid., p.230. (9)Ct., Inglis, Ibid., p.231. (10)Earl of Dunraven, 'Experiences in Spiritualism', PSPR, 35 (1924), p.156. (11)Earl of Dunraven, Ibid., pp.90,132,242. (12)A. Gauld, Mediumship and Survival (London: Heinemann, 1982), p.23. (13)Inglis, Op. Cit., (London: Hodder and Stoughton, 1977), p.225. (14)Earl of Dunraven, Op. Cit., p.22. (15)F. W. H. Myers, Human Personality and its Survival of Bodily Death, 3rd edn., rev (Norwich: Pelegrin Trust, 1992), p.260. (16)J. Oppenheim, The Other World (Cambridge: CUP, 1985), p.13. (17)H. Carrington, The Physical Phenomenon of Spiritualism (London: Werner Laurie, 1907), p.372. (18)E.g. Oppenheim, Op. Cit., p.11. And, Podmore, Op. Cit., 2:230. (19)R. E. Guiley, Harper's Encyclopedia of Mystical and Paranormal Experience (San Francisco, CA: HarperCollins, 1991), p.267. (20)The Founders of Psychical Research, pp.215-216. (21)Podmore, Op. Cit., pp.228,229. (22)Crookes, Op. Cit., p.122.
From Fortune City with slight alterations.
Spiritualism was introduced into Holland in about 1857. The first Dutch Spiritualist on record is J. N. T. Marthese, who, after studying psychic phenomena in foreign countries, finally returned to his native Holland, taking with him the Scottish Medium D. D. Home. The latter held seances at The Hague before several learned societies, and by command of Queen Sophia a seance was given in her presence. The Medium himself, in an account of the performance, stated that the royal lady was obliged to sit seven seances on consecutive evenings before any results were obtained. These results, however, were apparently satisfactory, for the queen was thereafter a staunch supporter of the movement.
During Home's visit Spiritualism gained a considerable following in Holland and the practice of giving small private seances became fairly widespread. Spirit voices were heard at these gatherings, the touch of Spirit hands was felt, and musical instruments were played by invisible performers. | 2019-04-24T11:55:30Z | http://psychictruth.info/Medium_Daniel_Dunglas_Home.htm |
(Photo: Monica Almeida/The New York Times) A hospital in California.
President Barack Obama said in his speech to Congress that the nation must address “the crushing cost of health care,” with premiums having grown four times faster than wages in the past eight years and one million more Americans having lost health insurance each of those years. Reform won’t be easy, he said, but it cannot wait another year.
We asked some health care experts, who have seen attempts at comprehensive reform founder over the years, what might make a difference this time.
Elliott S. Fisher, a professor of medicine, is director of the Center for Health Policy Research at Dartmouth Medical School.
In calling for reform, President Obama emphasized the critical importance of bringing the soaring cost of health care. To do that, we need to address the underlying causes: a fragmented care system; lack of accountability for the overall costs and quality of care; a payment system that rewards growth and unnecessary care.
Our research, documented in the Dartmouth Atlas of Health Care, shows there are remarkable regional variations in spending. Those differences suggest there are substantial opportunities to improve the efficiency of our health care delivery system while reducing costs.
For example, in 2005, per-capita Medicare spending was $10,988 in Los Angeles but $6,838 in Sacramento; $14,360 in Miami, but $7,008 in Tallahassee, Fla.; $12,119 in Manhattan, but $6,556 in Rochester, N.Y.
If higher spending resulted in better care, this data would suggest that we need to spend more. But higher spending regions don’t provide better care. Ten years of research has shown that lower spending regions of the U.S. achieve equal or better health outcomes and quality.
(Photo: Doug Mills/The New York Times) President Obama delivered his first address to a joint session of Congress.
The higher spending — and much of the growth in spending — is due to the provision of unneeded and sometimes harmful care: hospitalizations that could have been avoided with better primary care; frivolous specialist consults; overuse of diagnostic tests. Unnecessary care can be harmful because hospitals are dangerous places to be, especially if you don’t need to be there. And having more physicians involved in your care makes it harder to know who is responsible: too many cooks can spoil the soup.
Aligning those varying costs with better health results will take time. The stimulus package, which includes nearly $20 billion to invest in electronic health records, new research programs, and preventive care, will help — especially if the standards for electronic health records are linked to a requirement that all providers within a region adopt them.
President Obama, at least in the speech, was silent on some central issues: whether he would foster the development of a more integrated and organized delivery system, whether he would modify the payment system to encourage improved quality and lower costs, and whether reform will contain performance measures to reassure the public that lower costs are compatible with high quality care. He will have to answer those questions soon.
Kevin Pho, a primary care physician in Nashua, N.H. blogs at KevinMD.com.
With the number of the uninsured having risen to 48 million Americans, clearly the need for reform is dire. But President Obama made no mention of who exactly will take care of these patients, even if they get insurance under a successful health reform initiative.
As a primary care physician in southern New Hampshire, I’ve been able to observe a universal coverage experiment, similar to what Congress is likely to consider, taking place in the neighboring Massachusetts.
Since that state’s universal coverage law took effect in 2006, its health care system has been inundated with almost half a million new patients. The demand for medical services has rapidly outpaced the supply of care physicians are able to provide care.
Universal coverage must go hand in hand with the training of more primary care providers — not only doctors, but also nurse practitioners and physician assistants who can provide excellent primary care.
In its most recent annual survey, the Massachusetts Medical Society found that the average wait time for a new patient to see a primary care doctor averaged 50 days. When you consider that this is a state with the highest density of physicians per capita nationally, it is frightening to think what the wait times would be in other parts of the country should universal coverage be enacted on a federal level.
When patients wait that long to see a physician, they inevitably find their way into the emergency department for care that ordinarily can be handled in an office setting. Doing so increases the cost of managing a routine issue up to ten-fold, and indeed, soaring utilization of emergency care has been an unanticipated consequence since reform was passed. In fact, patients who have obtained state-subsidized insurance visit the emergency department at a rate 14 percent higher than the average Massachusetts resident — evidence that lack of access to doctors is a big problem for newly insured patients.
The lesson here is that universal coverage must go hand in hand with the training of more primary care providers — not only doctors, but also nurse practitioners and physician assistants who can provide excellent primary care. According to the Association of American Medical Colleges, there will be a shortage of 46,000 generalist physicians by 2025, a deficit that not only will balloon under any universal care measure, but cannot be made up as both doctors and mid-level providers gravitate toward more lucrative specialty practices.
So, while any attempt at covering the millions of Americans without health insurance is a laudable goal, doing so without addressing a health care system ill-equipped to deal with millions more patients has the potential to make an already grim situation worse.
The better we do in treating cancer, the higher the costs. Prevention decreases the number of patients while the cost of caring for them increases.
There is a distressing irony in that in that statement: as progress has been made in managing cancer, the costs of caring for cancer patients has steadily risen. President Nixon declared a “war on cancer” in 1970, and that war has advanced on many fronts, but hardly any experts are projecting a near-term cure. Prevention efforts and public education have helped to reduce death rates from cancer (a 13 percent decline since 1990), but prevention appears more successful in improving the quality of life than in lowering costs.
In short, the better we do in treating cancer, the higher the costs. Prevention decreases the number of patients while the cost of caring for them increases. Can anything be done about such costs? More successful prevention can surely help. But we need to keep in mind the uncomfortable truth that those whose lives are saved from cancer will eventually die (possibly expensively) of some other disease. The health care system will not get off scot-free.
As for the costs of care, pressure can be put on the pharmaceutical and biotechnology industries to hold down the price of their products. Doctors can be paid less for their care of cancer patients. Efforts can be made to persuade physicians and their patients not to undertake expensive treatments with small benefits (or, more harshly, insurance coverage can be denied). The public will have to be convinced that it is not an attack on the value of life to say no to the kind of cure-driven medicine that has brought great benefits but also some nasty ethical dilemmas. President Obama will have his hands full in coming up with a plausible reform that takes account of those mischievous perversities of medical progress.
Karen Ignagni is president and chief executive of America’s Health Insurance Plans, a national association representing nearly 1,300 companies providing health insurance.
For the past hundred years, the country has tried and failed to reform health care. Ever since the false start on reform fifteen years ago, political insiders have cautioned against trying it again. But circumstances have changed and now, rather than mobilizing to oppose reform, a wide group of diverse stakeholders — employers, health plans, consumers, doctors and hospitals — is working together to help the nation get to yes.
We’ve learned that we can work together on important issues, like children’s health care, safety net improvement, privacy protection, mental health parity, and genetic nondiscrimination.
We agree that reform needs to address cost, access, and quality simultaneously. There is also broad consensus that we can’t afford to do nothing.
Our organization has put forward a comprehensive plan to bring all Americans into the system. Our proposal urges Congress to set a target of reducing the future growth in health care costs by 30 percent — which would save $500 billion over the next five years. And we support the creation of a public-private advisory group of respected health care experts to develop a policy road map for Congress.
Among the market reforms we would bring to the table is a proposal to guarantee coverage for people with pre-existing medical conditions, in conjunction with an enforceable mandate that individuals keep and maintain health care coverage. By working collaboratively with other stakeholders we can create a uniquely American combination of public and private initiatives that can pass and will work.
Last night in his address before Congress, President Obama talked about the spiraling cost of health care and how it is “one of the fastest-growing parts of our budget.” He emphasized that if we don’t root “out the waste, fraud and abuse” in our Medicare system, the spending on unnecessary and ineffective treatments “that don’t make our seniors any healthier” (but do make those who profit from the system wealthier), we will never bring down our budget deficit.
But greater efficiency will provide only part of the needed funding. I take the president’s emphasis on the deficit as a signal that he does not plan to finance healthcare reform with deficit spending. He leaves the problem of finding the rest of the money to Congress. As the Commonwealth Fund made clear in a report that it issued last week, universal coverage will almost certainly require tax increases.
Steven Findlay is a senior health care analyst with Consumers Union.
The challenge Obama and Congress face in hammering out health reform legislation centers on financing and timing. Health care spending today (government and non-government) is terribly structured, wasteful, and misappropriated. But that also means that if we do health reform right, we will not have to dig too deeply into the Treasury’s coffers to guarantee that every American has health insurance.
Indeed, it’s entirely feasible that within five to 10 years we can redeploy the projected money we will spend on health care — $2.5 trillion in 2009 rising to $3.1 trillion in 2013 — in ways that cover everyone and improve both access to care and quality of care.
How? There’s an emerging consensus that we must, first and foremost, change the way we pay for care delivered by doctors and hospitals and aggressively root out inappropriate and unnecessary care. There’s less consensus, to be sure, on exactly how to carry out those changes.
On timing, President Obama and Congress will face tough questions on how fast to expand coverage, modify payment systems, and require providers to address long-standing gaps in the quality and safety of care. With many interests at stake, compromises will be needed on these issues. But there should be no compromise on the goal of covering all Americans as quickly as possible, particularly as thousands of families are now losing their jobs and health insurance every week.
Elephant #1: Most medical spending occurs in the last 6-18 months of life and most is wasted. We’re all read horror stories of invasive tests administered to dying patients. Who’s going to deny extreme but useless end-of-life care?
Elephant #2: Fertility treatments. Sure, everyone has the right to try to have children. But when insurance pays, everyone’s premiums go up.
Elephant #3: Mental health care for the”worried well.” Once you’re functioning at a reasonable level but want “something more,” who should pay?
Countries with centralized single-payer systems don’t allow unlimited use. In fact, they can be quite restrictive. Maybe insurance companies should be, too.
I am a mathematician, not an economist, but I have spent some time looking at health care in this country and elsewhere. Forget about the immorality of the uninsured. Disregard the competitive disadvantage of our businesses. Look at health care as a business decision. Suppose you were the CEO of a soulless corporation and you wanted to evaluate some department, the IT department or the health care department. You would develop parameters to see how well the department is doing its job. For health care, these are called public health statistics. You would see how your department was doing in comparison with other similar companies. Then you would compare your cost with their cost.
This has all been done for our health care system. Obviously there is no one way to do this, but the result is so robust (as we mathematicians are wont to say) that it makes scant difference if you vary what countries you use or what public health statistics you use as long as you don’t do a Cato Institute type of analysis where you only look at people making over $10,000,000 a year. The most famous of these analyses was published in the New England J. of Medicine about 15 years ago, but has been brought up-to-date many times. (BTW you can check this and all other figures I use at //www.pnhp.org.) The author took 12 wealthy countries and the US and ranked them according to 16 public health statistics (life expectancy, infant mortality, etc.). The US ranked last or next to last in every category. No other country was anywhere near as bad. Yet, yet, we spend 2.5 times as much per patient as the average of the other countries. We spend 50% more than the Switzerland which is second in highest cost per patient. In another measure of how well we do, WHO ranks the US 37th in the world in health care. I think that’s above Slovenia, but below Costa Rica.
O.K. we spend much more money for much worse health care. What do the other countries do that we don’t. They have very different systems from pure socialized medicine to a national insurance scheme like Medicare. The one thing they have in common is that they are all single payer systems. There is one entity that makes the rules and does it in the interest of efficiency and helping people stay well and treating them when they are sick. Under our system, there are 1,500 different insurance plans with different rules and forms run by companies whose goal is not to be efficient or give good care, but simply to make money for their stockholders. If a complicated form cuts down on the money it has to give to physicians, and it can make more money even after processing the form, the company will adopt such a form even though it significantly increases costs overall by wasting the time of physicians. One of my doctors says her job is filling out forms. She gets paid depending on how well she fills them out. It’s a hard job because there are many different forms, and they are tricky and complicated, but she works hard and thinks she is pretty good at it. She also has a hobby which she loves–the practice of medicine. She would like to do much more of it and hopes if she makes enough money filling out forms, maybe she can practice more medicine.
A conservative estimate says we waste $200,000,000,000 (two hundred Billion) a year on physicians filling out forms that the single payer systems do not spend. Another $100,000,000 000 is wasted by the overhead of private insurance companies. This includes their processing of the unnecessary forms, fantastic executive compensation, and profit. The overhead for our private companies averages 15% (this may be low as it is several years old and the trend is up). The overhead for the public part of Medicare is 2% and the overhead for the entire Canadian system is 1.3%. I do not have the figures for how much we waste on high drug prices, but I do know that Big Pharma spends 11% a year on research, about 19% on profit, and 34% on marketing. We could cut drug prices by a third and not touch the amount spent on research. Here is a simple example that shows what is wrong.
Suppose you had $100 to give out to 10 people. You could give $10 to each person. Alternatively, you could decide to determine who really needs the money. You could develop a set of criteria, investigate to see who meets the criteria, and then give those the money. Say it costs you $50 to develop the rules and investigate, and suppose you decide to take $25 for your work in distributing the funds. Suppose you find only 5 are deserving. That would leave $25, so you could give $5 to each of your deserving folks. We spend much too much money denying medical care.
Perhaps you are going to trot out the horror stories about health care in other countries. It takes 400 years to get a hip replacement in Portugal or something. A lot of these stories are lies. Some are because of special conditions in some countries The real reason for the real problems is simply that other countries do not spend enough money. Can you imagine what our system would look like if we cut spending by 60%? There is, however, a more important point to be made. In spite of all their problems, the bottom line is that the other countries are getting much better results. We have already seen that.
What about choice? I am 70 years old and retired. During my career I had 5 HMO’s and 5 indemnity health plans. I have much more freedom of choice under Medicare than I had under any of the private insurance plans. I have no more referrals, no more in plan – out of plan nonsense. As for choice of insurance plan, why would anyone want choice if everyone had a plan that covered everything? In any case, you could still have private insurance for those who can afford it as most European countries still do.
Dr. Elliot fails to mention another contributing factor in overutilization of health care resources – the increasing ownership of diagnostic and treatment “infrastructure” (from MRIs and PET scans to specialized surgical centers) by the very physicians who receommend these expensive tests/treatments. In addition, our entire health care system is now geared toward maximizing revenue, rather than maximizing outcomes. It’s much easier to talk an administrator into purchasing expensive new technologies based on revenue streams than based on medical outcomes – and this is equally true in the not-for-profit health systems. Incentives for care need to change, which will require an all-around overhaul of the way healthcare is structured in this country. Given the political clout of medical specialists and hospital systems, it will be a very difficult thing to pull off.
I am always surprised to see the cost of medical education in the US omitted from any conversation on healthcare reform. Of course we need more doctors, but is it right to ask 20-somethings to take on the $250,000+ debt of a medical education, often after a very expensive four year undergraduate degree, and with little guarantee of a salary substantial enough to repay the debt?
Medical education costs need to be streamlined and subsidized by the government if any progress on healthcare is to be made. While the four year liberal arts degree is noble in theory, with the cost of education as it currently stands, it is also a luxury for many doctors in waiting, many who have been certain of their career path from a very young age. Why add a further $50,000 – $150,000 of undergraduate education costs?
In the UK, medical education starts after high school and is paid for by the government. In return, fledgling doctors commit to a few years of training with the national health service on a modest but sizeable salary that far exceeds medical residents’ pay in the US. Many choose to stay on with the NHS as GP’s. The result? An entire nation receives decent, primary healthcare at an affordable price, and young doctors are not saddled with mountains of debt.
There are 7 essential components to this system, which counter-balance each other. Please be patient as you read each one, and then see how the system as a whole works.
1) It uses a high-deductible approach to encourage patients to be value conscious, and to use their first-dollar purchasing power to exert some pressure on providers to be cost sensitive.
2) It uses an intermediary mechanism to enable each patient to pay their deductible and premium based on their means to pay; consumers pay the intermediary mechanism, and the intermediary mechanism then pays the insurance companies and the providers.
3) It keeps insurance companies and providers from “cherry picking” wealthier patients, because they only get paid, by the intermediary mechanism, a price that reflects the national average; at the same time, using this per-capita pricing mechanism, each insurer and provider is free to charge what they want for their insurance products and services. For insurers, both the high-deductible amount and the corresponding premium are priced in terms of a “days wages” for the individual consumer — but the insurance company gets paid the same amount from each consumer based on what the national average “days wages” is. For providers, (doctors, hospitals), etc.. — they too specify their prices in terms of “days wages” — and get paid directly for services that are below a deductible, or by the patients insurance company if they are above the deductible.
4) Insurance companies also provide payment to providers for a patient’s costs that exceed the high-deductible; this helps insurance companies focus on the complex high-cost cases that are too complicated for patients to manage on their own. Thus, the insurance company becomes an advocate for the patient to have providers keep the costs of complex (beyond deductible) care down.
5) The system is also fair across all income levels, because it is linked to a tax-free Health Savings Account, into which consumers can put in about 20 percent of their pre-tax income, and it can accrue in the account tax-free, like an IRA; it can ultimately be rolled over into extended-care living expenses, or into one’s estate, tax free. This encourages everyone to use health services prudently, even at the end of life.
6) It is a relatively incremental approach — all of the existing structures and players remain in place, doing what they do best. It makes it possible to require all insurance companies to accept patients without denying coverage for pre-existing conditions. It can replace employer-paid insurance, which gives patients more flexibility to move and seek better jobs without fear of losing their coverage.
7) It can be automated: a simple Health Card and Account Number is used to pay under-deductible expenses at the point-of-care, and premiums. The apparatus then converts the “days’ wages” stated price, and converts it to what that patient’s corresponding actual amount would be; the apparatus then automatically takes that amount from the patient’s Health Savings Account and pays and Intermediary Central Account; the apparatus then pays the insurance company or provider the price for the service/premium that the insurance/provider had already freely posted as their price for the service/premium, defined as the ‘days’ wages” of the national average income. By being automated in this way, a lot of administrative overhead expenses that are now in insurance and government health care would be eliminated.
Altogether, what MBHCC accomplishes is empowering patients to use their choice-power to drive medical efficiencies and value — but it does so in a way that remains equitable across all income levels.
>Coverage is universal, undeniable, and portable.
>Encourages preventative care and healthier life-styles.
>Providers/Insurance Companies remain free to run their business and price their services and products as they see fit — assured to get paid — but get paid based on what the national average income is.
>Uses patient’s value choices to optimize pricing and supply of health care services.
>Equitable across all income levels.
>Provides a means for a person who lives a healthier life-style, and/or makes a choice to forego expensive and often futile end-of-life care, to have that saved money go to advanced age supportive care expenses and to one’s heirs.
all pipedreams. we have guaranteed cradle to grave medical care for every complaint to everyone forever. We cannot afford it. I predict the government will take over to prevent healthcare from devouring the rest of the economy. A line will be drawn in the sand by fiat limiting health care expenditures to a fixed percentage of GNP. After that, it is up to the stakeholders to design the best system with the resources they are limited to. Sound grim? It’s better than living in a society where healthcare takes 30% of GDP and the bridges all fall down.
here is an idea for fixing the health care: appoint Paul Krugman to the health care department. We need for that job an economist with experience in health care problems. No doctors or insiders for that job. The Kansas lady would be a disaster. It is time for Obama to let go with his pals and paybacks.
What no one here has addressed are the gross inefficiencies and inconsistencies in the administration of medical care. The cost of miscoded, reprocessed and rejected claims over minor technicalities that should be able to be rapidly addressed.
The insurers themselves are the ones most perfidiously responsible in this matter, as there is no accountability, and no consistent standards of enforcement regarding their perfomance in delivery of services.
There are no incentives to get the claims right the first time, and the focus is on finding reasons to deny claims, when the focus should be on how do we facilitate getting claims processed and paid quickly?
Inefficient healthcare admiistration, and healthcare insurers and pharmaceutical companies need to be held to a higher ethical standard that brings them in line with the physician’s hippocratic oath (with enforceable and significant legal consequences for failure to comply), i.e., to “heal the sick” and to “do no harm”.
Insurance is supposed to be about distributed risk management, but medical insurers refuse to take any risks. They would rather have nothing but strong, young healthy people to cover. Then they could keep premiums low, because they’d be paying out very little in benefits. With this model, who even needs health insurance, if their implicit purpose is to conspire on how not to pay or provide coverage in order to maximize their revenues?
This is the beginning of our publicly recognizing the increases in trained healthcare providers that must accompany both the improvement and the enlargement of our health systems to adequately cover all Americans.
Along with more health care employees, additional infrastructure will be needed, including some re-deployment from over served areas to underserved locations.
The only problem with the current system is cost. Quality is important, but isn’t the problem. The problem is hospitals charge too much. Thats it. They’re accountable to no one. Why should scoping a knee cost as much as a new car? Attorney’s fees? Come on. Hospitals charge that much becasue they can. I hate to say it but everybody (citizens, tourists, guests) deserves Part A coverage. The rest should remain private/competitive. Carries are set up to provide coverage so lets use them. Start an enrollment process tomorrow, they pay the premium, but its a tax credit (their refund is bigger. Stimulus!).
How do we pay for this? Federal Sales tax. We’re all busy so lets keep it simple.
Why don’t you look at all the other nations that already have national health care systems, and ask what we need to do to improve on all these model systems???
3. Eliminate medical records except for original clinical entries provided in a plain paper bound book maintained by the patient – cost to provide computerized medical records to about everyone to everyone about 18% of the health care dollar.
4. Provide up to 70% of the remaining health care dollar (total savings of which is about 82%) to all other health care providers to provide all health care to everyone.
5 Give the remaining 30% left over to the government to be applied to tax breaks for those who earn less than $49,000.00 per year.
6 Freely charge for prescriptions if people want them when they are not required for health care.
Freely charge for the second and other copies of medical records provided for any one other than the patient, but require that only the patient maintains the original.
Freely provide health insurance as long as it is not accepted by providers for required medical services pad by number 4 above.
This is a plan that will work. It is available in almost all other countries than the US today.
That we require, that those with no insurance coverage, or no ability to pay for care, to enter our health care system, through it’s most expensive delivery area (the emergency room) is absurd.
Doctors as a rule don’t order unnecessary care unless they have a profit motive (such as avoiding malpractice, or billing for tests from machines they own or lease). Take away incentives to overbill, cut out the middle-men insurance companies and the army of workers that deal with billing on both sides, and things will take care of themselves.
The mandatory first step to “fixing” healthcare in the United States is finding out what the expenses are for everyone who is part of the industry. It’s a bit frustrating to see how much is spent yet I can’t find anyone who is “making money”. I become wary of doctors complaining about low reimbursement schedules and then denying care because they “can’t afford to see the patient” because the fee doesn’t cover their three houses, six cars, vacations to Fiji, skiing trips to Courchevel (and don’t forget the alimony payments to the first two wives…) twice per year all while they “work” three days a week.
Is there any analysis going on about how much time health care providers are spending doing paperwork and meeting requirements for insurance providers? Also, what about division of labor- can some functions performed by doctors and nurses be done by specialists who require less formal education and work at cheaper prices? I would be willing to spend less money seeing someone who wasn’t a doctor but skilled at what they were doing.
Why do none of these experts mention nationalizing some or all of the the health care industry? It works quite well in Canada, Britain, France, etc. They have universal coverage, well-paid doctors, healthy citizens. US healthcare appears insane and unethical by comparison.
The emphasis of these experts is mainly “rooting out” waste and unnecessary care. That’s like John McCain planning to balance the budget by eliminating earmarks — patently absurd. Removing instead the entire administrative cost of the health insurance industry would go much further.
I agree with author Michael Pollan and others: we need a department of food. Obesity, heart disease, diabetes and other chronic conditions would substantially lessen if we ate more locally grown food and fresh vegetables, and less refined carbohydrates. Exercise is preventive, as well as strong social networks.
I am surprised that the Times did not include comments from “experts” regarding the central issue of health care reform: getting the insurance companies out of health care. Many public opinion polls and studies of the views of experts show that there is a growing consensus that health care costs will never be lowered while maintaining quality unless we get rid of the duplicative administrative, management, advertising, and facility costs that come with health insurance and for-profit health care. Add the profit that these businesses make and the problem takes on a strong moral element – why are taxpayers going to subsidize more cost containment for profit-making entities?
Unnecessary care is easy to define, especially if you’re a cynic. It is care for other people and their families, right? Extreme or end of life care is known to be the costliest — Joe Califano wrote that in the 80s — but who among us is willing to acknowledge that extending a guaranteed-to-end life in its very late stages is excessive for a loved one?
Won’t anyone step up to say eliminating insurance overload — where there were once 65 payers there are now over 1300 — would save money, too?
With the HIPAA system in place to provide the required framework under which physicians and payers communicate, who needs so many payers?
Only the management of those companies. Just how many CFOs of payers are needed? Clearly, a few top-level executives could easily find the economies of scale that they always seek at the claims processor level.
As a family practice physician actively exploring a new career outside of medicine I feel that all these solutions talk around a basic societal problem. People want healthcare that is good and cheap. It can be either good or cheap but not both. The true value of any good or service is what people will pay for it, not what they say they will pay. everyone says that their childs health is “priceless” but I have seen many double takes at the price of an MRI or CT and deferrals of such tests. Maybe their “frivolous” but a jury would not think so if a rare brain tumor was missed. The shift needs to be made in a society that does not blink an eye at the annual national carnage on the nations highways of 30,000 deaths a year yet becomes outraged if a patient is dropped off on the curb in skid row and then does not even notice when the offending hospital is closed down. Finally my college classmates who went into finance are making ten times what I make. That finally has sunk in to what my true worth is to society as a physician. It is one tenth or less that of a Wall Street banker. We value money more than health, and until the actual monetary discrepancy is reversed (not the usual clicking of tongues and the rote “That isn’t right” offered as an insincere palliative) it cannot be said that we value health in this country at all. Money talks, everything else can walk.
These experts really don”t say anything specific, much as a cable show host. As a business owner you have to eliminate pre-existing conditions for a start and have some sort of program available for part time workers that don’t meet the hourly coverage threshold. I have two employees I pay premiums for but they can’t get treatment for 1 year as a penalty for their pre-existing condition. This is ridiculous. You try and do the right thing and get penalized by insurance companies. Try not asking “experts” about how to cure the system. Ask regular people what the needs are, from business owners to the intake nurse at an emergency room and see what information you get for a change. That is the disconnect between the government and the media and the people experiencing the problems. Experts don’t have health care problems. We do.
I was eager to read this post on this critical topic, but am disappointed in the result.
Health care costs more in Los Angeles than in Tennessee? So does a hamburger, a home, electricity. Your point?
> Much of health care costs go to insurance companies’ unnecessary bureaucracy. The percentage of premiums they pay back in benefits is dropping consistently and is perhaps near only 50%. If the plan is to keep insurance companies in the loop, we’re prioritizing the overhead of what are actually stock mutual funds over health care. How can that ever work?
> Rationing Health Care. It looks from Peter Ostertag ex OMB that the Real Obama health care plan is to prevent people deemed to not be “worth” expensive care from getting it (MBA speak: cost-benefit analysis) Need open heart surgery? Better not be too old to be worth it. What you deem “unnecessary” care might save my life.
> Doctors and nurses in the U.S. are paid more than their peers elsewhere, yet we hear that no one wants to be a GP. Why, if we’re paying far more than other countries can’t we produce more, better health care providers? Does the entire medical school hegemony need to be blown up?
> Big Pharma. Why do Americans continue to pay the highest drug costs in the world and why are drug companies allowed to force pharmacies and doctors to charge far more to uninsured patients? Is paying the CEO of a health insurance company $46 Million a big part of the problem?
> Accountability. Life expectancy in the U.S. is now shorter than that in most developed countries. Can we expect a medical system that is delivering inferior results to hold itself accountable? Are we “de-frocking” bad doctors? Closing insurance companies that force bad practices? We can’t have the same people in place doing the same things. If a sports team is losing you get new, better players. We need some new people IMHO. | 2019-04-25T14:37:12Z | https://roomfordebate.blogs.nytimes.com/2009/02/25/ideas-for-fixing-health-care/ |
MIT Sloan provides a 2-Year Full-time MBA program, Joint MBA programs, a 20-Months Executive MBA program and various executive certificate, PHD and Masters programs. Established in 1914, as Course 15 in the MIT Department of Economics and Statistics, MIT Sloan School of Management has come a long way establishing itself as a pioneer in Executive MBA program. MIT Sloan is among the few Business Schools that have put emphasis on Tech Entrepreneurship. The Sloan SOM sponsors the famous MIT $100K Entrepreneurship Competition.
MIT MBA programs is a combination of case studies, team projects, lectures, case discussions, interaction with industry leaders and hands on training. The combination of these key features will provide MBA students with Business Skills and real world experience.
MIT Sloan's MBA curriculum starts with the core courses in first semester. It is among the toughest courses in the MBA program. MIT Sloan is known for its academic rigour. In its graduate programs including the MBA program, students with less than 4.0(on a five point scale) or "B" average is not allowed to graduate. After the first semester, students are given the freedom to customize their courses according to their goals. The courses offered in MIT Sloan MBA programs have a high focus on analytic skills, problem solving and leadership.
The HKUST MBA program is a 16-month full-time MBA program focused on Chinese markets and develops skills necessary to work in a global Business environment. The three focus areas of the program are Creativity, Analytical Thinking and Teamwork. Students who have considerable work experience and international exposure can choose the 12-month accelerated MBA program. The advantage of 16-month program is the inclusion of Internship during summer (first year) and the option to be part of the exchange program during fall (second year).
The Functional Cores include the following courses: Corporate Finance, Information and Technology Management, Management of Organization, Marketing Strategy and Policy and Operations Management.
The Integrated Cores include the following courses: Doing Business in China, Responsible Leadership and Ethics and Strategic Management.
HKSUT Full-time MBA Electives: HKSUT MBA students can chose electives according to their post-MBA goals and needs. Over 70 electives are provided in the HKUST MBA program. Also, students can choose 5 career tracks: General Management in China, Entrepreneurship and Family Business, Finance, Consulting and Strategic Management, and Marketing.
The Lisbon MBA International is a Full-time degree in business administration framed in an international environment with a focus on both the academic component and interpersonal competencies that develop strong leaders. Brought to you by the two top Portuguese universities – Católica and Nova – in partnership with the prestigious MIT Sloan School of Management, The Lisbon MBA International prepares you to face the unexpected challenges of leading a top organization and to drive new trends in international business.
That’s what’s at the heart of The Lisbon MBA International Program.
3 World-Class Institutions: The Lisbon MBA International Program is a collaboration between the , Universidade Nova de Lisboa and MIT’s Sloan School of Management. This partnership ensures that you will receive the highest level of academic expertise.
Located in New York City(Greenwich Village campus), NYU Stern School of Business was established in 1900 as the NYU School of Commerce, Accounts and Finance. According to Sep 2011 enrollment data, NYU Stern has over 784 students enrolled for Full-time MBA, 2073 for part-time MBA, 190 for the Executive MBA Program and 133 for the Trium Global Executive MBA program.
Academic excellence is a high priority for NYU Stern with its faculty comprising experts in areas like Entertainment & Media, Luxury & Retail and Social Enterprise. Being located in New York City, the Business Capital of the world, NYU Stern MBA graduates have access to real world Business learning. NYU Stern is famous for the strict adherence to the Stern Curve . According to stern's grading system, faculties can provide a maximum grade of "A" to 35% of the students, B to 40% and the remainder of the students will receive "C" or lower.
Courses Offered: NYU Stern offers a 24-Month Full-time , Part-time(2 Years Intensive to 3 Years), Executive(22 Months) and Dual Degrees MBA programs.
Stern MBA candidates are often recruited by Companies like Booz & Co, McKinsey, Deloitte, Unilever, L’Oreal, Johnson & Johnson, Goldman Sachs, JPMorgan, American Express, Citi and Disney. Stern programs are known to have a focus on Finance.
China Europe International Business School (CEIBS) MBA program is an 18-month full-time MBA program conducted in Shanghai. Established in 1994 through a partnership between the Chinese government and the European Union, CEIBS gives emphasis on developing communication skills, managerial skills and customizing the program according to student’s post-MBA goals.
The CEIBS MBA Core curriculum consists of a set of required courses that are designed to lay the foundation for developing managerial skills. The required courses are focussed on: Managerial Skills, Economics and Decision Sciences, and Marketing & Management.
The curriculum also has a strong china focus with courses like “China HR” and “‘China within the World”. Admitted candidates who are not well versed in Chinese are required to take the Chinese pre-MBA course. Each year, CEIBS also conducts an annual lecture series – China Discovery Week, a comprehensive lecture series about challenges and opportunities in Chinese markets.
Elective courses: Students can choose elective courses based on their focus on various concentrations. CEIBS offers concentrations in General Business Management or Finance/Marketing.
Interesting electives in Marketing: New Product Development & Marketing, Sales Force and Channel Management, Game Theory & Strategic Marketing and Services Marketing.
Business Fundamentals: The customized core curriculum allows UCLA MBA students to complete the essential courses according to their post-MBA goals. Students are guided to choose core courses based on their internship plan. If the student is interested in consulting/marketing, core courses required to build knowledge in the subject are chosen by the student.
IMD MBA is a 11-Month Full-time MBA program with focus on leadership and personal development. The program starts from January and ends in December. Before starting the core subjects, IMD offers a Pre-Program in accounting, finance and statistics.
The core areas covered in IMD MBA program are Accounting, Critical Thinking, Economics, Entrepreneurship, Finance, Global Political Economy, Innovation, Marketing, Organizational Behaviour, Production and Operations Management and Strategy.
Chicago Booth offers a two-year Full-time MBA program, Evening MBA and Weekend MBA and 21-month Executive MBA program in Chicago, London, and Singapore. The University Of Chicago Booth School Of Business was founded in 1898. The school is the second oldest school in the U.S. Chicago Booth has the finest set of facilities of any business school in the world with campuses in Chicago, London and Singapore. The four campuses are Charles M. Harper Center, Gleacher Center, Europe Campus - London and Asia Campus - Singapore.
Chicago Booth is a pioneer in many aspects of Business education. Booth is the first business school to have a Nobel laureate on its faculty (George Stigler, 1982); the first business school to have six Nobel Prize winners: Stigler; Merton Miller, 1990; Ronald Coase, 1991; Gary Becker, 1992; Robert Fogel, 1993; and Myron Scholes, 1997; the first to initiate a PhD program in business (1920); the first to offer an executive MBA degree program (1943); the first to establish a minority relations program (1964); the first and only U.S. business school with permanent campuses on three continents: Asia, Europe, and North America.
Chicago Booth provides the students with the option to choose the MBA experience. Students can choose MBA based on their experience, education and goals.
The flexible curriculum is divided into four sections: The Foundation Courses, The Functions, Management and Business Environment, Electives and Leadership Effectiveness and Development (LEAD).
economics, law, psychology, politics and international relations. Working at the interface of disciplines, faculty and researchers are mining rich new insights into issues such as the politics of global business, the rise of science entrepreneurship, the management of innovation, and the social and commercial impact of information systems and the Internet.
By collaborating actively with faculty from other disciplines, we are aiming to transcend the traditional functional divisions of a business school in order to reflect the complex realities of business and society in today’s global economy.
In 1957 Georges Doriot, founder of INSEAD, had an extraordinary vision – to set up a business school in Europe that would be international, independent, diverse, entrepreneurial and close to business.
INSEAD’s first MBA class in 1959 had 52 graduates. Today, they have more than 900 MBAs graduating each year in ceremonies which take place on their two campuses – one in Fontainebleau France and one in Singapore.
INSEAD also offers a part-time Executive MBA programme, Executive Education programmes, a world-class PhD programme, has an additional campus in Abu Dhabi, a research centre in Israel, an office in the USA and valued partnerships with Wharton, Kellogg, Tsinghua University and CEIBS.
INSEAD’s full time MBA Programme offers an accelerated 10-month MBA curriculum which develops successful, thoughtful leaders and entrepreneurs who create value for their organisations and their communities. Over 70 different are represented in the classroom each year, offering a rich multicultural experience.
The MBA programme runs in parallel both campuses (France and Singapore). The two campuses are equally diverse, both have world-class faculty in residence, and both offer MBA participants access to global career opportunities. In addition to being able to study on the INSEAD campuses in Singapore and Fontainebleau, participants also have the option to participate in an exchange with Wharton and Kellogg.
SDA Bocconi continues to be the leading Business School in Italy and the only Italian School to be featured in all important International rankings (Financial Times, Bloomberg BusinessWeek, The Economist, Forbes). SDA Bocconi School of Management was founded in 1971. With over 40 years of experience, Bocconi is a pioneer in Business Education both in Italy and in Europe. What differentiates Bocconi is their innovative approach to management education that has translated to a wide range of executive courses and masters programs for management students.
Location, Class Diversity & Network: SDA Bocconi is located in the heart of Milan – the intersection of industry, finance, arts, media and, above all, fashion. The location and strong network enable students to leverage the Bocconi brand to reach their post-MBA goals. SDA Bocconi further pushes this advantage with a global focus, diversity in class and gender diversity. The MBA Class brings some of the best minds from diverse backgrounds and exposes students to experiences from a wide range of industries. This is ensured by the school’s focus not to allow any industry to dominate the class.
Partnerships & Alumni Network: The quality of partnerships that SDA Bocconi has built over the years with key Business institutions in Italy and around the world, in addition to a global alumni network in some of the major cities in the world, allows students to network effectively for job search and career growth.
HEC Paris is one of Europe’s premier Business Schools. The school boasts of more Alumni in CEO position than any other Business Schools in Europe. 11 of the CAC40 (top 40 Businesses based on market capitalization in France) is headed by an HEC alumnus. Access to 50000 alumni worldwide might be an incentive for many HEC students but a major consideration for MBA aspirants while selecting HEC Paris over other top Business Schools is the proximity of the campus to La Défense - the epicenter of European Business with the highest concentration of MNC headquarters in the continent. HEC MBA students have earned the reputation as “connectors” with their ability to overcome communication and cultural barriers, implementing global strategies for International Businesses.
The 16-month MBA program provides students with the opportunity to interact with stakeholders and participants from different background. The 200-strong student body is made up of 85% International students. The class diversity is just one aspect. The course in itself offers several opportunities for international exposure through exchange programs and international projects.
In 2012, the curriculum was redesigned in partnership with Bain & Company, dividing the program into two phases: the Fundamental and the Customized Phase.
In 1957 the first steps were taken towards the creation of IESE, which was founded in 1958 in Barcelona as the graduate business school of the University of Navarra. Initially, the school offered an array of executive education programs for managers, at a time when the concept of executive education was scarcely known outside of the United States. The establishment of these programs, aimed mainly at experienced business leaders, constituted a landmark in the history of executive education in Europe. Since then, more than 32,000 people have taken part in such programs.
The school launched its MBA program in 1964, under the guidance of an advisory committee set up by Harvard Business School and IESE. It became the first two-year MBA program in Europe, drawing students from all over the world. The Harvard-IESE Committee continues to meet annually to discuss matters of mutual interest and relevance.
Harvard Full-time MBA is a 24-month program with the latest class enrolling 913 students in the Boston Campus. The full-time MBA is a residential program with a focus on hands-on experience through the Case Study Method and FIELD projects. By encouraging students to exercise their knowledge on real-world problems, Harvard Business Schools has created a learning environment that encourages Entrepreneurship and leadership. Even though the class size is huge compared to other top MBA programs, the school leadership has set up small learning groups of 80-90, to mimic the efficiency of lean teams.
The Harvard MBA Curriculum is divided into Year One Spring & Fall, and Year Two Spring & Fall schedules. During Year One Fall, HBS MBA students follow a common curriculum - Finance 1, Financial Reporting and Control, Marketing, Leadership and Organizational Behavior (LEAD), Technology and Operations Management, FIELD Foundation in Leadership and Field 2: Global Intelligence.
Finance 1 is the classic Finance course that teaches MBA students how organizations create value through informed Finance decisions.
Financial Reporting and Control familiarizes students with the vocabulary of accounting and teaches them to communicate in the language of accounting.
Over the past 40 years, Rotterdam School of Management, Erasmus University has firmly established its reputation as one of Europe’s leading business schools.
Long before ‘global’ became an important descriptor for business education, RSM’s students, faculty and staff were already reflecting the diversity of the globalising world.
Just like the Netherlands, one of the world's renowned international trading nations, RSM has continued to expand and internationalise, cementing its status as one of Europe’s most international and innovative business schools.
The Rotterdam School of Management, Erasmus University (RSM) is the graduate school of business at Erasmus University in the Netherlands. Consistently ranked among the top business schools in the world, the RSM is renowned for its international character and innovative approach. The RSM portfolio of programs include the International Full-Time MBA, Executive MBA (EMBA), Global Executive OneMBA, Master in Financial Management (MFM) programme and an extensive array of open-enrollment and tailor-made Executive Education programs.
Mihaylo full-time MBA program is a 16-month program with a focus on building leadership skills. The Mihaylo Leadership Academy will provide students with the skill required to be an effective leader. There would be an initial evaluation of the student that acts as the foundation for developing a customized leadership development program for each MBA student. The three critical leadership skills that are developed during the program are interpersonal skills, leadership, and decision-making capability. During the six weeks in the Academy, students will learn to manage change, resolve conflict, negotiate, communicate effectively, build teams and make effective decisions.
Some of the Core Courses include Financial Accounting, Microeconomic Perspectives for Managers, Operations Management, Legal & Ethical Environment of Business, Decision Models for Business & Economics, Marketing Management and Management of Information in the Corporate Environment.
Mihaylo MBA Students can choose from eleven concentrations that would enable them to achieve their short-term personal and professional goals. Concentrations include Accounting, Business Intelligence, Economics, Entrepreneurship, Finance, General, Information Systems, International Business, Management, Management Science and Marketing.
Founded by eminent business leaders, entrepreneurs and academicians from around the world, ISB enjoys the distinction of being the first Indian B-school to be ranked among the top 12 global business schools in the Annual MBA Rankings by Financial Times, London. The FT ranking is based on various parameters covering specifics like career progress of the graduates, diversity of experience, international alumni, idea generation and research.
The Indian School of Business (ISB) is a unique collaboration between some of the world's leading corporations including a number of Fortune 500 companies, the Kellogg Graduate School of Management at North Western University and the Wharton School at the University of Pennsylvania and the London Business School. As part of this association, faculty from Kellogg, Wharton and the LBS work closely with the ISB faculty in designing and delivering a world class programme.
The ISB offers a one-year, full time, residential postgraduate management programme for candidates, preferably with at least two years' full time work experience. The ISB assesses candidates on their leadership potential and academic accomplishments, aims to have diversity in the student body with international experience. To apply, students must take the GMAT and complete the application form online.
IE Business School was created in 1973 as a private initiative designed to offer postgraduate training programmes in the field of business administration and senior management. The last three decades have seen marked changes in the environment, circumstances, and different economic cycles, but IE Business School is still recognised for its entrepreneurial spirit and its commitment to innovation.
Located at the University Of New South Wales (UNSW) in the Eastern Suburbs of Sydney, the AGSM MBA has been one of Australia’s premier MBA programs for the past three decades. Established in 1977 by the University at the behest of the Australian Government, the AGSM MBA has produced many global leaders and 33 years since its foundation it is ranked amongst the top 40 MBA programs in the world.
In 2007, UNSW Vice-Chancellor, Professor Fred Hilmer, focused on pooling the complementary strengths of AGSM and UNSW’s Faculty of Commerce and Economics into an integrated comprehensive business school, which would leverage its capabilities across undergraduate programs, MBA programs, specialist masters degrees, executive education and research. AGSM MBA Programs are now delivered by the Australian School of Business. The recognised rigour and distinctiveness of these programs is a feature of the new Australian School of Business.
Mannheim Business School is one of Europe’s leading institutions for business education. Together with the University of Mannheim and its faculty of business administration, it offers a holistic program portfolio, ranging from undergraduate degrees to postgraduate studies.
Mannheim Business School was founded in 2005 and has steadily grown and expanded its program offerings. The Mannheim MBA, previously known as the European MBA, was initially offered in 2002 by the University of Mannheim. The ESSEC & MANNHEIM Executive MBA started in 2004 and is run in cooperation with ESSEC Business School in France. More recently Mannheim Business School established an alliance with the School of Economics and Management of Tongji University in Shanghai to create the MANNHEIM & TONGJI Executive MBA, which will begin its first class in 2011. Beside its MBA degrees, Mannheim Business School also has a diverse range of Open Enrollment Programs and creates Customized Programs for companies.
UCD Michael Smurfit Graduate Business School is Ireland’s leading business school and research centre. It offers a wide range of postgraduate business programmes that equip students to become the business leaders of the future. The School of Business at UCD was established in 1908. It became the first European university to offer a Master of Business Administration in 1964. UCD Smurfit has developed a reputation as a standard-bearer in business education, by providing full-time and part-time postgraduate programmes for graduates from both business and non-business backgrounds.
In 1991, the graduate school of business moved to the dedicated campus at Blackrock, with cutting edge facilities, including wired and wireless internet, spacious modern classrooms and the largest academic business library in the country. Professor Tom Begley was named Dean of the UCD School of Business in 2006. He has a PhD from Cornell and has taught in Singapore, Indonesia, France and the US. Prof Begley most recently held the Governor Hugh L. Carey Chair in Organisational Behaviour at UCD. UCD Smurfit boasts a 100-strong team of academics with qualifications from the worlds leading universities. This section allows students to view the profiles of the academic staff across six different subject areas; accountancy, banking & finance, industrial relation & human resource management, management, marketing & MIS.
ESADE is an independent nonprofit university institution, founded in 1958 in Barcelona by a group of entrepreneurs and Jesuit Society members. Since 1995, it has formed part of the Ramon Llull University.
ESADE is one of the founding members of the European Foundation for Management Development (EFMD) and the Community of European Management Schools (CEMS). ESADE is also a member of the American Assembly of Collegiate Schools of Business (AACSB), The Association of MBAs (AMBA), The Graduate Management Admission Council (GMAC), the Latin American Council of Business Schools (CLADEA) and numerous other academic and professional associations.
The Full Time programme can be completed in 12, 15 or 18 months, depending on the individual student’s needs. Students are able to adapt the programme to tie in with other obligations and can change the course length once started. There are two streams; English and Bilingual.
International Part Time MBA, taught through Spanish.
Founded in 1967, Aston Business School offered its first MBA programme in 1968. In 2006 it opened a new £22m extension including new study rooms and two new lecture theatres.
Aston Business School is committed to creating and transferring knowledge that enables, innovates and inspires. 60 years of pioneering research and teaching has made the school internationally renowned, whilst the warm community spirit has created a positive difference to the lives of its students, alumni, businesses and organisations.
The Aston MBA is designed for individuals who have already made their mark in business to reach their true potential, transforming them into influential business leaders on the international stage. Prospects, salaries and career progression can be drastically improved through a world-class teaching programme, underpinned by exceptional academic research and well-developed links across business and industry.
Ashridge is a leading international business school based in Hertfordshire, England. Founded in 1959, Ashridge works with individuals and organisations from around the world in its three core areas of executive education, research and consulting. It is consistently ranked as one of the world's leading business schools. Ashridge's activities and areas of expertise include open & tailored executive education programmes, MBA, MSc & Diploma qualifications, organisation consulting, applied research and online learning.
The Ashridge MBA has developed a reputation for accelerating careers and widening opportunities for its graduates. To be accepted on the Ashridge MBA, participants must have at least five years' experience in a management position, and this, along with the international mix and the use of live assignments and projects creates a dynamic and stimulating development environment.
The full time MBA is an accelerated learning experience, particularly suitable for people experiencing or anticipating a significant career transition and/or change in career direction. It is an opportunity to take a year out of work to invest in an international experience that will stretch your thinking and your horizons.
The Athens University of Economics and Business (AUEB) was founded in 1920. From 1999 onwards, the University developed even further and now it includes eight academic departments, offering 8 undergraduate degrees, 28 Master degrees and an equivalent number of Doctoral Programs. The MBA International Program was also founded in 1999.
The Full Time MBA International program is a world-class program particularly suited for the global, dynamically changing, and technology-driven business environment.
MBA International starts in September of every year. Preparatory courses are offered starting late August, for the 2 weeks prior to the normal program. Students who have to take the preparatory courses are notified upon admission. All coursework for the program is normally completed by mid-July of next year. The program is divided in 5 academic periods, each period consisting of 7 weeks of classes, followed by 1 week of exams. At the end of their coursework, students undertake their field study project, which normally lasts 3-4 months, and addresses a real business problem.
Located in the heart of Paris, our School brings together individuals with widely differing experiences and interests who share one goal: the pursuit of excellence. Students and professionals attending the ENPC School of International Management come from a broad range of backgrounds, including media and publishing, banking and financial services, art and design, engineering and manufacturing, high-tech and energy, hospitality and tourism, education and training, retailing and consulting services, as well as government and public administration. The aim of the School is to take you beyond technical proficiency to mastering the mental frameworks and analytical tools for lasting individual development and professional success.
Strathclyde Business School is internationally respected as one of the most innovative and largest business schools of its kind in Europe. It is Scotland’s premier business school, with over 200 academic staff and more than 3000 full time students, both undergraduate and postgraduate.SBS has a reputation for innovation in business and management education, and was the first school in the UK to offer a full time one year MBA programme in 1966, a part time MBA in 1976 and a distance learning MBA in 1983. SBS offered the first DBA (Doctor of Business Administration) in the UK, and pioneered the study of marketing.
Founded in 1947, Strathclyde Business School offers high quality business education and management development for both inexperienced graduates and senior managers. SBS has nine international centres where the MBA can be studied.
The full time MBA is studied over 12 months in Glasgow; the first nine months will be dominated by classes, group-work and personal development processes, while the last three months will be spent completing the MBA project.
Essec Global MBA is a 12-Month Full time MBA with September Intake in Paris and Singapore. The program focuses on developing critical thinking and creative problem solving skills.
As part of developing critical thinking, Essec has introduced a course - Critical Analytical Thinking, which runs through Term 1 and Term 2. Creative problem solving is another aspect that Essec MBA students develop during the course. Creativity and Decision Making under uncertain environment are two courses that build the foundation for Creative problem solving . Effective Communication skill is essential for overall personality development. Essec MBA has an interesting course - Written Analysis & Communication, which runs through Term 1 & Term 2 that helps students in that regard.
Copenhagen Business School (CBS) was founded in 1917 to meet the business sector demand for highly qualified people. Today, it is the leading business school in Northern Europe. CBS offers a comprehensive range of programs in business economics and modern languages for international business communication on bachelor’s, master’s and PhD level.
Internationally oriented, CBS maintains close partnerships with the business community and has exchange agreements with more than 300 universities and business schools worldwide. In addition to the AMBA and EQUIS accreditations, CBS is the Danish member of CEMS – Community of European Management Schools; which only accepts one university as member from each European country. Furthermore, CBS is also a member of PIM – Partnership in International Management – a corresponding international consortium of prestigious business schools.
Boston University Full-time MBA is a two-year MBA program designed for Global business. The students work in groups of 50, which would form the core study group for the course. The core study group works on assignments and projects and the classification of the class as groups will allow faculty to plan the learning experience, allowing cross-functional and coordinated assignments.
The Core Courses included in BU Full-time MBA are Financial Reporting and Control, Financial Management, Economics and Management Decisions, IT Strategies for a Networked Economy, Marketing Management, Managing Organizations and People, Creating Value Through Operations and Technology, Introduction to Business Law, Data Analysis for Managerial Decision-Making, Competition, Innovation, and Strategy, Executive Presentation, Executive Written Communication, Managing Career Growth, Career Management, Career Community, Career Community II and Career Community III.
The summer internship in BU full-time MBA program will allow students to network and develop skills essential for career search and in getting full-time job offers. First-year students are required to complete the career management course that supports the job search and internship opportunity.
BU offers field seminars in Brazil, India, Europe and Asia.
HEC Montreal’s Intensive 1 year Full-time MBA is divided into four phases. The Full-time MBA is structured into six-week sessions with over 600 hours of courses. The core curriculum covers the role of the manager and business fundamentals, Management of operational and strategic issues and corporate social and environmental responsibility.
HEC Montreal Full-time MBA specialization Tracks include Analysis of the Economic Environment, Corporate Finance, Energy Management , Entrepreneurship, Human Resources Management, Information Technology Management, International Business, Investment and Portfolio Management, Management, Marketing, Operations and Logistics Management and Project Management. The specialization tracks are part of phase 3 of the program.
As part of Experiential learning, HEC Montreal MBA provides students with the opportunity to implement what they have learned with five-week Business consulting project with organizations of various size and management challenges.
• Key Executive MBA – Designed for senior leaders. This program requires one weekend per month in residency on our campus for 20 months.
• Saturday MBA – Geared for mid- to senior-level managers, the Saturday MBA program meets each Saturday for 19 months.
• Professional MBA – This program is for working professionals at all levels within an organization. It is a truly multi-generational program, perfect for a multi-generational workforce.
Founded in 1885, Rollins is the oldest recognized college in the state of Florida. The Rollins College Crummer Graduate School of Business was founded in 1957 to prepare students to be both managers and leaders who will add significant value to their organizations and communities.
Imperial MBA is a 12-Month Full-time MBA program with a focus on Innovation, Entrepreneurship and Design. Before starting the course, Imperial MBA students are expected to complete three online refresher courses in Accounting Primer, Quantitative Methods Primer and Preparatory Maths Primer.
Imperial MBA students can take 8 core courses in Accounting Management Analysis, Business Economics, Economic Framework, Financial Management, Marketing Management, Organisational Behaviour, Quantitative Methods and Strategic Management. These courses are designed to develop the foundation necessary for acquiring skills in leadership and managerial roles.
The electives in Imperial MBA will allow students to specialise in their area of interest.
Around 25 electives are offered to the students: out of which 6 electives can be chosen. Some of the interesting electives are: Advanced Corporate Finance, Advanced Consulting Skills, Brand Management, Breakout Strategy, Designing and Innovating Services, Entrepreneurship in Renewable Energy, Hi-Tech Strategy, Strategies and Policies, Managing Negotiations and Pricing, Intellectual Property Valuation and Leadership.
What makes Imperial MBA unique is the inclusion of Innovation, Entrepreneurship and Design course (IE&D). The course gives students a first-hand experience of introducing a product/service in the market. For Entrepreneurial candidates, the IE&D is a great opportunity to evaluate their own ideas. There will be four mentoring workshops under the course. Each workshop will lead the students towards translating their idea into a viable product/service.
LUMS is a triple-accredited, world-ranked management school, consistently among the UK's top five. Since the University’s founding over 40 years ago, LUMS’ faculty and students have worked at the boundaries of knowledge and practice, challenging conventional wisdom and contributing to future best practice. The faculty is rated second to none in the UK, whilst our graduates are influential in every sector and every country around the world.
LUMS excels in developing individual and organisational potential through MBA programmes, executive education and high quality business research. LUMS understanding of how managers and leaders learn is at the core of all our work. It has underpinned our work on MBA programmes and with many leading global companies. Its distinctive Full-time MBA (FTMBA) and Executive MBA (EMBA) programmes help high-performing managers to develop into leaders who are confident, knowledgeable, critical and responsible in facing the challenges of an increasingly complex international world of business.
Ivey MBA is a 12-Month Full-time MBA program with a focus on developing Business Fundamentals and learning with cases & Business Simulation. The Business Fundamentals are covered in the core curriculum with the lecture series.
Before starting the core curriculum, students can optionally take three courses: Economics Primer, Finance & Accounting Primer and Quantitative Analysis Primer. These courses will allow students to acclimatize with the pace of the actual MBA program and refresh some of the basic Business concepts necessary for the MBA program.
The core curriculum starts with Business Essentials. The courses in the core curriculum are Accounting and Control for Managers, Decision Making with Analytics, Developing and Executing Strategies, Leading People and Organizations, Managing Operations, Marketing Products and Services, Leveraging Information Technology, Macroeconomics for Business Decisions and Communicating Effectively.
Haskayne Daytime MBA program is a full-time 20-month MBA program with a September intake. The program can be completed in 16 months. To complete Haskayne Full-time MBA successfully, students need to complete 20 courses (13 core courses and 7 electives).
The core courses essential for the MBA Foundation are in four focus areas: Finance and Accounting, People and Organization, Supply Chain Management and Management Studies. Students can choose from 10 electives namely Strategy, Operations Management, Marketing, Entrepreneurship, Business and Environment, Management Information Systems, Sustainable Development, Organizational Dynamics, Human Resources, Accounting and Finance. After completing the core curriculum, students can chose the electives based on their post-MBA interest in Global Energy Management and Sustainable Development, Entrepreneurship and Innovation, Finance, Marketing or Project Management.
Mentorship program: Haskayne MBA program provides students with the opportunity to partner with Business leaders in Calgary with the Mentorship program. This is also an opportunity for students to widen their network.
Calgary Advantage: Location of MBA program is crucial for post-MBA opportunities. According to Forbes Magazine, Calgary is one of the fastest growing cities in North America. It has the highest number of head offices in Canada and the highest income in the country. Calgary also has the highest employment rate in Canada and also ranks third in terms of diversity.
Tippie MBA is a 21-Month Full-time MBA program with a focus on leadership and experiential learning. What makes Tippie unique is the focus on completing the foundational courses in the first semester (16-week) itself. MBA students will be ready for their consulting projects and concentrations by second semester.
The Foundational courses in the fall semester are in Management in Organizations, Marketing Management, Business Analytics, Operations Management, Corporate Financial Reporting, Managerial Finance, Corporate Communications and Leadership, Ethics & Professionalism. Once the students have a firm grasp on the fundamentals, they can chose a specialization from Managing Customers, Products & Brands, Corporate Finance, Process and Operations Excellence, Strategic Management and Innovation and Investment Management. Students in addition to pursuing the electives according to specialization can also explore other interesting courses in Finance, Marketing, and Strategic Innovation.
Tippie MBA program redesigned its curriculum in 2009. Leadership development is integrated throughout the course. The Knapp Lecture Series is one such example where Tippe MBA students will get a chance to learn from Entrepreneurs, Nobel Laureates, CEOs of Fortune 500 companies, Creative thinkers and successful managers. Students will also have access to the University of Iowa Speaker series like the Sandage Entrepreneurial Speakers Series and the Pearson Lecture Series.
UBC MBA at Sauder School of Business is a 16 month Full-time MBA program provided in Canada. The core of the program is focused on five key personal development factors – Leadership, Decision Making, Creativity, Macro Economics and responsible Business practices.UBC MBA students are introduced to refresher courses that would solidify their understanding of key concepts like Quantitative Methods, Computers, Economics, Financial Accounting and Statistics. These are non-credit courses.
An interesting aspect of the UBC MBA is the Business Fundamentals module whose primary goal is to prepare students for live cases and project development skills. This module prepares students to keep pace with the MBA program. During fall term of second year, UBC MBA students can take part in International exchange programs with partner schools like Fisher College of Business, The Fuqua School of Business Melbourne Business School, Fundacao Getulio Vargas (FGV-EAESP), China Europe International Business School (CEIBS), The Hong Kong University of Science & Technology (HKUST), Indian Institute of Management Bangalore (IIMB), Keio University, Yonsei University , National University of Singapore - NUS Business School , EDHEC Business School , ESSEC Business School , WHU - Otto Beisheim Graduate School of Management , SDA Bocconi School of Management, Erasmus University - Rotterdam School of Management , ESADE Business School and Manchester Business School.
The EDHEC Global MBA is a 10-month full-time MBA program with focus on personal development and global experience. The program is structured into four areas: Management Science, Leadership Development, Applied Learning and Global Business Trips.
Management Science: covers fundamental courses which build the foundation for the MBA program. The courses include Advanced Corporate Financial Management, Consulting Methodologies, Criminal Risk Management, Data Analysis, Entrepreneurship, Finance, Financial & Management Accounting, Global Macroeconomics, Innovation Management, International Business Law, International Mergers & Acquisitions, Manager's Introduction to Information Technology, Managing People & Organisations, Managing the Internationalization of the Firm, Marketing Management, Microeconomics and Strategic Analysis & Business Modelling. After the students have completed the core courses, they can take one of the three specialization tracks: Global Finance Tracks, Global Leadership Track and Global Entrepreneurship Track.
The Global finance tracks provides courses in international corporate finance and financial economic. The track concludes with a week-long residential seminar in London. The Global leadership track is conducted in partnership with IBM. The track concludes with a week-long residential seminar in Singapore.
The Global Entrepreneurship track is for Entrepreneurial MBA candidates who want to start their own Business. The courses cover entrepreneurial finance and project financing, which is followed by a week at Stanford University's guesthouse in Silicon Valley.
UC David Daytime MBA program is based on IMPACT - Integrated Management Project and Articulation and Critical Thinking. With IMPACT, UC David MBA students develop their writing, speaking and critical-thinking capabilities. The core courses cover the fundamentals of management education: Accounting, Economics, Finance, Marketing, Operations, Organizational Behaviour, Statistics and Strategy.
An interesting part of the curriculum is that UC Davis has developed a systematic process to provide internship opportunities for all MBA students. The process starts with the fall Quarter, when students are involved in the Internship Search Plan, which is followed by Internship Interviews in Winter Quarter and finally in Spring Quarter, UC Davis MBA students prepare for the summer Internship. Regular MBA Career FAIR and Leadership Development sessions are also conducted in the first year.
Second Year starts with summer internships where MBA students can apply what they have learned in the first year of their program. Internship also provides MBA students with the opportunity to get a Job offer before second year courses begin. After the internship UC Davis MBA students are given the choice to complete their MBA program in General Management or choose concentrations like Business Analytics, Entrepreneurship, Innovation, Finance, Accounting, Marketing, Organizational Behaviour, Strategy and Technology Management. The concentration is implemented by a series of elective courses like International Finance, Corporate Social Responsibility, International Marketing, New Product Development, Business Law, Customer Relationship Management, Technology Competition & Strategy, Venture Capital & the Finance of Innovation.
Mays MBA Program at Texas A&M University is a 16-Month Full-time MBA program with a focus on one to one interaction and experiential learning. The program can be completed between August and December, spanning over 18 months.
The Curriculum is divided into terms. The Term 1 and Term 2 covers the MBA Fundamentals: Financial Accounting, Quantitative Analysis for Business Decisions, Microfoundations of Business Behavior, Marketing Management, Finance for the Professional, Managerial Macroeconomics and Operations Mangement. Term 3 focuses on Managing People in the organization. Term 4 covers Management Accounting and Control, Finance for the Professional and Corporate Strategy.
Term 4 ends with specialization courses where students can choose from Consulting and strategic management, E-commerce, Finance, Human resource management, Information technology and operations, Marketing and Real estate. In specialization course, students can choose from courses beyond Mays Business School. They can select from a vast array of graduate courses from Texas A&M University. Specialization courses provide a platform for students to develop skills that are necessary for post-MBA jobs.
According to BusinessWeek Biennial Ranking, Notre Dame MBA is ranked 24th in the world. The program has also earned an “A+” in the teaching and career services category. The Economist ranked the Notre Dame MBA 40th globally, 10th globally for “potential to network” and 2nd for "alumni effectiveness."
WHU MBA is a 15-Month full-time General MBA program. The program emphasizes courses that develop strategic leadership and entrepreneurial spirit in MBA students. Before the core courses in April, students can take part in the preparation courses in March that covers mathematics, statistics and German.
The core courses are divided into four modules: The Business Organization, Finance & Accounting, Business Economics and Value Chain Activities.
After the core courses, students can deepen the knowledge with concentration modules. WHU students can pick one of the following concentrations: Marketing & Sales, Advanced Finance & Accounting, Operations, Innovation & Entrepreneurship, Strategy & Organization and Personal Leadership.
Another interesting module is the International Management Module, where students will learn how to face challenges in International Management scenarios. This module allows students to participate and learn from management challenges in North America, China and India. The practical learning is provided by the faculty in WHU partner universities (Kellogg - USA, IIM Bangalore – India and CEIBS - China).
The WHU MBA program concludes with the thesis, which provides the opportunity for students to implement what they have learned with the 3-Month internship project.
The Cambridge MBA is a 12-Month Full-time MBA program. The curriculum is divided into core courses, electives, concentrations and consulting projects. Before the core courses Cambridge MBA are required to take part in the Orientation module where students will get an overview of the MBA program and learn about Microeconomics.
Core Courses: The core courses starts with the Foundation module during October to December. Some of the interesting courses are Appreciating Accounts, Corporate Finance, Market Analysis and Career Development Programme. With the Cambridge Venture Project, students will consult and provide solutions for start-up companies like Antenova or Hypertag. From Jan-March, students will learn the fundamentals of Management Education – Marketing, Operations Management, Strategy, Financial Management, Managing Innovation Strategically and Negotiation Skills.
Electives: Cambridge MBA can choose five electives from a wide range of subjects. Students can focus on subjects that can bring greater value in the post-MBA journey. Some of the elective courses are : Advanced Data Analysis for Management, Business Strategy & Management Consulting, Changing the Game: Business Models, Innovation & Strategy, Corporate Social Responsibility, Emerging Venture Opportunities, Entrepreneurship: How to Start a Company, Environment & Sustainability, Fundraising, Globalisation & International Business, International Film Business, Lean Six Sigma Process Improvement, Pharmaceuticals & Biotechnology, Real Estate, Strategic Brand Management, Supply Chain Strategy and topics in Investment Management.
Rollins Early Advantage MBA (EAMBA) is a full-time MBA program that can be completed in 16 or 21 months. Rollins EAMBA is divided into nine core courses, management concepts courses, elective courses, integrating course and International study component.
The Core courses include Management Analysis, Financial Accounting, Economics for Managers, Organizational Behaviour, Introduction to Strategy, Quantitative Business Analysis, Legal, Ethical, & Social Issues, Career Management and Leadership and Communication.
Rollins EAMBA program focuses on training MBA students for Global Opportunities. To prepare students for Global Business, Crummer Graduate School has introduced Global Research and Study Project, Global Consulting Projects, Global Sustainability: Business and the Environment, Business in Emerging Markets and International Exchange programs.
The wide range of International projects makes Rollins Early Advantage MBA program a truly unique program. Students participating in International Exchange program have the option to either choose EM Lyon in France or East China University of Science and Technology in Shanghai for their program. The Exchange program lasts for four weeks. The internship immediately follows the Exchange program.
The 12 Month SFU Full-time MBA program at Beedie School of Business, Simon Fraser University is focused on strategic management and working as a leader/contributor. The curriculum packs in the equivalent of 18-24 months of traditional MBA program by cutting out the breaks between terms, normally seen in 2 year programs.
The SFU MBA program starts with the Fall Semester, when students develop the Fundamentals of Business Education - Professional Decision Making: Ethical and Analytical Perspectives, Managerial Economics, Managing People, Finance and Accounting. The Summer Semester builds on the foundational knowledge with courses like Marketing, MIS, Negotiation, Leadership and Groups, Managing Global Enterprises and Managing a Globalized Workforce.
After the Summer Semester, SFU MBA students can opt for an International Study Trip (optional), which provides them with the skills required to work in a globalized work environment. After the study trip students should complete the Summer Semester with courses in Sustainability, Entrepreneurship, Innovation and Creativity in Business and Business Strategy. Finally students are required to complete 2-8 months internship in Business Development & Sales Forecasting, Corporate Finance and Financial Analysis, Corporate Social Responsibility & Sustainability, Information Technology Management, Market Research and Competitive Intelligence, Marketing and Brand Management or Project Management & Analysis.
Queen’s MBA is a 12-Month Full-time MBA program provided in Kingston, Canada. The program has a focus on teamwork, personal coaching and experiential learning. Queen’s Full-time MBA program starts with three refresher courses: Accounting, Finance and Statistics. These are not-for-credit optional courses conducted as a one day session.
Some of the interesting courses in the core curriculum are: Leadership, Negotiation and Conflict Management, Acquisition & Analysis of Information for Management, Management Accounting, Finance Fundamentals, Corporate and Marketing Strategy, Managing Information Technology, Finance Strategy, International Business, Corporate Social Responsibility, Strategic Implementation and Change, Organizational Behaviour, Innovation and Entrepreneurship, Capstone Simulation and Consulting & Project Management.
As part of the core curriculum Queen’s MBA students are divided into teams. The team members will work together on projects, presentations and other activities. The teams consist of 6-7 member students, carefully constituted to maximize diversity and experience. Each team is assigned with a personal coach, who monitors the performance of each group and provides constant feedback essential for their performance.
Foster MBA program focuses on strategic thinking, leadership, and global business. The Year one of the Foster Full-time MBA curriculum starts with the development of Business fundamentals covering topics like accounting, finance, marketing, operations management, and strategy and an understanding on how each topic are interrelated. Some of the courses covered in the first year of the program include Financial Reporting and Analysis, Corporate Finance, Leadership Development & Building Effective Teams, Marketing Strategy, Business Consulting Project, Leading Teams and Organizations and Competitive Strategy.
The Second year focuses on the MBA students goals. Students are given the flexibility to choose from 12 electives that include subjects like Entrepreneurship, Finance, Marketing and International Business to name a few. Courses in ethics and macroeconomics are mandatory for the Second Year student.
A unique feature of the Foster Full-time MBA program is the mentorship program offered under the guidance of top executives. The MBA Mentor program is in partnership with Seattle's leading Businesses. First year students typically attend two on-site sessions (ranging 2-3 hours) while second year students attend up to 4 sessions throughout the academic year. This provides students with an opportunity to work with senior level executives and gain exposure to various industries.
Thunderbird Full-time MBA has a Global focus. The core courses include accounting, finance, marketing, management and international studies, while the foundation course last 1 week. The foundation course is mandatory for all entering students and covers key aspects of leadership, team building, motivation, ethics and cross-cultural communication. Thunderbird MBA also introduces students to Career Management Seminars, Industry Experience and Global Experience (two-week course in Latin America, Europe or US).
Hult One Year Full-time MBA is a 12-Month MBA program that you can complete in five campuses (Boston, Dubai, London, San Francisco and Shanghai) with the Global Campus Rotation program. The Curriculum also referred to as LEAP (Learn, Experience and Action Projects) incorporates experiential learning.
Hult MBA Curriculum is divided into six parts – Foundation, Fundamental, Advancement, Mastery, Global Application and Action Learning.
2) Fundamentals: Focus on developing Financial and Analytical knowledge required for effective managers. Courses include Financial Management, International Accounting, International Marketing, Managerial Economics and Lifetime Career Management.
3) Advancement: This module has a focus on Strategy and Global Business management. Courses include Corporate Finance, Strategy, Operations, Global Management and Lifetime Career Management.
Georgetown’s two year Full-time MBA at McDonough School of Business starts with the core courses that provides students with the functional knowledge that acts as the foundation for their MBA program. The First year MBA curriculum include courses like Financial Accounting, Organizational Behaviour, Applied Business Statistics, Microeconomics Management Communication, Professional & Career Development, Managerial Accounting, Marketing, Financial Markets Strategic Management, Management Communication, Professional & Career Development, Corporate Finance , Management Science, Operations Management, Leadership and Business Ethics I and International Business Environment.
The Second Year in McDonough’s Full-time MBA focuses on developing the leadership skills required for managing Businesses and organizations. Some of the interesting electives in the second year program include : Cases in Financial Statement Analysis, Corporate Restructuring, Option-Based Position Trading, Real Estate Finance I & II, Venture Capital, Leading Organizational Change, Managing Organizational Change, Sports Leadership, Operations Strategy Project Management, Applied Decision Theory, Advanced Competitive Strategy, Entrepreneurship, Ethical Management/White Collar Crime, Global Strategy and Leading Management Consulting Firm.
The biggest bonus for Auburn MBA program is the Graduate assistantship. Student with strong Academic background and a GMAT Score of 620 and above are offered with assistantship that includes a full tuition waiver scholarship and monthly stipend. Unlike other MBA programs, the weekend starts on Thursday evenings, with very few graduate-level classes conducted on Fridays.
Smith’s 21 Month MBA program focuses on hands-on learning. The core courses in the curriculum include Introduction to Financial Accounting, Managerial Accounting, Data Models and Decisions, Technology Selective, Managerial Economics and Public Policy, Leadership and Teamwork, Strategic Management, Operations Management, Financial Management and Marketing Management.
Smith MBA’s Hands-on experience is further supported with MBA Consulting Program (a team-based consulting engagement), Mayer Fund (gain real experience in securities analysis and portfolio management), New Markets Growth Fund (learn to identify potential investment opportunities), The Dingman Center for Entrepreneurship (Get mentoring and networking opportunities with Entrepreneurs and Venture Capitalists. Learn to identify Business Opportunities) and Netcentricity Laboratories (practical aspects of supply chain management, financial trading and e-commerce).
The Full-time MBA at Melbourne Business School can be completed in 16 or 20 months. The curriculum is divided into ten mandatory and ten elective courses. There are two intakes for the program: one in September and another one in January. Students are required to complete 750 hours of class.
Before the program start, students are required to attend the two week orientation program in Melbourne Business School. To implement the experiential learning process, students are required to spend up to six hours every week on field studies, apart from the time spent on lectures.
The first two terms of the program covers the core curriculum: The World of Management (intensive one week training to develop managerial skills), Financial Accounting ( learn to manage costs and make business decisions based on Financial information), Managing People (learn what motivates people and how to manage people effectively) , Marketing (learn how to implement successful marketing program), Data and Decisions (learn how to use statistics, graphs and probability for decision making), Managerial Economics (introduction to concepts in economics that are crucial for managerial and strategic decision making), Economics and Public Policy (learn how Government policies impact organization and how to deal with it), Managing Processes(learn to create process that are effective in managing resources), Financial Management (introduction to corporate finance), Business Strategy(learn the basics of strategic management).
The University of Tampa’s Full-time MBA program can be completed in just 12 months. The program is designed for accelerated completion with 8 to 16 hours per semester. The course has a foundational requirement that covers topics like Developing Software Competencies, Essentials of Accounting and Finance, Foundational Economics for Managers, Statistics for Decision Makers, Foundations of Marketing and Foundations of Management. The courses under Foundational requirement can be waived depending on the applicants background and course work.
The Foundational course is followed by the Leadership course – Leading for Performance, which immediately follows the orientation. The core curriculum covers topics like Accounting and Value Creation, Financial Management and Strategy, The Economics of Organizations, Information Systems and Operations Management, Marketing Management, Strategic Management and Professional Development Practicum.
The University of Tampa MBA can select electives from Decision Modelling and Analysis, Business Analytics and Business Research Methods. The Full-time MBA students will also have the option to select concentrations like Entrepreneurship, Finance, Information System Management, Innovation Management, International Business, Marketing and Non-Profit Management.
The 22-Month Olin Full-time MBA focuses on developing critical thinking and leadership skills. The biggest differentiating factor for Olin Full-time MBA is the number of elective courses offered to students. Nearly two-thirds of the courses (66 credit hours) offered are from electives. This allows MBA students to plan their curriculum according to their post-MBA goals.
The Core Courses include Financial Accounting, Strategic Cost Analysis, Financial Management, Strategic Management, Introduction to Management and Strategy, Critical Thinking and Impactful Communication, Fundamentals of Statistics, Managerial Economics, Managerial Statistics, Marketing Management, Foundations for Leadership Effectiveness, Leadership Development Workshop and Operations Management.
Olin Full-time MBA also provides access to Centre for Experiential Learning (CEL) that bring together students with entrepreneurs, non-profits and corporations, allowing students to provide consulting services for organizations. Students are also given the opportunity to work on The Taylor Community Consulting program that involves spending six weeks helping organizations reach their short-term goals. MBA students also explore challenges and opportunities in setting up Business in countries like China, Peru, Colombia and United Arab Emirates, with Global Management Studies.
Merage Full-time MBA Curriculum covers the Business Fundamentals - Accounting, finance, marketing, operations and strategy but focuses on three areas: Strategic Innovation, Information Technology and Analytic Decision Making. Strategic Innovation allows students to recognize change and innovate accordingly. Information Technology allows students to use IT as a tool for being a better Manager. The ability to make decision when you are bombarded with data is a critical skill for Managers and Leaders. With Analytic Decision Making students develop skills that are essential for making sound Business decisions.
Merage Full-time MBA starts with a Boot camp followed by core courses that build the foundation for the MBA course. What makes Merage unique is the focus on choosing career path right from the start of the program. Students partner with experienced professionals at the Merage MBA Career Centre to determine the best fit career. By having a clear career path, students can select electives that will help them prepare for summer internships. The summer internship provides MBA students to apply the knowledge gained during the first year.
Students will also have the opportunity to participate in a semester-long exchange program with one of the schools - Hitosubashi University in Japan, St. Gallen University in Switzerland, and RSM Erasmus University in the Netherlands.
The Career Management team in Peter F. Drucker and Masatoshi ITO Graduate School of Management works in partnership with students to achieve their post-MBA goals. Some of the key focuses of the Career Management centre are Personalized Career Planning, Skills Development, and Resources for finding job opportunities, Networking Opportunities with esteemed Drucker Alumni and dedicated Alumni Mentor programs.
To encourage International students to communicate effectively, Claremont Graduate University’ has introduced an International Fellows Program, where students will get an opportunity to take part in an advanced English Program.
USC Marshall School of Business has introduced a new core curriculum in 2011. The curriculum is designed to fit the needs of a diverse class with varying interests, aspirations and backgrounds. Before starting the core curriculum, students are required to complete a one week orientation program followed by a three-week "Super Semester" that provides crash course in leadership, strategy, statistics, microeconomics, financial accounting, ethics and management communication.
Students will be assigned to one of the three "Cores"(groups designed with diversity in mind). Each core will be further divided into teams of five to six people. The members of each core will together take the required courses, case discussions, student presentation and team projects. Subjects that would be useful for the summer internship are picked as part of the first-year electives (after discussion between students, alumni and recruiters). Some of the courses in the first-year electives include accounting, entrepreneurship, finance, information and operations management, management and organization, and marketing.
SDA Bocconi has introduced three major changes for all the Full-time MBA classes starting from Sep 2012.
Planning and Innovating: The first sequence is designed to develop skills to manage global competition. Students should learn to plan according to current capabilities and resources, while keeping in mind potential competition and future innovation.
Controlling and Investing: The second sequence provides students with tools to perform quantitative analysis to manage performance of investments and obtain funds for Businesses.
Leading People and Processes: Managing human resources and deadlines is crucial for successfully implementing any projects. The third sequence provides students with the framework to define projects based on people and processes.
Soft Skills and Values: Often ignored aspect of skill development is soft skills. SDA Bocconi with this final sequence has designed the curriculum to include exercises and courses to develop skills in communication, project management and team management. The financial crisis of 2008 was due to lack of Business ethics. This concentration has a section for Business ethics that will educate students about conducting Business in an ethical and fair manner.
The Four Sequences will take students to all the four concentrations: Innovation, Marketing, Finance, and the Luxury track.
The Simmons 16-month MBA program is designed for developing women’s career and leadership skills. The program starts with a one-week introductory course, followed by the Foundational courses. During the Foundational courses, students develop skills like financial, economic, quantitative analysis as well as behavioural skills like communications and leadership strategies, necessary for being an effective manager. The Foundational courses are followed by Advanced Courses which focuses on developing tools required to lead at a strategic level.
The biggest advantage of The Simmons MBA is the internship opportunity provided to students during summer. Internships are however not mandatory. Once the students have implemented the knowledge gained during the MBA program, they are introduced to career strategies, a required course that guides students during every stage of their career.
To familiarize students with diverse disciplines in Business, an integrative course is taught that addresses strategic issues, problems and opportunities in Business. Finally students are given the option to choose from one of over 8 concentrations or from a list of advanced electives: Accounting for Financial Services, Advanced Corporate Finance, Business Ethics, Entrepreneurship, International Marketing, Investment Portfolio Management, Labor Relations and Employment Law, Contemporary Topics in Marketing, Consulting, Gender and Leadership in Complex Organizations, Identifying and Exploiting New Business Opportunities, and Business and Market Failures. The electives change from year to year.
Stanford Full-time MBA is a 24-month program with the 2016 class setting a new record in the history of Stanford GSB for the largest class with 410 students. The diverse group of students for the latest class was chosen through a rigorous MBA Admission process that accepted applications from 7355 aspirants with an acceptance rate of 5.5%. The sparks of innovation that Stanford is known for has to do with the talented group of MBA candidates but the environment - the pleasant “The Knight Management Center Campus” in Bay Area, Northern California, is the perfect fertile ground for new ideas. The vicinity to some of the best innovators in the world – Intel, Google, Facebook and Apple, lends an inspiring learning experience for MBA candidates.
For the Class of 2016, Stanford Full-time MBA program received 7,355 applications, admitting only 410 students – a 5.5% acceptance rate. The entry criteria in terms of GMAT score is on the higher side with the class average at 732 and GPA at 3.73. Women and International students were represented at a much higher percentage compared to other top MBA programs at 42% and 44% respectively. Unlike other programs, Stanford has also maintained diversity in terms of pre-MBA employment, with the admission team, selecting candidates from a record 312 companies.
The Philadelphia campus hosts the 24-month Wharton Full-time MBA program with the latest class enrolling 850 students. The focus of the Full-time program is to make the students better decision makers, encourage them to take risks, test their Entrepreneurial skills, and give them the opportunity to work with diverse groups in Global communities.
Although not as popular as Harvard, Wharton ranks among the top five popular MBA programs in the world with the Class of 2016 receiving 6111 applications, enrolling only 859 students - a 14% acceptance rate. The mean GMAT for the class is 728 with 80% of the class scoring in the 710 to 750 range. 31% of the class was international students. Interestingly, minority students had a wider representation this year with 30% of the Americans in the class represented by a minority group (African-American, Asian-American, Native American, and other multiethnic backgrounds). | 2019-04-26T02:53:56Z | https://www.f1gmat.com/business-school-profile?source=bc-nav |
January | 2016 | VAMboozled!
As you all likely recall, the American Federation of Teachers (AFT), joined by the Albuquerque Teachers Federation (ATF), last year, filed a “Lawsuit in New Mexico Challenging [the] State’s Teacher Evaluation System.” In December 2015, state District Judge David K. Thomson granted a preliminary injunction preventing consequences from being attached to the state’s teacher evaluation data. More specifically, Judge Thomson ruled that the state can proceed with “developing” and “improving” its teacher evaluation system, but the state is not to make any consequential decisions about New Mexico’s teachers using the data the state collects until the state (and/or others external to the state) can evidence to the court that the system is reliable, valid, fair, uniform, and the like (see prior post on this ruling here).
Late Friday afternoon, New Mexico’s Public Education Department (PED) announced that they are accordingly changing their NMTEACH teacher evaluation system, and they will be issuing new regulations. Their primary goal is as follows: To (1) “Address major liabilities resulting from litigation” as these liabilities specifically pertain to the former NMTEACH system’s (a) Uniformity, (b) Transparency, and (c) Clarity. On the surface level, this is gratifying to the extent that the state is attempting to, at least theoretically, please the court. But we, and especially those in New Mexico, might refrain from celebrating too soon…given when one reads the PED announcement here, one will see this is yet another example of the state’s futile attempts to keep with a very top-down teacher evaluation system. Note, however, that a uniform teacher evaluation system is also required under state law, although the governor has the right to change state statute should those at the state (including the governor, state superintendent, and PED) decide to eventually work with local districts and schools regarding the construction of a better teacher evaluation system for the state.
As per the PED’s subsequent goals, accordingly, things do not look much different than what they did in the past, especially given why and what got the state involved in such litigation in the first place. While the state also intends to (2) Simplify processes for districts/charters and also for the PED, and this is more or less fair, the state is also to (3) Establish a timeline for providing to districts and schools more current data in that currently such data are delayed by one school year, and these data are (still) needed for the state’s Pay for Performance plans (which was considered one high-stakes consequence at issue in Judge Thompson’s ruling). A tertiary goal is also to deliver in a more timely fashion such data to teacher preparation programs, which is something also of great controversy, as (uninformed) policymakers also continue to believe that colleges of education should also be held accountable for the test scores of their graduates’ students (see why this is problematic, for example, here). In the state’s final expressed goal, they make it explicit that (4) “Moving the timeline enhances the understanding that this system isn’t being used for termination decisions.” While this is certainly good, at least for now, the performance pay program is still something that is of concern. As is the state’s continued attempts to (still) use students’ test scores to evaluate teachers, and the state’s perpetual beliefs that the data errors also exposed by the lawsuit were the fault of the school districts, not the state, which Judge Thomson also noted.
Regardless, here is the state’s “Legal Rationale,” and here is also where things go a bit more awry. As re-positioned by the state/PED, they write that “the NEA and AFT recently advanced lawsuits set on eliminating any meaningful teacher evaluation [emphasis added to highlight the language that state is using to distort the genuine purposes of these lawsuits]. These lawsuits have exposed that the flexibility provided to local authorities has created confusion and complexity. Judge Thomson used this complexity when granting an injunction in the AFT case—citing a confusing array of classifications, tags, assessments, graduated considerations, etc. Judge Thomson made clear that he views this local authority as a threat to the statutorily required uniformity of the system [emphasis added given Judge Thompson said nothing of this sort, in terms of devaluing local authority or control, but rather, he emphasized the state’s menu of options was arbitrary and not uniform, especially given the consequences the state was requiring districts to enforce].” This, again, pertains to what is written in the current state statute in terms of a uniform teacher evaluation system.
Accordingly, and unfortunately, the state’s proposed changes would: “Provide a single plan that all districts and charters would use, providing greater uniformity,” and “Simplify the model from 107 possible classifications to three.” See three other moves detailed in the PED announcement here (e.g., moving data delivery dates, eliminating all but three tests, and the fall 2016 date which all of this is to become official).
Related, see a visual of what the state’s “new and improved” teacher evaluation system, in response to said litigation, is to look like. Unfortunately, again, it really does not look much different than it did prior except, perhaps, in the proposed reductions of testing options. See also the full document from which all of this came here.
Nonetheless, we will have to wait to see if this, again, will please the court, and Judge Thompson’s ruling that the state is not to make any consequential decisions about New Mexico’s teachers using the data the state collects until the state (and/or others external to the state) can evidence to the court that the system is reliable, valid, etc.
The Student Growth Percentiles (SGPs) model, which is loosely defined by value-added model (VAM) purists as a VAM, uses students’ level(s) of past performance to determine students’ normative growth over time, as compared to his/her peers. “SGPs describe the relative location of a student’s current score compared to the current scores of students with similar score histories” (Castellano & Ho, p. 89). Students are compared to themselves (i.e., students serve as their own controls) over time; therefore, the need to control for other variables (e.g., student demographics) is less necessary, although this is of debate. Nonetheless, the SGP model was developed as a “better” alternative to existing models, with the goal of providing clearer, more accessible, and more understandable results to both internal and external education stakeholders and consumers. For more information about the SGP please see prior posts here and here. See also an original source about the SGP here.
Most importantly, the evidence in this study should make us (continue to) question the extent to which “the learning of a teacher’s students in one year will [consistently] predict the learning of the teacher’s future students.” This is counter to the claims continuously made by VAM proponents, including folks like Thomas Kane — economics professor from Harvard University who directed the $45 million worth of Measures of Effective Teaching (MET) studies for the Bill & Melinda Gates Foundation. While faint signals of what we call predictive validity might be observed across VAMs, what folks like Kane overlook or avoid is that very often these faint signals do not remain constant over time. Accordingly, the extent to which we can make stable predictions is limited.
Worse is when folks falsely assume that said predictions will remain constant over time, and they make high-stakes decisions about teachers unaware of the lack of stability present, in typically 25-59% of teachers’ value-added (or in this case SGP) scores (estimates vary by study and by analyses using one to three years of data — see, for example, the studies detailed in Appendix A of this report; see also other research on this topic here, here, and here). Nonetheless, researchers in this study found that in mathematics, 50% of the variance in teachers’ value-added scores were attributable to differences among teachers, and the other 50% was random or unstable. In reading, 41% of the variance in teachers’ value-added scores were attributable to differences among teachers, and the other 59% was random or unstable.
In addition, using a 95% confidence interval (which is very common in educational statistics) researchers found that in mathematics, a teacher’s true score would span 48 points, “a margin of error that covers nearly half the 100 point score scale,” whereby “one would be 95 percent confident that the true math score of a teacher who received a score of 50 [would actually fall] between 26 and 74.” For reading, a teacher’s true score would span 44 points, whereby one would be 95 percent confident that the true reading score of a teacher who received a score of 50 would actually fall between 38 and 72. The stability of these scores would increase with three years of data, which has also been found by other researchers on this topic. However, they too have found that such error rates persist to an extent that still prohibits high-stakes decision making.
In more practical terms, what this also means is that a teacher who might be considered highly ineffective might be terminated, even though the following year (s)he could have been observed to be highly effective. Inversely, teachers who are awarded tenure might be observed as ineffective one, two, and/or three years following, not because their true level(s) of effectiveness change, but because of the error in the estimates that causes such instabilities to occur. Hence, examinations of the the stability of such estimates over time provides essential evidence of the validity, and in this case predictive validity, of the interpretations and uses of such scores over time. This is particularly pertinent when high-stakes decisions are to be based on (or in large part on) such scores, especially given some researchers are calling for reliability coefficients of .85 or higher to make such decisions (Haertel, 2013; Wasserman & Bracken, 2003).
In the end, researchers’ overall conclusion is that SGP-derived “growth scores alone may not be sufficiently stable to support high-stakes decisions.” Likewise, relying on the extant research on this topic, the overall conclusion can be broadened in that neither SGP- or VAM-based growth scores may be sufficiently stable to support high-stakes decisions. In other words, it is not just the SGP model that is yielding such issues with stability (or a lack thereof). Again, see the other literature in which researchers situated their findings in Appendix A. See also other similar studies here, here, and here.
Accordingly, those who read this report, and consequently seek to find a better or more stable model that yields more stable estimates, will unfortunately but likely fail in their search.
Castellano, K. E., & Ho, A. D. (2013). A practitioner’s guide to growth models. Washington, DC: Council of Chief State School Officers.
Haertel, E. H. (2013). Reliability and validity of inferences about teachers based on student test scores (14th William H. Angoff Memorial Lecture). Princeton, NJ: Educational Testing Service (ETS).
Lash, A., Makkonen, R., Tran, L., & Huang, M. (2016). Analysis of the stability of teacher-level growth scores [derived] from the student growth percentile [SGP] model. (16–104). Washington, DC: U.S. Department of Education, Institute of Education Sciences, National Center for Education Evaluation and Regional Assistance, Regional Educational Laboratory West.
Assessment psychology (pp. 43–66). Hoboken, NJ: John Wiley & Sons.
Recall that the peer-reviewed journal Educational Researcher (ER) – recently published a “Special Issue” including nine articles examining value-added measures (VAMs). I have reviewed the next of nine articles (#7 of 9), which is actually a commentary titled “The Value in Value-Added Depends on the Ecology.” This commentary is authored by Henry Braun – Professor of Education and Public Policy, Educational Research, Measurement, and Evaluation at Boston College (also the author of a previous post on this site here).
In this article Braun, importantly, makes explicit the assumptions on which this special issue of ER is based; that is, on assumptions that (1) too many students in America’s public schools are being inadequately educated, (2) evaluation systems as they currently exist “require radical overhaul,” and (3) it is therefore essential to use student test performance with low- and high-stakes attached to improve that which educators do (or don’t do) to adequately address the first assumption. There are counterarguments Braun also offers to readers on each of these assumptions (see p. 127), but more importantly he makes evident that the focus of this special issue is situated otherwise, as in line with current education policies. This special issue, overall, then “raise[s] important questions regarding the potential for high-stakes, test-driven educator accountability systems to contribute to raising student achievement” (p. 127).
Given this context, the “value-added” provided within this special issue, again according to Braun, is that the authors of each of the five main research articles included report on how VAM output actually plays out in practice, given “careful consideration to how the design and implementation of teacher evaluation systems could be modified to enhance the [purportedly, see comments above] positive impact of accountability and mitigate the negative consequences” at the same time (p. 127). In other words, if we more or less agree to the aforementioned assumptions, also given the educational policy context influence, perpetuating, or actually forcing these assumptions, these articles should help others better understand VAMs’ and observational systems’ potentials and perils in practice.
At the same time, Braun encourages us to note that “[t]he general consensus is that a set of VAM scores does contain some useful information that meaningfully differentiates among teachers, especially in the tails of the distribution [although I would argue bias has a role here]. However, individual VAM scores do suffer from high variance and low year-to-year stability as well as an undetermined amount of bias [which may be greater in the tails of the distribution]. Consequently, if VAM scores are to be used for evaluation, they should not be given inordinate weight and certainly not treated as the “gold standard” to which all other indicators must be compared” (p. 128).
Likewise, it’s important to note that IF consequences are to be attached to said indicators of teacher evaluation (i.e., VAM and observational data), there should be validity evidence made available and transparent to warrant the inferences and decisions to be made, and the validity evidence “should strongly support a causal [emphasis added] argument” (p. 128). However, both indicators still face major “difficulties in establishing defensible causal linkage[s]” as theorized, and desired (p. 128); hence, this prevents validity in inference. What does not help, either, is when VAM scores are given precedence over other indicators OR when principals align teachers’ observational scores with the same teachers’ VAM scores given the precedence often given to (what are often viewed as the superior, more objective) VAM-based measures. This sometimes occurs given external pressures (e.g., applied by superintendents) to artificially conflate, in this case, levels of agreement between indicators (i.e., convergent validity).
Related, in the section Braun titles his “Trio of Tensions,” (p. 129) he notes that (1) [B]oth accountability and improvement are undermined, as attested to by a number of the articles in this issue. In the current political and economic climate, [if possible] it will take thoughtful and inspiring leadership at the state and district levels to create contexts in which an educator evaluation system constructively fulfills its roles with respect to both public accountability and school improvement” (p. 129-130); (2) [T]he chasm between the technical sophistication of the various VAM[s] and the ability of educators to appreciate what these models are attempting to accomplish…sow[s] further confusion…[hence]…there must be ongoing efforts to convey to various audiences the essential issues—even in the face of principled disagreements among experts on the appropriate roles(s) for VAM[s] in educator evaluations” (p. 130); and finally (3) [H]ow to balance the rights of students to an adequate education and the rights of teachers to fair evaluations and due process [especially for]…teachers who have value-added scores and those who teach in subject-grade combinations for which value-added scores are not feasible…[must be addressed; this] comparability issue…has not been addressed but [it] will likely [continue to] rear its [ugly] head” (p. 130).
In the end, Braun argues for another “Trio,” but this one including three final lessons: (1) “although the concerns regarding the technical properties of VAM scores are not misplaced, they are not necessarily central to their reputation among teachers and principals. [What is central is]…their links to tests of dubious quality, their opaqueness in an atmosphere marked by (mutual) distrust, and the apparent lack of actionable information that are largely responsible for their poor reception” (p. 130); (2) there is a “very substantial, multiyear effort required for proper implementation of a new evaluation system…[related, observational] ratings are not a panacea. They, too, suffer from technical deficiencies and are the object of concern among some teachers because of worries about bias” (p. 130); and (3) “legislators and policymakers should move toward a more ecological approach [emphasis added; see also the Review of Article (Essay) #6 – on VAMs as tools for “egg-crate” schools here] to the design of accountability systems; that is, “one that takes into account the educational and political context for evaluation, the behavioral responses and other dynamics that are set in motion when a new regime of high-stakes accountability is instituted, and the long-term consequences of operating the system” (p. 130).
If interested, see the Review of Article #1 – the introduction to the special issue here; see the Review of Article #2 – on VAMs’ measurement errors, issues with retroactive revisions, and (more) problems with using standardized tests in VAMs here; see the Review of Article #3 – on VAMs’ potentials here; see the Review of Article #4 – on observational systems’ potentials here; see the Review of Article #5 – on teachers’ perceptions of observations and student growth here; and see the Review of Article (Essay) #6 – on VAMs as tools for “egg-crate” schools here.
In case you missed it, click here for the full op-ed “How Measurement Fails Doctors and Teachers” piece published in The New York Times on Saturday.
It’s well worth the read, especially given the comparisons that author, Robert M. Wachter – MD, Professor and Interim Chair of the Department of Medicine at the University of California, San Francisco – makes between medicine and education, in terms of how measurement systems in many ways have worked to hurt, not help improve, both professions.
Is Alabama the New, New Mexico?
In Alabama, the Grand Old Party (GOP) has put forth a draft bill to be entitled as an act and ultimately called the Rewarding Advancement in Instruction and Student Excellence (RAISE) Act of 2016. The purpose of the act will be to…wait for it…use test scores to grade and pay teachers annual bonuses (i.e., “supplements”) as per their performance. More specifically, the bill is to “provide a procedure for observing and evaluating teachers” to help make “significant differentiation[s] in pay, retention, promotion, dismissals, and other staffing decisions, including transfers, placements, and preferences in the event of reductions in force, [as] primarily [based] on evaluation results.” Related, Alabama districts may no longer use teachers’ “seniority, degrees, or credentials as a basis for determining pay or making the retention, promotion, dismissal, and staffing decisions.” Genius!
Accordingly, Larry Lee whose blog is based on the foundation that “education is everyone’s business,” sent me this bill to review, and critique, and help make everyone’s business. I attach it here for others who are interested, but I also summarize and critique it’s most relevant (but also contemptible) issues below.
For the Alabama teachers who are eligible, they are (after a staggered period of time) to be primarily evaluated (i.e., for up to 45% of a teacher’s total evaluation score) on the extent to which they purportedly cause student growth in achievement, with student growth being defined as the teachers’ purported impacts on “[t]he change in achievement for an individual student between two or more points in time.” Teachers are also to be observed at least twice per year (i.e., for up to 45% of a teacher’s total evaluation score), by their appropriate and appropriately trained evaluators/supervisors, and an unnamed and undefined set of parent and student surveys are to be used to evaluate the teachers (i.e., up to 15% of a teacher’s total evaluation score).
Again, no real surprises here as the adoption of such measures is common among states like Alabama (and New Mexico), but when these components are explained in more detail is where things really go awry.
“For grade levels and subjects for which student standardized assessment data is not available and for teachers for whom student standardized assessment data is not available, the [state’s] department [of education] shall establish a list of preapproved options for governing boards to utilize to measure student growth.” This is precisely what has gotten the whole state of New Mexico wrapped up in, and currently losing their ongoing lawsuit (see my most recent post on this here). While providing districts with menus of preapproved assessment options might make sense to policymakers, any self respecting researcher or even assessment commoner should know why this is entirely inappropriate. To read more about this, the best research study explaining why doing just this will set any state up for lawsuits comes from Brown University’s John Papay in his highly esteemed and highly cited “Different tests, different answers: The stability of teacher value-added estimates across outcome measures” article. The title of this research article alone should explain enough why simply positioning and offering up such tests in such casual (and quite careless) ways makes way for legal recourse.
Otherwise, the only test mentioned that is also to be used to measure teachers’ purported impacts on student growth is the ACT Aspire – the ACT test corporation’s “college and career readiness” test that is aligned to and connected with their more familiar college-entrance ACT. This, too, was one of the sources of the aforementioned lawsuit in New Mexico in terms of what we call content validity, in that states cannot simply pull in tests that are not adequately aligned with a state’s curriculum (e.g., I could find no information about the alignment of the ACT Aspire to Alabama’s curriculum here, which is also highly problematic as this information should definitely be available) and that have not been validated for such purposes (i.e., to measure teachers’ impacts on student growth).
Regardless of the tests, however, all of the secondary measures to be used to evaluate Alabama teachers (e.g., student and parent survey scores, observational scores) are also to be “correlated with impacts on student achievement results.” We’ve also increasingly seen this becoming the case across the nation, whereas state/district leaders are not simply assessing whether these indicators are independently correlated, which they should be if they all, in fact, help to measure our construct of interest = teacher effectiveness, but state/district leaders are rather manufacturing and forcing these correlations via what I have termed “artificial conflation” strategies (see also a recent post here about how this is one of the fundamental and critical points of litigation in Houston).
The state is apparently also set on going “all in” on evaluating their principals in many of the same ways, although I did not critique those sections for this particular post.
Most importantly, though, for those of you who have access to such leaders in Alabama, do send them this post so they might be a bit more proactive, and appropriately more careful and cautious, before going down this poor educational policy path. While I do embrace my professional responsibility as a public scholar to be called to court to testify about all of this when such high-stakes consequences are ultimately, yet inappropriately based upon invalid inferences, I’d much rather be proactive in this regard and save states and states’ taxpayers their time and money, respectively.
Accordingly, I see the state is also to put out a request for proposals to retain an external contractor to help them measure said student growth and teachers’ purported impacts on it. I would also be more than happy to help the state negotiate this contract, much more wisely than so many other states and districts have negotiated similar contracts thus far (e.g., without asking for reliability and validity evidence as a contractual deliverable)…should this poor educational policy actually come to fruition.
Recall from a prior post that a set of teachers in the Houston Independent School District (HISD), with the support of the Houston Federation of Teachers (HFT) are taking their district to federal court to fight for their rights as professionals, and how their value-added scores, derived via the Education Value-Added Assessment System (EVAAS), have allegedly violated them. The case, Houston Federation of Teachers, et al. v. Houston ISD, is to officially begin in court early this summer.
More specifically, the teachers are arguing that EVAAS output are inaccurate, the EVAAS is unfair, that teachers are being evaluated via the EVAAS using tests that do not match the curriculum they are to teach, that the EVAAS system fails to control for student-level factors that impact how well teachers perform but that are outside of teachers’ control (e.g., parental effects), that the EVAAS is incomprehensible and hence very difficult if not impossible to actually use to improve upon their instruction (i.e., actionable), and, accordingly, that teachers’ due process rights are being violated because teachers do not have adequate opportunities to change as a results of their EVAAS results.
The EVAAS is the one value-added model (VAM) on which I’ve conducted most of my research, also in this district (see, for example, here, here, here, and here); hence, I along with Jesse Rothstein – Professor of Public Policy and Economics at the University of California – Berkeley, who also conducts extensive research on VAMs – are serving as the expert witnesses in this case.
The EVAAS produces different results from another VAM. When, for this case, Rothstein constructed and ran an alternative, albeit sophisticated VAM using data from HISD both times, he found that results “yielded quite different rankings and scores.” This should not happen if these models are indeed yielding indicators of truth, or true levels of teacher effectiveness from which valid interpretations and assertions can be made.
Ceiling effects are certainly an issue. Rothstein found that in some grades and subjects, “teachers whose students have unusually high prior year scores are very unlikely to earn high EVAAS scores, suggesting that ‘ceiling effects‘ in the tests are certainly relevant factors.” While EVAAS and HISD have previously acknowledged such problems with ceiling effects, they apparently believe these effects are being mediated with the new and improved tests recently adopted throughout the state of Texas. Rothstein, however, found that these effects persist even given the new and improved.
There are major validity issues with “artificial conflation.” This is a term I recently coined to represent what is happening in Houston, and elsewhere (e.g., Tennessee), when district leaders (e.g., superintendents) mandate or force principals and other teacher effectiveness appraisers or evaluators, for example, to align their observational ratings of teachers’ effectiveness with value-added scores, with the latter being the “objective measure” around which all else should revolve, or align; hence, the conflation of the one to match the other, even if entirely invalid. As per my affidavit, “[t]o purposefully and systematically endorse the engineering and distortion of the perceptible ‘subjective’ indicator, using the perceptibly ‘objective’ indicator as a keystone of truth and consequence, is more than arbitrary, capricious, and remiss…not to mention in violation of the educational measurement field’s Standards for Educational and Psychological Testing” (American Educational Research Association (AERA), American Psychological Association (APA), National Council on Measurement in Education (NCME), 2014).
HISD is not adequately monitoring the EVAAS system. According to HISD, EVAAS modelers keep the details of their model secret, even from them and even though they are paying an estimated $500K per year for district teachers’ EVAAS estimates. “During litigation, HISD has admitted that it has not performed or paid any contractor to perform any type of verification, analysis, or audit of the EVAAS scores. This violates the technical standards for use of VAM that AERA specifies, which provide that if a school district like HISD is going to use VAM, it is responsible for ‘conducting the ongoing evaluation of both intended and unintended consequences’ and that ‘monitoring should be of sufficient scope and extent to provide evidence to document the technical quality of the VAM application and the validity of its use’ (AERA Statement, 2015).
A colleague whom I have never formally met, but with whom I’ve had some interesting email exchanges with over the past few months — James D. Kirylo, Professor of Teaching and Learning in Louisiana — recently sent me an email I read, and appreciated; hence, I asked him to turn it into a blog post. He responded with a guest post he has titled “Deep Pockets, Corporate Reform, and Teacher Education,” pasted below. Do give this a read, and a social media share, as this one is deserving of some legs.
Money is power. Money is influence. Money shapes direction. Notwithstanding the influential nature of it in the electoral process, one only needs to see how bags of dough from the mega-rich-one-percenters—largely led by Bill Gates—have bought their way in their attempt to corporatize K-12 education (see, for example, here).
This corporatization works to defund public education, grossly blames teachers for all that ails society, is obsessed with testing, and aims to privatize. And next on the corporatized docket: teacher education programs.
In a recent piece by Valerie Strauss, “Gates Foundation Puts Millions of Dollars into New Education Focus: Teacher Preparation,” she sketches how Gates is awarding $35 million to a three-year project called Teacher Preparation Transformation Centers funneled through five different projects, one of which is the Texas Tech based University-School Partnerships for the Renewal of Educator Preparation (U.S. Prep) National Center.
A framework that will guide this “renewal” of educator preparation comes from the National Institute for Excellence in Teaching (NIET), along with the peddling of their programs, The System for Teacher and Student Advancement (TAP) and Student and Best Practices Center (BPC). Yet, again, coming from another guy with oodles of money, leading the charge of NIET is Lowell Milken who is Chairmen and TAP founder (see, for example, here).
The state of Louisiana serves as an example on how NIET is already working overtime in chipping its way into K-12 education. One can spend hours at the Louisiana Department of Education (LDE) website and view the various links on how TAP is applying a full-court-press in hyping its brand (see, for example, here).
And now that TAP has entered the K-12 door in Louisiana, the brand is now squiggling its way into teacher education preparation programs, namely through the Texas Tech based U.S. Prep National Center. This Gates Foundation backed project involves five teacher education programs in the country (Southern Methodist University, University of Houston, Jackson State University, and the University of Memphis, including one in Louisiana (Southeastern Louisiana University) (see more information about this here).
Therefore, teacher educators must be “trained” to use TAP in order to “rightly” inculcate the prescription to teacher candidates.
TAP principally plugs four Elements of Success: Multiple Career Paths (for educators as career, mentor and master teachers); Ongoing Applied Professional Growth (through weekly cluster meetings, follow-up support in the classroom, and coaching); Instructionally Focused Accountability (through multiple classroom observations and evaluations utilizing a research based instrument and rubric that identified effective teaching practices); and, Performance-Based Compensation (based on multiple; measures of performance, including student achievement gains and teachers’ instructional practices).
And according to the TAP literature, the elements of success “…were developed based upon scientific research, as well as best practices from the fields of education, business, and management” (see, for example, here). Recall, perhaps, that No Child Left Behind (NCLB) was also based on “scientific-based” research. Enough said. It is also interesting to note their use of the words “business” and “management” when referring to educating our children. Regardless, “The ultimate goal of TAP is to raise student achievement” so students will presumably be better equipped to compete in the global society (see, for example, here).
While each element is worthy of discussion, a brief comment is in order on the first element Multiple Career Paths and fourth element, Performance-Based Compensation. Regarding the former, TAP has created a mini-hierarchy within already-hierarchical school systems (which most are) in identifying three potential sets of teachers, to reiterate from the above: a “career” teacher; a “mentor” teacher, and a “master” teacher. A “career” teacher as opposed to what? As opposed to a “temporary” teacher, a Teach For America (TFA) teacher, a substitute teacher? But, of course, according to TAP, as opposed to a “mentor” teacher and a “master” teacher.
This certainly begs the question: Why in the world would any parent want their child to be taught by a “career” teacher as opposed to a “mentor” teacher or better yet a “master” teacher? Wouldn’t we want “master” teachers in all our classrooms? To analogize, I would rather have a “master” doctor performing heart surgery on me than a “lowly” career doctor. Indeed, words, language, and concepts matter.
With respect to the latter, the notion of having an ultimate goal on raising student achievement is perhaps more than euphemistic on raising test scores, cultivating a test-centric way of doing things.
That is, instead of focusing on learning, opportunity, developmentally appropriate practices, and falling in love with learning, “achievement” is the goal of TAP. Make no mistake, this is far from an argument on semantics. And this “achievement” linked to student growth to merit pay relies heavily on a VAM-aligned rubric.
Yet, there are multiple problems with VAM, an instrument that has been used in K-12 education since 2011. Among many other outstanding sources, one may simply want to check out this cleverly called blog here, “VAMboozled,” or see what Diane Ravitch has said about VAMs (among other places, see, for example, here), not to mention the well-visited site produced by Mercedes Schneider here. Finally, see the 2015 position statement issued by the American Educational Research Association (AERA) regarding VAMs here, as well as a similar statement issued by the American Statistical Association (ASA) here.
Back to the Gates Foundation and the Texas Tech based (U.S. Prep) National Center, though. To restate, at the aforementioned university in Louisiana (though likely in the other four recruited institutions, as well), TAP will be the chief vehicle that will drive this process, and teacher education programs will be used as the host to prop the brand.
With presumably some very smart, well-educated, talented, and experienced professionals at respective teacher education sites, how is it possible that they capitulated to be the samples for the petri dish that will only work to enculturate the continuation of corporate reform, which will predictably lead to what Hofstra University Professor, Alan Singer, calls the “McDonaldization of Teacher Education“?
Strauss puts the question this way, “How many times do educators need to attempt to reinvent the wheel just because someone with deep pockets wants to try when the money could almost certainly be more usefully spent somewhere else?” I ask this same question, in this case, here.
Recall that the peer-reviewed journal Educational Researcher (ER) – published a “Special Issue” including nine articles examining value-added measures (VAMs). I have reviewed the next of nine articles (#6 of 9), which is actually an essay here, titled “Will VAMS Reinforce the Walls of the Egg-Crate School?” This essay is authored by Susan Moore Johnson – Professor of Education at Harvard and somebody who I in the past I had the privilege of interviewing as an esteemed member of the National Academy of Education (see interviews here and here).
In this article, Moore Johnson argues that when policymakers use VAMs to evaluate, reward, or dismiss teachers, they may be perpetuating an egg-crate model, which is (referencing Tyack (1974) and Lortie (1975)) a metaphor for the compartmentalized school structure in which teachers (and students) work, most often in isolation. This model ultimately undermines the efforts of all involved in the work of schools to build capacity school wide, and to excel as a school given educators’ individual and collective efforts.
Contrary to the primary logic supporting VAM use, however, “teachers are not inherently effective or ineffective” on their own. Rather, their collective effectiveness is related to their professional development that may be stunted when they work alone, “without the benefit of ongoing collegial influence” (p. 119). VAMs then, and unfortunately, can cause teachers and administrators to (hyper)focus “on identifying, assigning, and rewarding or penalizing individual [emphasis added] teachers for their effectiveness in raising students’ test scores [which] depends primarily on the strengths of individual teachers” (p. 119). What comes along with this, then, are a series of interrelated egg-crate behaviors including, but not limited to, increased competition, lack of collaboration, increased independence versus interdependence, and the like, all of which can lead to decreased morale and decreased effectiveness in effect.
Inversely, students are much “better served when human resources are deliberately organized to draw on the strengths of all teachers on behalf of all students, rather than having students subjected to the luck of the draw in their classroom assignment[s]” (p. 119). Likewise, “changing the context in which teachers work could have important benefits for students throughout the school, whereas changing individual teachers without changing the context [as per VAMs] might not [work nearly as well] (Lohr, 2012)” (p. 120). Teachers learning from their peers, working in teams, teaching in teams, co-planning, collaborating, learning via mentoring by more experienced teachers, learning by mentoring, and the like should be much more valued, as warranted via the research, yet they are not valued given the very nature of VAM use.
Hence, there are also unintended consequences that can also come along with the (hyper)use of individual-level VAMs. These include, but are not limited to: (1) Teachers who are more likely to “literally or figuratively ‘close their classroom door’ and revert to working alone…[This]…affect[s] current collaboration and shared responsibility for school improvement, thus reinforcing the walls of the egg-crate school” (p. 120); (2) Due to bias, or that teachers might be unfairly evaluated given the types of students non-randomly assigned into their classrooms, teachers might avoid teaching high-needs students if teachers perceive themselves to be “at greater risk” of teaching students they cannot grow; (3) This can perpetuate isolative behaviors, as well as behaviors that encourage teachers to protect themselves first, and above all else; (4) “Therefore, heavy reliance on VAMS may lead effective teachers in high-need subjects and schools to seek safer assignments, where they can avoid the risk of low VAMS scores[; (5) M]eanwhile, some of the most challenging teaching assignments would remain difficult to fill and likely be subject to repeated turnover, bringing steep costs for students” (p. 120); While (6) “using VAMS to determine a substantial part of the teacher’s evaluation or pay [also] threatens to sidetrack the teachers’ collaboration and redirect the effective teacher’s attention to the students on his or her roster” (p. 120-121) versus students, for example, on other teachers’ rosters who might also benefit from other teachers’ content area or other expertise. Likewise (7) “Using VAMS to make high-stakes decisions about teachers also may have the unintended effect of driving skillful and committed teachers away from the schools that need them most and, in the extreme, causing them to leave the profession” in the end (p. 121).
I should add, though, and in all fairness given the Review of Paper #3 – on VAMs’ potentials here, many of these aforementioned assertions are somewhat hypothetical in the sense that they are based on the grander literature surrounding teachers’ working conditions, versus the direct, unintended effects of VAMs, given no research yet exists to examine the above, or other unintended effects, empirically. “There is as yet no evidence that the intensified use of VAMS interferes with collaborative, reciprocal work among teachers and principals or sets back efforts to move beyond the traditional egg-crate structure. However, the fact that we lack evidence about the organizational consequences of using VAMS does not mean that such consequences do not exist” (p. 123).
The bottom line is that we do not want to prevent the school organization from becoming “greater than the sum of its parts…[so that]…the social capital that transforms human capital through collegial activities in schools [might increase] the school’s overall instructional capacity and, arguably, its success” (p. 118). Hence, as Moore Johnson argues, we must adjust the focus “from the individual back to the organization, from the teacher to the school” (p. 118), and from the egg-crate back to a much more holistic and realistic model capturing what it means to be an effective school, and what it means to be an effective teacher as an educational professional within one. “[A] school would do better to invest in promoting collaboration, learning, and professional accountability among teachers and administrators than to rely on VAMS scores in an effort to reward or penalize a relatively small number of teachers” (p. 122).
If interested, see the Review of Article #1 – the introduction to the special issue here; see the Review of Article #2 – on VAMs’ measurement errors, issues with retroactive revisions, and (more) problems with using standardized tests in VAMs here; see the Review of Article #3 – on VAMs’ potentials here; see the Review of Article #4 – on observational systems’ potentials here; and see the Review of Article #5 – on teachers’ perceptions of observations and student growth here. | 2019-04-23T16:58:05Z | http://vamboozled.com/2016/01/ |
Serratia spp. have been isolated from superficial abscesses, wounds, ocular or urethral discharges, lung, and liver of marine mammals. Although it is now an established pathogen, at one time Serratia marcescens was believed to be completely innocuous. In England and Wales, Serratia bacteremia reports increased by 13.2% between 2000 and 2001. Patients with urinary tract infections (UTIs) and indwelling catheters or colonized or infected respiratory tracts are the most common reservoirs; spread occurs primarily via the hands of hospital personnel. Serratia bacteremia is relatively uncommon; S. marcescens accounted for only 2% of bloodstream infections reported to the National Nosocomial Infections Surveillance System (NNIS). Cholangitis, osteomyelitis, ruptured diverticuli, and premature ruptured membranes have also been reported as sources of bacteremia. S. fonticola fails to produce DNase, lipase, or gelatinase, all hallmark traits of the genus Serratia. The majority of pigmented strains belonged to environmental serotype O6:K14 and were serum resistant, a trait previously determined to be associated with this serotype and not believed to be important in human serratia infection. Strains that are initially susceptible rapidly become resistant during antimicrobial therapy. The current literature indicates that 88 to 93% of serratiae are susceptible to ciprofloxacin. Susceptibilities to various cephalosporins and other antimicrobials are reported.
1. Ajithkumar, B.,, V. P. Ajithkumar,, R. Iriye,, Y. Doi,, and T. Sakai. 2003. Spore-forming Serratia marcescens subsp. sakuensis subsp. nov., isolated from a domestic wastewater treatment tank. Int. J. Syst. Evol. Microbiol. 53: 253– 258.
2. Al Hazzaa, S. A. F.,, K. F. Tabbara,, and J. A. Gammon. 1992. Pink hypopyon: a sign of Serratia marcescens endophthalmitis. Br. J. Ophthalmol. 76: 764– 765.
3. Anahory, T.,, H. Darbas,, O. Ongaro,, H. Jean-Pierre,, and P. Mion. 1998. Serratia ficaria: a misidentified or unidentified rare cause of human infection in fig tree culture zones. J. Clin. Microbiol. 36: 3266– 3272.
4. Arribas, J. R.,, A. Dominguez,, M. D. Folgueria,, P. Pena,, S. Luengo,, J. M. Pena,, and J. J. Vazquez. 1990. Prognostic factors in Serratia bacteremia. Rev. Infect. Dis. 12: 563– 564.
5. ASCP Susceptibility Testing Group ( 1995 ). 1996. United States geographic bacteria susceptibility patterns. Am. J. Clin. Pathol. 106: 275– 281.
6. Ashelford, K. E.,, J. C. Fry,, M. J. Bailey,, and M. J. Day. 2002. Characterization of Serratia isolates from soil, ecological implications and transfer of Serratia proteamaculans subsp. quinovora Grimont et al. 1983 to Serratia quinivorans corrig., sp. nov. Int. J. Syst. Evol. Microbiol. 52: 2281– 2289.
7. Aucken, H. L. M.,, S. G. Wilkinson,, and T. L. Pitt. 1997. Identification of capsular antigens in Serratia marcescens. J. Clin. Microbiol. 35: 59– 63.
8. Badenoch, P. R.,, A. L. Thom,, and D. J. Coster. 2002. Serratia ficaria endophthalmitis. J. Clin. Microbiol. 40: 1563– 1564.
9. Bagattini, M.,, M. Crispino,, F. Gentile,, E. Barretta,, D. Schiavone,, M. C. Boccia,, M. Triassi,, and R. Zarrilli. 2004. A nosocomial outbreak of Serratia marcescens producing inducible Amp C-type beta-lactamase enzyme and carrying antimicrobial resistance genes within a class 1 integron. J. Hosp. Infect. 56: 29– 36.
10. Bale, M.,, M. Sanford,, R. Hollis,, and M. A. Pfaller. 1993. Application of a biotyping system and DNA restriction fragment analysis to the study of Serratia marcescens from hospitalized patients. Diagn. Microbiol. Infect. Dis. 16: 1– 7.
11. Bangert, R. L.,, A. C. S. Ward,, E. H. Stauber,, B. R. Cho,, and P. R. Widders. 1988. A survey of the aerobic bacteria in the feces of captive raptors. Avian Dis. 32: 53– 62.
12. Bantar, C.,, A. Famiglietti,, M. Goldberg, the Antimicrobial Committee, and the National Surveillance Program (SIR) Participants Group. 2000. Three-year surveillance study of nosocomial bacterial resistance in Argentina. Int. J. Infect. Dis. 4: 85– 90.
13. Bennett, J. W.,, and R. Bentley. 2000. Seeing red: the story of prodigiosin. Adv. Appl. Microbiol. 47: 1– 32.
14. Berkowitz, F. E.,, and B. Metchock. 1995. Third generation cephalothin-resistant gram-negative bacilli in the feces of hospitalized children. Pediatr. Infect. Dis. J. 14: 97– 100.
15. Blaylock, R. S. M. 2001. Normal oral bacterial flora from some southern African snakes. Onderstepoort J . Vet. Res. 68: 175– 182.
16. Bollet, C.,, P. Grimont,, M. Gainnier,, A. Geissler,, J. Sainty,, and P. De Micco. 1993. Fatal pneumonia due to Serratia proteamaculans subsp. quinovora. J. Clin. Microbiol. 31: 444– 445.
17. Bornstein, P. F.,, A. M. Ditto,, and G. A. Noskin. 1992. Serratia marcescens cellulitis in a patient on hemodialysis. Am. J. Nephrol. 12: 374– 376.
18. Bourbeau, P. P.,, and B. J. Heiter. 1998. Comparison of Vitek GNI and GNI+ cards for identification of gram-negative bacteria. J. Clin. Microbiol. 36: 2775– 2777.
19. Boyd, R. S.,, and J. DeMaio. 1991. Serratia plymuthica nosocomial pneumonia in an immunocompromised patient. Lab. Med. 22: 861– 863.
20. Brouillard, J. A.,, W. Hansen,, and A. Compere. 1984. Isolation of Serratia ficaria from human clinical specimens. J. Clin. Microbiol. 19: 902– 904.
21. Buenviaje, G. N.,, P. W. Ladds,, L. Melville,, and S. C. Manolis. 1994. Disease-husbandry associations in farmed crocodiles in Queensland and the Northern Territory. Aust. Vet. J. 71: 165– 173.
22. Campbell, J. R.,, T. Diacovo,, and C. J. Baker. 1992. Serratia marcescens meningitis in neonates. Pediatr. Infect. Dis. J. 11: 881– 886.
23. Carbonell, G. V.,, H. H. M. Della Colleta,, T. Yano,, A. L. C. Darini,, C. E. Levy,, and B. A. L. Fonseca. 2000. Clinical relevance and virulence factors of pigmented Serratia marcescens. FEMS Immunol. Med. Microbiol. 28: 143– 149.
24. Carbonell, G. V.,, R. Falcon,, A. T. Yamada,, B. A. L. da Fonseca,, and T. Yano. 2004. Morphological and intracellular alterations induced by Serratia marcescens cytotoxin. Res. Microbiol. 155: 25– 30.
25. Carrero, P.,, J. A. Garrote,, S. Pacheco,, A. I. García,, R. Gil,, and S. G. Carbajosa. 1995. Report of six cases of human infection by Serratia plymuthica. J. Clin. Microbiol. 33: 275– 276.
26. Chartrand, S. A.,, K. J. Thompson,, and C. C. Sanders. 1996. Antibiotic-resistant, gram-negative bacillary infections. Pediatr. Infect. Dis. 7: 187– 203.
27. Chetoui, H.,, E. Delhalle,, P. Melin,, M. J. Struelens,, R. De Ryck,, P. Osterrieth,, and P. De Mol. 1998. Typing of nosocomial strains of Serratia marcescens: comparison of pulsed-field gel electrophoresis of macrorestriction fragments with biotyping, esterase typing and ribotyping. Res. Microbiol. 149: 137– 143.
28. Chmel, H. 1988. Serratia odorifera biogroup l causing an invasive human infection. J. Clin. Microbiol. 26: 1244– 1245.
29. Clark, R. B.,, and J. M. Janda. 1985. Isolation of Serratia plymuthica from a human burn site. J. Clin. Microbiol. 21: 656– 657.
30. Cockerill, F. R. III,, J. G. Hughes,, E. A. Vetter,, R. A. Mueller,, A. L. Weaver,, D. M. Ilstrup,, J. E. Rosenblatt,, and W. R. Wilson. 1997. Analysis of 281,797 consecutive blood cultures performed over an eight-year period: trends in microorganisms isolated and the value of anaerobic culture of blood. Clin. Infect. Dis. 24: 403– 418.
31. Cooper, R.,, and J. Mills. 1980. Serratia endocarditis. Arch. Intern. Med. 140: 199– 202.
32. Cullen, J. C. 1994. The miracle of Bolsena. ASM News 60: 187– 191.
33. Darbas, H. J.,, H. Jean-Pierre,, and J. Paillisson. 1994. Case report and review of septicemia due to Serratia ficaria. J. Clin. Microbiol. 32: 2285– 2288.
34. Dauga, C.,, F. Grimont,, and P. A. D. Grimont. 1990. Nucleotide sequences of 16S rRNA from ten Serratia species. Res. Microbiol. 141: 1139– 1149.
35. Domingo, D.,, A. Limia,, T. Alarcon,, J. C. Sanz,, M. C. Del Rey,, and M. Lopez-Brea. 1994. Nosocomial septicemia caused by Serratia plymuthica. J. Clin. Microbiol. 32: 575– 577.
36. Ewing, W. H.,, B. R. Davis,, M. A. Fife,, and E. F. Lessel. 1973. Biochemical characterization of Serratia liquefaciens (Grimes and Hennerty) Bascomb et al. (formerly Enterobacter liquefaciens) and Serratia rubidaea (Stapp) comb. nov. and designation of type and neotype strains. Int. J. Syst. Bacteriol. 23: 217– 225.
37. Farmer, J. J. III,, 1995. Enterobacteriaceae: introduction and identification, p. 438– 449. In P. R. Murray,, E. J. Baron,, M. A. Pfaller,, F. C. Tenover,, and R. H. Yolken (ed.), Manual of Clinical Microbiology, 6th ed. American Society for Microbiology, Washington, D.C.
38. Farmer, J. J. III,, B. R. Davis,, P. A. D. Grimont,, and F. Grimont. 1977. Source of American Serratia. Lancet ii: 459– 460.
39. Farmer, J. J. III,, B. R. Davis,, and F. W. Hickman. 1976. Detection of Serratia outbreaks in hospital. Lancet ii: 455– 459.
40. Farmer, J. J. III,, F. Silva,, and D. R. Williams. 1973. Isolation of Serratia marcescens on deoxyribonuclease-toluidine bluecephalothin agar. Appl. Microbiol. 25: 151– 152.
41. Fleisch, F.,, U. Zimmermann-Baer,, R. Zbinden,, G. Bischoff,, K. Waldvogel,, D. Nadal,, and C. Ruef. 2002. Three consecutive outbreaks of Serratia marcescens in a neonatal intensive care unit. Clin. Infect. Dis. 34: 767– 773.
42. Freney, J.,, M. O. Husson,, F. Gavini,, S. Madier,, A. Martra,, D. Izard,, H. Leclerc,, and J. Fleurette. 1988. Susceptibilities to antibiotics and antiseptics of new species of the family Enterobacteriaceae. Antimicrob. Agents Chemother. 32: 873– 876.
43. Funke, G.,, and P. Funke-Kissling. 2004. Use of the BD PHOENIX automated microbiology system for direct identification and susceptibility testing of gram-negative rods from positive blood cultures in a three-phase trial. J. Clin. Microbiol. 42: 1466– 1470.
44. Gales, A. C.,, D. J. Biedenbach,, P. Winokur,, D. M. Hacek,, M. A. Pfaller,, and R. N. Jones. 2001. Carbapenem-resistant Serratia marcescens isolates producing Bush Group 2f β-lactamase (SME-1) in the United States: results from the MYSTIC Programme. Diagn. Microbiol. Infect. Dis. 39: 125– 127.
45. Garcia, D. C.,, G. M. Woloj,, S. Pineiro,, S. Sordelli,, and S. Kaufman. 1995. An 8-year study of resistance to amikacin in gram-negative bacilli isolates from patients with nosocomial infection at one hospital in Argentina. J. Med. Microbiol. 42: 283– 290.
46. Gaston, M. S.,, and T. L. Pitt. 1989. Improved O-serotyping method for Serratia marcescens. J. Clin. Microbiol. 27: 2702– 2705.
47. Gavini, F.,, C. Ferragut,, D. Izard,, P. A. Trinel,, H. Leclerc,, B. Lefebvre,, and D. A. A. Mossel. 1979. Serratia fonticola, a new species from water. Int. J. Syst. Bacteriol. 29: 92– 101.
48. Gill, V. J.,, J. J. Farmer III,, P. A. D. Grimont,, M. A. Asbury,, and C. L. McIntosh. 1981. Serratia ficaria isolated from a human clinical specimen. J. Clin. Microbiol. 14: 234– 236.
49. Glustein, J. Z.,, B. Rudensky,, and A. Abrahamov. 1994. Catheter-associated sepsis caused by Serratia odorifera biovar l in an adolescent patient. Eur. J. Clin. Microbiol. Infect. Dis. 13: 183– 184.
50. Gonzalez-Rodriguez, M.-N.,, J.-J. Sanz,, J.-A. Santos,, A. Otero,, and M.-L. Garcia-Lopez. 2002. Numbers and types of microorganisms in vacuum-packed cold-smoked freshwater fish at the retail level. Int. J. Food Microbiol. 77: 161– 168.
51. Goullet, P.,, and B. Picard. 1997. An epidemiological study of Serratia marcescens isolates from nosocomial infections by enzyme electrophoresis. J. Med. Microbiol. 46: 1019– 1028.
52. Grimont, F.,, and P. A. D. Grimont,. 1981. The genus Serratia, p. 2822– 2848. In M. P. Starr,, H. Stolp,, H. G. Truper,, and H. G. Schlegel (ed.), The Prokaryotes: a Handbook on Habitats, Isolation and Identification of Bacteria. Springer-Verlag, Berlin, Germany.
53. Grimont, P. A. D.,, and F. Grimont. 1978. Biotyping of Serratia marcescens and its use in epidemiological studies. J. Clin. Microbiol. 8: 73– 83.
54. Grimont, P. A. D.,, and F. Grimont,. 1984. Genus VIII. Serratia Bizio 1823, 288 AL, p. 477– 484. In N. R. Krieg, and, J. G. Holt (ed.) Bergey’s Manual of Systematic Bacteriology. Williams & Wilkins, Baltimore, Md.
55. Grimont, P. A. D.,, F. Grimont,, and K. Irino. 1982. Biochemical characterization of Serratia liquefaciens sensu stricto, Serratia proteamaculans, and Serratia grimesii sp. nov. Curr. Microbiol. 7: 69– 74.
56. Grimont, P. A. D.,, F. Grimont,, C. Richard,, B. R. Davis,, A. G. Steigerwalt,, and D. J. Brenner. 1978. Deoxyribonucleic acid relatedness between Serratia plymuthica and other Serratia species, with a description of Serratia odorifera sp. nov. (type strain: ICPB 3995). Int. J. Syst. Bacteriol. 28: 453– 463.
57. Grimont, P. A. D.,, F. Grimont,, and M. P. Starr. 1979. Serratia ficaria sp. nov., a bacterial species associated with Smyrna figs and the fig wasp Blastophaga psenes. Curr. Microbiol. 2: 277– 282.
58. Grimont, P. A. D.,, F. Grimont,, and M. P. Starr. 1981. Comment on the request to the judicial commission to conserve the specific epithet Serratia liquefaciens over the specific epithet proteamaculans in the name of the organism currently known as Serratia liquefaciens. Int. J. Syst. Bacteriol. 31: 211– 212.
59. Grimont, P. A. D.,, K. Irino,, and F. Grimont. 1982. The Serratia liquefaciens-S. proteamaculans-S. grimesii complex: DNA relatedness. Curr. Microbiol. 7: 63– 68.
60. Grimont, P. A. D.,, T. A. Jackson,, E. Ageron,, and M. J. Noonan. 1988. Serratia entomophila sp. nov. associated with amber disease in the New Zealand grass grub Costelytra zealandica. Int. J. Syst. Bacteriol. 38: 1– 6.
61. Grohskopf, L. A.,, V. R. Roth,, D. R. Feikin,, M. J. Arduino,, L. A. Carson,, J. I. Takars,, S. C. Holt,, B. J. Jensen,, R. E. Hoffman,, and W. R. Jarvis. 2001. Serratia liquefaciens bloodstream infections from contamination of epoetin alfa at a hemodialysis center. N. Engl. J. Med. 344: 1491– 1497.
62. Helterberg, O.,, F. Skov,, P. Berner-Smidt,, H. J. Holmes,, E. Dybkjer,, E. Gutschik,, D. Jerne,, O. B. Jepsen,, M. Weischer,, W. Frederiksen,, and H. Sorensen. 1993. Nosocomial epidemic of Serratia marcescens septicemia ascribed to contaminated blood transfusion bags. Transfusion 33: 221– 227.
63. Hengstler, K. A.,, R. Hammann,, and A.-M. Fahr. 1997. Evaluation of BBL CHROMagar orientation medium for detection and presumptive identification of urinary tract pathogens. J. Clin. Microbiol. 35: 2773– 2777.
64. Hertle, R.,, M. Hilger,, S. Weingardt-Kocher,, and I. Walev. 1999. Cytotoxic action of Serratia marcescens hemolysin on human epithelial cells. Infect. Immun. 67: 817– 825.
65. Hindler, J. A. 1995. Antimicrobial susceptibility testing of gram-negative bacteria: meeting the challenge of increasing resistance and decreasing budget. Clin. Microbiol. Newsl. 17: 77– 80.
67. Hohl, P.,, J. Luthy-Hottenstein,, J. Zollinger-Iten,, and M. Altwegg. 1990. In vitro activities of fleroxacin, cefetamet, ciprofloxacin, ceftriaxone, trimethoprim-sulfamethoxazole, and amoxicillin-clavulanic acid against rare members of the family Enterobacteriaceae primarily of human (clinical) origin. Antimicrob. Agents Chemother. 34: 1605– 1608.
69. Horowitz, H. W.,, R. B. Nadelman,, K. G. Van Horn,, S. E. Weekes,, L. Goyburu,, and G. P. Wormser. 1987. Serratia plymuthica sepsis associated with infection of central venous catheter. J. Clin. Microbiol. 25: 1562– 1563.
70. Hoyen, C.,, L. Rice,, S. Conte,, M. R. Jacobs,, M. Walsh-Sukys,, and P. Toltzis. 1999. Use of real time pulsed-field gel electrophoresis to guide interventions during a nursery outbreak of Serratia marcescens infection. Pediatr. Infect. Dis. J. 18: 357– 360.
71. Hsieh, S.,, and F. E. Babl. 1999. Serratia marcescens cellulitis following an iguana bite. Clin. Infect. Dis. 28: 1181– 1182.
72. Hume, E. B. H.,, M. D. P. Willcox,, D. F. Sweeney,, and B. A. Holden. 1996. An examination of the clonal variants of Serratia marcescens that infect the eye during contact lens wear. J. Med. Microbiol. 45: 127– 132.
73. Ito, H.,, Y. Arakawa,, S. Ohsuka,, R. Wacharotayankun,, N. Kato,, and M. Ohta. 1995. Plasmid-mediated dissemination of the metallo-β-lactamase gene bla IMP among clinically isolated strains of Serratia marcescens. Antimicrob. Agents Chemother. 39: 824– 829.
74. Itskowitz, M. S.,, R. Watkins,, and V. Banks. 2004. Serratia brain abscess in a patient with diabetes mellitus. Infect. Med. 21: 90– 92.
75. Jacoby, G. A.,, and A. A. Medeiros. More extended-spectrum β-lactamases. Antimicrob. Agents Chemother. 35: 1697– 1704.
76. Jones, R. N.,, E. N. Kehrberg,, M. E. Erwin,, S. C. Anderson, and the Fluoroquinolone Resistance Surveillance Group. 1994. Prevalence of important pathogens and antimicrobial activity of parenteral drugs at numerous medical centers in the United States. Diagn. Microbiol. Infect. Dis. 19: 203– 215.
77. Jossart, M.-F.,, and R. J. Courcol. 1999. Evaluation of an automated system for identification of Enterobacteriaceae and nonfermenting bacilli. Eur. J. Clin. Microbiol. Infect. Dis. 18: 902– 907.
78. Karlowsky, J. A.,, M. E. Jones,, D. C. Mayfield,, C. Thornsberry,, and D. F. Sahm. 2002. Ceftriaxone activity against gram-positive and gram-negative pathogens isolated in US clinical microbiology laboratories from 1996 to 2000: results from The Surveillance Network (TSN) database-USA. Int. J. Antimicrob. Agents 19: 413– 426.
79. Karlowsky, J. A.,, M. E. Jones,, C. Thornsberry,, I. R. Friedland,, and D. F. Sahm. 2003. Trends in antimicrobial susceptibilities among Enterobacteriaceae isolated from hospitalized patients in the United States from 1998 to 2001. Antimicrob. Agents Chemother. 47: 1672– 1680.
80. Klein, N. C.,, and B. A. Cunha. 1995. Tetracyclines. Med. Clin. North Am. 79: 789– 801.
81. Kunimoto, D.,, R. Rennie,, D. M. Citron,, and E. J. C. Goldstein. 2004. Bacteriology of a bear bite wound to a human: case report. J. Clin. Microbiol. 42: 3374– 3376.
82. Kurz, C. L.,, S. Chauvet,, E. Andres,, M. Aurouze,, I. Vallet,, G. P. F. Michel,, M. Uh,, J. Celli,, A. Filloux,, S. de Bentzman,, I. Steinmetz,, J. A. Hoffmann,, B. B. Finlay,, J.-P. Grovel,, D. Ferrandon,, and J. J. Ewbank. 2003. Virulence factors of the human opportunistic pathogen Serratia marcescens identified by in vivo screening. EMBO J. 22: 1451– 1460.
83. Kuzina, L. V.,, J. J. Peloquin,, D. C. Vacek,, and T. A. Miller. 2001. Isolation and identification of bacteria associated with adult laboratory Mexican fruit flies, Anastrepha ludens (Diptera: Tephritidae). Curr. Microbiol. 42: 290– 294.
84. Lass, J. H.,, J. Haaf,, C. Foster,, and C. Belcher. 1981. Visual outcome in eight cases of Serratia marcescens keratitis. Am. J. Ophthalmol. 92: 384– 390.
85. Lautenbach, E.,, B. L. Strom,, I. Nachamkin,, W. B. Bilker,, A. M. Marr,, L. A. Larosa,, and N. O. Fishman. 2004. Longitudinal trends in fluoroquinolone resistance among Enterobacteriaceae isolates from inpatients and outpatients, 1989-2000: difference in the emergence and epidemiology of resistance across organisms. Clin. Infect. Dis. 38: 655– 662.
86. Letoffe, S.,, J. M. Ghigo,, and C. Wandersman. 1994. Iron acquisition from heme and hemoglobin by a Serratia marcescens extracellular protein. Proc. Natl. Acad. Sci. USA 91: 9876– 9880.
87. Libby, K. J. 1980. Infection with Serratia rubidaea. Clin. Microbiol. Newsl. 2: 4.
88. Lindberg, A.-M.,, A. Ljungh,, S. Ahrne,, S. Lofdahl,, and G. Molin. 1998. Enterobactericeae found in high numbers in fish, minced meat and pasteurized milk or cream and the presence of toxin encoding genes. Int. J. Food Microbiol. 39: 11– 17.
89. Ling, T. K. W.,, P. C. Tam,, Z. K. Liu,, and A. F. B. Cheng. 2001. Evaluation of VITEK 2 Rapid identification and susceptibility testing system against gram-negative clinical isolates. J. Clin. Microbiol. 39: 2964– 2966.
90. Lortholary, O.,, M. Tod,, Y. Cohen,, and O. Petitjean. 1995. Aminoglycosides. Med. Clin. North Am. 79: 761– 789.
91. Marre, R.,, J. Hacker,, and V. Braun. 1989. The cell-bound hemolysis of Serratia marcescens contributes to uropathogenicity. Microb. Pathog. 7: 153– 157.
92. Marty, K. B.,, C. L. Williams,, L. J. Guynn,, M. J. Benedik,, and S. R. Blanke. 2002. Characterization of a cytotoxic factor in culture filtrates of Serratia marcescens. Infect. Immun. 70: 1121– 1128.
93. Mayhall, C. G. 2003. The epidemiology of burn wound infections: then and now. Clin. Infect. Dis. 37: 543– 550.
94. McGeer, A.,, D. E. Low,, J. Penner,, J. Ng,, C. Goldman,, and A. E. Simor. 1990. Use of molecular typing to study the epidemiology of Serratia marcescens. J. Clin. Microbiol. 28: 55– 58.
95. Mermel, L. A.,, and C. A. Spiegel. 1992. Nosocomial sepsis due to Serratia odorifera biovar l. Clin. Infect. Dis. 14: 208– 210.
96. Nakashima, A. K.,, A. K. Highsmith,, and W. J. Martone. 1987. Survival of Serratia marcescens in benzalkonium chloride and in multiple-dose medication vials: relationship to epidemic septic arthritis. J. Clin. Microbiol 25: 1019– 1021.
97. Nakashima, A. K.,, M. McCarthy,, W. J. Martone,, and R. L. Anderson. 1987. Epidemic septic arthritis caused by Serratia marcescens and associated with a benzalkonium chloride antiseptic. J. Clin. Microbiol. 25: 1014– 1018.
98.. National Nosocomial Infection Surveillance System. 1998. http://www.cdc.gov/ncidod/hip/surveill/NNIS.htm.
99. Novak, S. S.,, and R. A. Seigel. 1986. Gram-negative septicemia in American alligators ( Alligator mississippiensis) J. Wildl. Dis. 22: 484– 487.
100. O’Hara, C. M.,, and J. M. Miller. 2000. Evaluation of the MicroScan Rapid Neg ID3 panel for identification of Enterobacteriaceae and some common gram-negative nonfermenters. J. Clin. Microbiol. 33: 3577– 3580.
101. O’Hara, C. M.,, and J. M. Miller. 2003. Evaluation of the Vitek 2 ID-GNB assay for identification of members of the family Enterobacteriaceae and other nonenteric gram-negative bacilli and comparison with the Vitek GNI+ card. J. Clin. Microbiol. 41: 2096– 2101.
102. Ohkusu, K. 2000. Cost-effective and rapid presumptive identification of gram-negative bacilli in routine urine, pus, and stool cultures: evaluation of the use of CHROMagar orientation medium in conjunction with simple biochemical tests. J. Clin. Microbiol. 38: 4586– 4592.
103. Osano, E.,, Y. Arakawa,, R. Wacharotayankun,, M. Ohta,, T. Horii,, H. Ito,, F. Yoshimura,, and N. Kato. 1994. Molecular characterization of an enterobacterial metallo-β-lactamase found in a clinical isolate of Serratia marcescens that shows imipenem resistance. Antimicrob. Agents Chemother. 38: 71– 78.
104. Osterblad, M.,, O. Pensala,, M. Peterzens,, H. Heleniusc,, and P. Huovinen. 1999. Antimicrobial susceptibility of Enterobacteriaceae isolated from vegetables. J. Antimicrob. Chemother. 43: 503– 509.
105. Ostrowsky, B. E.,, C. Whitener,, H. K. Bredenberg,, L. A. Carson,, S. Holt,, L. Hutwagner,, M. J. Arduino,, and W. R. Jarvis. 2002. Serratia marcescens bacteremia traced to an infused narcotic. N. Engl. J. Med. 346: 1529– 1537.
106. Pancoast, S. J. 1988. Aminoglycoside antibiotics in clinical use. Med. Clin. North Am. 72: 581– 612.
107. Parment, P. A.,, C. Svanborg-Eden,, and M. J. Chaknis. 1992. Hemagglutination (fimbriae) and hydrophobicity in adherence of Serratia marcescens to urinary tract epithelium and contact lenses. Curr. Microbiol. 25: 113– 118.
108. Passaro, D. J.,, L. Waring,, R. Armstrong,, F. Bolding,, B. Bouvier,, J. Rosenberg,, A. W. Reingold,, M. McQuitty,, S. M. Philpott,, W. R. Jarvis,, S. B. Werner,, L. S. Tompkins,, and D. J. Vugia. 1997. Postoperative Serratia marcescens wound infections traced to an out-of-hospital source. J. Infect. Dis. 175: 992– 995.
109. Patton, T. G.,, S. Katz,, R. J. Sobieski,, and S. S. Crupper. 2001. Genotyping of clinical Serratia marcescens isolates: a comparison of PCR-based methods. FEMS Microbiol. Lett. 194: 19– 25.
110. Pfaller, M. A.,, and R. N. Jones. 1997. A review of the in vitro activity of meropenem and comparative antimicrobial agents tested against 30, 254 aerobic and anaerobic pathogens isolated world wide. Diagn. Microbiol. Infect. Dis. 28: 157– 163.
111. Pfaller, M. A.,, R. N. Jones,, D. J. Biedenbach, and the MYSTIC Program Study Group (USA). 2001. Antimicrobial resistance trends in medical centers using carbapenems: report of 1999 and 2000 results from the MYSTIC Program (USA). Diagn. Microbiol. Infect. Dis. 41: 177– 182.
112. Pfaller, M. A.,, R. N. Jones,, S. A. Marshall,, S. L. Coffman,, R. J. Hollis,, M. B. Edmond,, and R. P. Wenzel. 1997. Inducible Amp C β-lactamase producing gram-negative bacilli from blood stream infections: frequency, antimicrobial susceptibility, and molecular epidemiology in a national surveillance program (SCOPE). Diagn. Microbiol. Infect. Dis. 28: 211– 219.
113. Pien, F. D.,, and J. J. Farmer III. 1983. Serratia ficaria isolated from a leg ulcer. South. Med. J. 76: 1591– 1592.
114. Public Health Laboratory Service. 2002. Klebsiella spp, Enterobacter spp, Serratia spp, and Citrobacter spp from bacteraemias, England and Wales 2001. Commun. Dis. Rep. CDR Wkly. [Online.] http://hpa.org.uk/cdr/PDFfiles/2002/cdr2002.pdf.
115. Quentin, C.,, C. Arpin,, V. Dubois,, C. Andre,, I. Lagrange,, I. Fischer,, J.-P. Brochet,, F. Grobost,, J. Julin,, B. Dutilh,, G. Larribet,, and P. Noury. 2004. Antibiotic resistance rates and phenotypes among isolates of Enterobacteriaceae in French extra-hospital practice. Eur. J. Clin. Microbiol. Infect. Dis. 23: 185– 193.
116. Ramos, J. M.,, R. Fernandez-Roblas,, I. Gadea,, M. Cuenca-Estrella,, and F. Soriano. 1995. Nosocomially acquired bacteremia caused by Serratia plymuthica. Clin. Microbiol. Newsl. 17: 156– 157.
117. Rasmussen, B. A.,, and K. Bush. 1997. Carbapenemhydrolyzing β-lactamases. Antimicrob. Agents Chemother. 41: 223– 232.
118. Reina, J.,, N. Borrell,, and I. Llompart. 1992. Community-acquired bacteremia caused by Serratia plymuthica case report and review of the literature. Diagn. Microbiol. Infect. Dis. 15: 449– 452.
119. Roberts, F. J.,, I. W. Geere,, and A. Coldman. 1991. A three-year study of positive blood cultures, with emphasis on prognosis. Rev. Infect. Dis. 13: 34– 46.
120. Robinson, A.,, Y. S. McCarter,, and J. Tetreault. 1995. Comparison of Crystal Enteric/Nonfermenter system, API 20E system, and Vitek Automicrobic system for identification of gram-negative bacilli. J. Clin. Microbiol. 33: 364– 370.
121. Saito, H.,, L. Elting,, G. P. Bodey,, and P. Berkey. 1989. Serratia bacteremia: review of 118 cases. Rev. Infect. Dis. 11: 912– 920.
122. Sanders, C. C.,, and W. E. Sanders, Jr. 1992. β-Lactam resistance in gram-negative bacteria: global trends and clinical impact. Clin. Infect. Dis. 15: 824– 839.
123. Schaberg, D. P.,, D. H. Culver,, and R. P. Gaynes. 1991. Major trends in the microbial etiology of nosocomial infection. Am. J. Med. 91( Suppl. 3B): 72S– 75S.
124. Sherley, M.,, D. M. Gordon,, and P. J. Collingnon. 2003. Species differences in plasmid carriage in the Enterobacteriaceae. Plasmid 49: 79– 85.
125. Sifuentes-Osornia, J.,, G. M. Ruiz-Palacios,, and D. H. M. Groschel. 1986. Analysis of epidemiologic markers of nosocomial Serratia marcescens isolates with special reference to the Grimont biotyping system. J. Clin. Microbiol. 23: 230– 234.
126. Sirot, D. L.,, F. W. Goldstein,, C.J. Soussy,, A. L. Courtieu,, M. O. Husson,, J. Lemozy,, M. Meyran,, C. Morel,, R. Perez,, C. Quentin-Noury,, M. E. Reverdy,, J. M. Scheftel,, M. Rosembaum,, and Y. Rezvani. 1992. Resistance to cefotaxime and seven other β-lactams in members of the family Enterobacteriaceae: a 3-year survey in France. Antimicrob. Agents Chemother. 36: 1677– 168l.
127. Sokalski, S. J.,, M. A. Jewell,, A. C. Asmus-Shillington,, J. Mulcahy,, and J. Segreti. 1992. An outbreak of Serratia marcescens in 14 adult cardiac surgical patients associated with 12-lead electrocardiogram bulbs. Arch. Intern. Med. 152: 841– 844.
128. Starr, M. P.,, P. A. D. Grimont,, F. Grimont,, and P. B. Starr. 1976. Caprylate-thallous agar medium for selectively isolating Serratia and its utility in the clinical laboratory. J. Clin. Microbiol. 4: 270– 276.
129. Stephen, M.,, and M. K. Lalitha. 1993. An outbreak of Serratia marcescens infections among obstetric patients . Indian J. Med. Res. 97: 202– 205.
130. Steppberger, K.,, S. Walter,, M. C. Claros,, F. B. Spencker,, W. Kiess,, A. C. Rodloff,, and C. Vogtmann. 2002. Nosocomial neonatal outbreak of Serratia marcescens—analysis of pathogens by pulsed-field gel electrophoresis and polymerase chain reaction. Infection 30: 277– 281.
131. Stock, I.,, S. Burak,, K. J. Sherwood,, T. Gruger,, and B. Wiedemann. 2003. Natural antimicrobial susceptibilities of strains of ‘unusual’ Serratia species: S. ficaria, S. fonticola, S. odorifera, S. plymuthica, and S. rubidaea. J. Antimicrob. Chemother. 51: 865– 885.
132. Szewzyk, U.,, R. Szewzyk,, and R. Stenstron. 1993. Growth and survival of Serratia marcescens under aerobic and anaerobic conditions in the presence of materials from blood bags. J. Clin. Microbiol. 31: 1826– 1830.
133. Theccanat, G.,, L. Hirschfield,, and H. Isenberg. 1991. Serratia marcescens meningitis. J. Clin. Microbiol. 29: 822– 823.
134. Thornsberry, C. 1994. Susceptibility of clinical bacterial isolates to ciprofloxacin in the United States. Infection 22: S80– S89.
135. Thornton, S. M.,, S. Nolan,, and F. M. D. Gulland 1998. Bacterial isolates from California sea lions ( Zalophus californianus), harbor seals, ( Phoca vitulina), and northern elephant seals ( Mirounga angustirostris) admitted to a rehabilitation center along the central California coast, 1994-1995. J. Zoo Wildl. Med. 29: 171– 176.
136. Tzouvelekis, L. S.,, E. Tzelepi,, A. F. Mentis,, and N. J. Legakis. 1995. In vitro activity of cefpirome against selected clinical enterobacterial isolates with β-lactamase-mediated resistance. Infection 23: 384– 388.
137. Ursua, P. R.,, M. J. Unzaga,, P. Melera,, I. Iturbura,, C. Expeleta,, and R. Cisterna. 1996. Serratia rubidaea as an invasive pathogen. J. Clin. Microbiol. 34: 216– 217.
138. Vandenbrouck-Grauls, C. M. J. E.,, A. C. M. Baars,, M. R. Visser,, P. F. Hulstaert,, and J. Verhoef. 1993. An outbreak of Serratia marcescens traced to a contaminated bronchoscope. J. Hosp. Infect. 23: 263– 270.
139. Vartian, C. V.,, and E. J. Septimus. 1989. Septic bursitis caused by gram-negative bacilli. J. Infect. Dis. 160: 908.
140. Viswanathan, P.,, and R. Kaur. 2001. Prevalence and growth of pathogens on salad vegetables, fruits and sprout. Int. J. Hyg. Environ. Health 203: 205– 213.
141. Walker, G.,, R. Hertle,, and V. Braun. 2004. Activation of Serratia marcescens hemolysin through a conformational change. Infect. Immun. 72: 611– 614.
142. Watanakunakorn, C. 1989. Serratia bacteremia: a review of 44 episodes. Scand. J. Infect. Dis. 21: 477– 483.
143. Wisplinghoff, H.,, T. Bischoff,, S. M. Tallent,, H. Seifert,, R. P. Wenzel,, and M. B. Edmond. 2004. Nosocomial bloodstream infections in US hospitals: analysis of 24,179 cases from a prospective nationwide surveillance study. Clin. Infect. Dis. 39: 309– 317.
144. Woodfield, D. G. 1991. Transfusion acquired Serratia liquefaciens septicemia. N. Z. Med. J. 104: 141.
145. Wright, C.,, S. D. Kominos,, and R. B. Yee. 1976. Enterobacteriaceae and Pseudomonas aeruginosa recovered from vegetable salads. Appl. Environ. Microbiol. 31: 453– 454.
146. Yannelli, B.,, P. E. Schoch,, and B. A. Cunha. 1987. Serratia marcescens. Clin. Microbiol. Newsl. 9: 157– 160.
147. Yoo, J.-H.,, J.-H. Choi,, W.-S. Shin,, D.-H. Huh,, Y.-K. Cho,, K.-M. Kim,, M.-Y. Kim,, and M.-W. Kang. 1999. Application of infrequent-restriction-site PCR to clinical isolates of Acinetobacter baumannii and Serratia marcescens. J. Clin. Microbiol. 37: 3108– 3112.
148. Yu, V. L. 1979. Serratia marcescens: historical perspective and clinical review. New Engl. J. Med. 300: 887– 893.
149. Zaidi, M.,, J. Sifuentes,, M. Bobadilla,, D. Moncada,, and S. Ponce de Leon. 1989. Epidemic of Serratia marcescens bacteremia and meningitis in a neonatal unit in Mexico City. Infect. Control Hosp. Epidemiol. 10: 14– 20.
150. Zbinden, R.,, and R. Blass. 1988. Serratia plymuthica osteomyelitis following a motorcycle accident. J. Clin. Microbiol. 26: 1409– 1410.
151. Zipper, R. P.,, M. A. Bustamante,, and R. Khatib. 1996. Serratia marcescens: a single pathogen in necrotizing fasciitis. Clin. Infect. Dis. 23: 648– 649. | 2019-04-22T04:27:07Z | http://www.asmscience.org/content/book/10.1128/9781555817541.chap10 |
What is the power Jesus was speaking of? It is the power to hear from God, to speak in tongues, prophesy, do signs, miracles, and wonders, and much more. In short, we can bring into evidence, into manifestation, the gift of holy spirit inside us. The gift of holy spirit, the divine nature, that is sealed in each Christian, cannot be detected by the five senses. No one can see, hear, smell, taste, or touch it. However, holy spirit inside can be manifested, brought forth into evidence, in the nine ways set forth in 1 Corinthians 12:8–10.
The word “manifestation” is a good translation of the Greek word phanerosis, which means “a manifestation, a making visible or observable.”1 Manifestation comes from two Latin words: manus = hand and festare = to touch. A manifestation is detectable by the five senses. We experience manifestations all the time. Electric energy in a light bulb is manifested in the form of light and heat. A manifestation of the chicken pox disease is a rash with small pimple‑like sores. We cannot see the virus that causes the chicken pox, but we can see the manifestation of the disease.
The multipurpose “Swiss Army” knife is a good example of the difference between a gift and a manifestation. The traditional knives have red handles, and many come with two blades (big and little), two screwdrivers (flathead and Phillips), a can opener, an awl, scissors, a file, and a pair of tweezers (Nine manifestations!). If you receive one multipurpose knife as a gift, you can use (bring into manifestation) any or all of its implements, and cut, snip, tweeze, etc. The one gift has many manifestations. Similarly, the one gift God gives each believer is holy spirit, which can be manifested in nine ways.
The examples of the light bulb, chicken pox, and Swiss Army knife are intended to show the difference between a gift and a manifestation, and every example has limitations. The examples are intended to make the point that there can be one gift with many manifestations, and when a person has the gift, he has the capacity to manifest it.
The gift of holy spirit is not observable or detectable by our five senses. Its presence inside the Christian becomes known when it is manifested, made obvious, in the senses world.2 It may be obvious only to the one with holy spirit, such as when God gives a message of knowledge to someone, and that message is known only by the one receiving it, but it is obvious in the senses world nonetheless.
The Bible says that to “each one” (1 Cor. 12:7) is given the manifestation of the spirit. Each and every Christian can manifest holy spirit because each Christian has holy spirit. We know there are many Christians who have never manifested the gift of holy spirit in a way that they themselves recognize, and this has caused them to doubt that they can. We trust that this book presents convincing evidence that a Christian can manifest holy spirit even if he has never done so.
(10) and to another [allos] working of miracles; to another [allos] prophecy; to another [allos] discerning of spirits; to a different one [heteros] various kinds of tongues; and to another [allos] the interpretation of tongues.
We will study each of these manifestations separately, but before we do, we need to address some basics about the manifestations. First, these verses seem to indicate that each Christian gets only one manifestation, something that has confused many people. Even though these verses use the term, “to another,” it does not mean that each person will manifest only one of the manifestations. As we have seen somewhat already, and will see in much more detail later, every person can manifest all nine manifestations. However, not everyone will manifest the spirit in the same way at any given time and place. To make sure that things in the Church are done “decently and in order” (1 Cor. 14:40 KJV), at any given time the Lord energizes different manifestations in different believers. Thus at a Christian meeting, one person will speak in tongues and interpret, another will prophesy, another will minister healing, etc. 4It is important to point out that believers need to step out on what the Lord is energizing in them. It often happens that he is working in someone to pray, speak in tongues and interpret, prophesy, etc., but the person will be too timid to step forth and manifest. The Lord will do his part, we need to be sure we are doing ours.
Second, the Bible specifically says that the manifestation of holy spirit is for the “common good.” Some benefit is missed, or some consequence occurs, when Christians do not walk with the power of the manifestations of holy spirit. Imagine the Bible with no such manifestations—no record of Moses smiting the rock, or Joshua stopping the Jordan River, or Samson pushing down the pagan temple, or God telling Samuel to anoint Saul as king, or Elijah calling down fire from heaven [See Segment 12 of our class: One Day With The Creator], or God telling Jonah to go to Nineveh.
The Bible would be much less exciting and would bring much less hope and blessing if the power of God were absent from its pages. Had Ananias not walked in the power of the manifestations, he would not have had the blessing of healing Paul (Acts 9:10–18). Had Peter not walked in the power of the manifestations, he would not have had the blessing of being the first to lead Gentiles into the New Birth (Acts 10:9–46). If Paul had not walked in the power of the manifestations, Eutychus would have remained dead (Acts 20:9–12). If a Christian does not speak in tongues, he misses out on the fact that it is a sign from God that he is saved (1 Cor. 14:22). Similarly, if the manifestations are absent or misused, there are consequences. If everyone in the congregation speaks in tongues at the same time, for example, an unbeliever may get the wrong impression (1 Cor. 14: 23).
Third, we must take note that God has placed the manifestations into three groups, or categories. In the above verses most versions read “to another” eight times. However, there are actually two different Greek words, allos and heteros, translated “to another.” In Greek, allos was generally used to express a numerical difference and denotes “another of the same sort,” while heteros means a qualitative difference and denotes “another of a different sort.” When a list is put together, and the items are said to be allos, they are of the same kind or nature. When they are said to be heteros, they are different in nature. Thus, what we see in this section is God separating the manifestations into three groups, separated by the word heteros, which we showed in brackets when we quoted the verses.5 In our translation, we used “another” when the Greek word was allos, and “different one” when it was heteros.
As we study the groupings of the manifestations, it is clear that two of them are revelation (hearing from God), five are related to the power of God, and two are worship oriented.
[We highly recommend our foundational class: One Day With The Creator, Segment 20, Parts one & two, titled “The Manifestations of Holy Spirit.”] Before we examine these manifestations separately, we need to be aware that they are listed separately in the Bible and discussed separately in this book for the sake of clarity. God never intended them to be separate and distinct in the lives of the believers who experience them. He is our Father and He wants a relationship with us, and He wants us to be effective fellow-workers with Him (1 Cor. 3:9). In order to do that, we must be able to worship God (the worship group), hear from Him (the revelation group), and work for Him (the power group). In the day‑to‑day life of a believer who is striving to love God, live a holy life, and do God’s will, the manifestations will often work seamlessly and result in great blessing for the believer and the people affected. For example, a Christian woman, Susan, may be by herself enjoying worshipping God by singing in tongues to some Christian music she is playing. Then the phone rings and it is her friend who needs prayer because many things seem to be going wrong in her life and today she is sick. Susan immediately feels the leading of the Lord to pray for specifics about her friend’s life (the revelation manifestations at work) and then commands healing to take place in the name of Jesus Christ (faith and healing). By the time she gets off the phone, her friend is feeling better.
In the above scenario, Susan did not think to herself, “Now I need a message of knowledge. Now I need a message of wisdom, Now I need faith. Now I need the manifestation of gifts of healings.” No, she had a relationship with God and love for her friend, and the manifestations worked together to produce the “common good” mentioned in 1 Corinthians 12:7.
The manifestations work together, but it is still important to understand them individually. For years, scholars have discussed the manifestations of holy spirit and there are many differing opinions. The reason for the discussion and the uncertainty is that the manifestations are not clearly defined in 1 Corinthians. There is a good reason for this. It is common in all writing that authors leave out details and descriptions that everyone knows. Books and magazines are full of words that refer to things that in other cultures or ages may not be understood. Writers today commonly mention cars, planes, the Internet, and thousands of other things that we do not explain in detail because the readers know what they are. There are many examples of this in the Bible also.
A good example occurs in Luke, where, in his day, Luke did a good job of dating the birth of Christ by telling us it was about the time of the first census that took place while Quirinius was governor of Syria (Luke 2:2). No doubt everyone in Luke’s day who read that said, “Ah, now I know when the birth of Christ occurred.” Today, however, not much information about Quirinius has survived the centuries, and so there is controversy about the date of the birth of Christ.
Nevertheless, the Bible never describes them because the biblical readers knew exactly who they were and where they lived.
The people of Corinth and other Christians in the first century were familiar with the manifestations of holy spirit, so there was no need for Paul to explain what they were or how they worked. God’s people had been manifesting holy spirit for generations (except for speaking in tongues and interpretation of tongues, with which the Corinthian Church was very familiar). God had put holy spirit upon people in the Hebrew Scriptures such as Moses, Joshua, Deborah, David, Elijah, and many others, and those people could then hear knowledge or wisdom from God (thus, the message of knowledge and wisdom). They had the faith to do what God asked of them even when it seemed impossible, they did miracles, and when Jesus came on the scene, he taught his disciples to heal and cast out demons. The believers of Corinth were familiar with all these manifestations, and of course Paul, who founded the Church in Corinth on his second missionary journey (Acts 18:1–18), had also instructed them.
Some scholars have tried to look in Greek culture to find the meaning of the manifestations based on the definitions of the Greek words themselves (for example, “wisdom” was very important in the Greek culture). That misses the point, and for the most part has been unhelpful in discovering the nature of the manifestations, and is one reason why there is so much debate about the manifestations by scholars. The manifestations were not Greek experiences or concepts, but the timeless manifestations, outward evidences, of the inward presence of holy spirit. These manifestations were not to be found in Greek culture, vocabulary, or history, but in the experiences of the men and women of God.
English culture today is somewhat similar to the Greek culture in that there has been very little accurate exposure to the power of holy spirit and very little accurate teaching on it. Therefore, we need a clear explanation of the manifestations so we can understand them. As the Greeks of old, we need to get our understanding from the Bible itself and then add to our understanding by utilizing and experiencing the manifestations. We will start our study of the manifestations by giving a basic definition for each of them, and then examining them in more detail.
A message of wisdom is God or the Lord Jesus Christ providing you with direction, or how to apply the knowledge you have about something.
The manifestation of faith is you having the confidence or trust that what God or the Lord Jesus Christ has revealed to you by a message of knowledge or a message of wisdom will come to pass at your command.
The manifestation of gifts of healings is you exercising your God‑given spiritual ability to heal by the power of God, according to what God or the Lord Jesus Christ has revealed to you by a message of knowledge or a message of wisdom.
The manifestation of working of miracles is you exercising your God‑given spiritual ability to do miracles by the power of God, according to what God or the Lord Jesus Christ has revealed to you by a message of knowledge or a message of wisdom.
Discerning of spirits is God or the Lord Jesus Christ revealing to you information about the presence or non‑presence of spirits (including both holy spirit or demons), and sometimes including the identity of demons present, whether or not you may cast them out, and providing the power to do it.
It is very important to realize that when the Bible says “manifestation of the spirit” it means exactly that—these are evidences of holy spirit, not natural abilities God has given to the person. They are the presence of holy spirit being made visible. We make this point because some people treat these manifestations as if they were talents that some people have, with no specific connection to the gift of holy spirit they received when they were saved. It is true that God does give different people talents. Some people sing well; some people are very athletic; some are very intelligent; some people are great artists, etc. These are all God‑given talents, but they are not manifestations of holy spirit.
We will cover the two “revelation” manifestations together because they are the first group of manifestations God mentions. They often work seamlessly together, with a single revelation from God consisting of both a message of knowledge and a message of wisdom. We call these the “revelation” manifestations because they deal with God or the Lord Jesus “revealing” something. We translate these manifestations as a “message” because the Greek word logos means an intelligible communication. The first definition of logos in Thayer’s Greek Lexicon is “a word, yet not in the grammatical sense (equivalent to vocabulum, the mere name of an object), but language, vox, i.e., a word which, uttered by the living voice, embodies a conception or idea.”8 The NIV uses “message,” and other versions, such as the RSV, NRSV, and NJB, use “utterance,” which would be fine as long as it is understood that it is the Lord who “utters” the message to the person and not that the person speaks a message of wisdom to someone else.
The translation “message” communicates accurately exactly what the Lord gives by revelation: a message. The message may come as an audible voice, as a picture or vision, as a physical sensation, or even as a firm realization, an inner knowing. The King James Version says “word of wisdom” and “word of knowledge” and so those terms are widely used, and “word” is used for “message” in Christian jargon. Nevertheless, it could be misleading to a new Bible student who might think of revelation as “words,” especially because in our experience the majority of the revelation any person receives is not a “word” and not even by “words,” but much more often by an impression or picture.
The prophets had holy spirit upon them, which is why they could hear from God and then powerfully act on what He said, and why they were so revered in their culture. It is possible for God to speak to people audibly, and not via the holy spirit upon or in them, but this is rare. When God wanted to communicate to people, He usually did so via holy spirit. That is why, as we saw in Chapter 3, all through the Hebrew Scriptures and the Gospels, when God wanted a person to prophesy or, like Joseph, to be a wise ruler, He put holy spirit on him. Today, many Christians realize that it is possible to hear from God, and there are a number of books available on the subject by popular preachers.10 It is a great blessing that today, in the Administration of Grace, each and every Christian can hear from God and the Lord Jesus Christ.
When we speak of revelation from God, a message of knowledge or wisdom, we are speaking of God or the Lord Jesus giving direct revelation to the person via holy spirit. Sometimes people point out that God “speaks” via other people’s advice, or nature, etc. He can “speak” to us that way, but that kind of communication from God is not a manifestation of holy spirit. Furthermore, a message of wisdom or knowledge is the Lord giving information to the believer, not the believer giving it to others. The Living Bible, for example, calls “a message of wisdom,” “…the ability to give wise advice.…” Many people, saved and unsaved, give wise advice. That is not a manifestation of holy spirit. The manifestation of a message of wisdom occurs when God gives a Christian a message about what to do in a given situation via the gift of holy spirit.
As we saw from its definition above, the manifestation of a message of knowledge is when God or the Lord Jesus Christ gives a believer information about something. It may be only a little bit of information, but it is knowledge nevertheless. A good example would be Joseph interpreting Pharaoh’s dream (Gen. 41:25–27). God gave Joseph knowledge about the meaning of the dream, which was that there would be seven years of plenty, then seven years of famine. That revelation is a message of knowledge because it only gives information, the facts of the case.
It is important to realize and keep in mind that a message of knowledge and a message of wisdom are manifestations of holy spirit, and are not part of the natural human mind. They work together with the human mind, but they are separate from it. They are not superior knowledge, insight, awareness, or wisdom, which comes from the ability of the mind. Many unsaved people have great knowledge and wisdom, but these are not manifestations of holy spirit. Neither is it giving knowledge or wise advice to someone else, for many unsaved people give wise counsel to others.
A message of knowledge and a message of wisdom are God “speaking” to us to guide and help us. It is inconceivable that He would not do that for each and every Christian. Surely He would not give guidance to one Christian and not to another. Every Christian can, and needs to, manifest holy spirit in these two ways to live a rich and successful Christian life. No doubt most Christians have heard from God via the manifestations without even realizing it. Although there are times when God gives a message of knowledge or wisdom in such a clear and powerful way that it cannot be missed, usually God speaks in a “gentle whisper” or “a still small voice” (1 Kings 19:12 NIV, KJV).
An example of the Lord giving a very clear and powerful message of knowledge and wisdom was when the Lord wanted Peter to go to the Gentiles and present the Christian message to them. The Lord gave Peter a vision and an audible revelation (Acts 10:11–13). However, in our experience, the whisper of God can be so gentle, so quiet, that often we cannot distinguish it from our own thoughts. This is especially true in these modern times when there is probably music or television in the background, and we are so busy and distracted that we are not really paying attention to Him. That is a major reason why the definition of a message of knowledge and a message of wisdom is “God or the Lord Jesus Christ providing to you” information or direction. The Lord “provides” the information or direction, but sometimes we do not recognize it for what it is. Many times it is only after the fact that we recognize that the “thought” we had was actually revelation from the Lord.
Sometimes it is because of the timing of a thought or idea that we come to recognize it as revelation. Many Christians have the experience of doing something that turns out to be at “just the right time.” A believer may “get the idea” to call a friend that he has not called in a long time, only to find out when he is on the phone that the timing of the call was so godly that the “idea” had to have come from the Lord. A person may “feel an urge” to stop by someone’s house when he is on his way home from work, only to find that the timing of the visit was so perfect that the “urge” had to be revelation. Although sometimes these things happen by coincidence, a Christian endeavoring to walk with God and bless people will recognize them happening too frequently for that to always be the case. Often he will be able to think back to the “idea” or the “urge” and begin to recognize that it was somehow different from a “normal thought,” even though he did not recognize that at the time.
In the above examples the Lord gave the revelation at just the right time, and the effect of the believer acting on the revelation he received was that people were helped and blessed. This is a good example of how the manifestations work for the “common good” (1 Cor. 12:7). It is often when there is a tangible blessing in the Body of Christ that people recognize that the Lord is at work in those Christians who walk by the power of holy spirit.
Revelation from God or the Lord Jesus rarely comes like a flash of lightning and a crash of thunder, so very different from our own thoughts that we cannot miss it. Usually the Lord is working to help us do what we are already doing. Thus, revelation sometimes makes us aware of something that we already know, jogging our memory or “connecting the dots” for us. A good example of that is when Paul stood on trial before the Sanhedrin. Paul had been a Pharisee (Phil. 3:5), and was very aware of the tension between the Pharisees and Sadducees, who were both vying for control of the religious system in Israel. As he was brought before them he could have been in serious trouble. They hated him, and the Romans dealt harshly with troublemakers. However, just at the right time, Paul “perceived” (Acts 23:6 KJV) that part of the Sanhedrin was Pharisees and part was Sadducees, and he cried out that he was a Pharisee and on trial over the issue of the resurrection of the dead. The counsel broke into pandemonium, and Paul was taken from there by the Romans who feared he would be hurt.
That Paul received revelation is quite clear from the scope of Scripture. He knew very well that part of the Sanhedrin was Pharisees and part was Sadducees, and he knew the issues over which they were divided. Therefore, it would make no sense to say that he “perceived” or “noticed” (NRSV) it as if he did not already know it. He knew it, but it had not occurred to him to use their division to save himself. The Lord provided the insight for Paul and it probably saved his life.
While it is important that we do not become prideful or “spooky spiritual” and attribute all our thoughts and ideas to God, there are times when we have an “Aha” moment, or a “gut feeling,” that is from God and not from our own mind. The holy spirit sealed inside of us is part of our very nature, and therefore God can communicate through it seamlessly and effortlessly to our minds.
We have now discussed the revelation manifestations, a message of knowledge and a message of wisdom, and seen how they work in the lives of Christian believers. What God did for the people who had holy spirit in the Hebrew Scriptures, He does for Christians because He knows we need His help and guidance to be successful in life and accomplish what He would have us accomplish. Each and every Christian should strive to live a holy life and do the work God has for Him, and then expect to receive messages of knowledge and wisdom to help and bless him.
One of the great benefits of a message of knowledge or of wisdom is that it builds our faith. It is a powerful faith‑building experience to hear from heaven, and we need faith in order to accomplish that which the Lord asks us to do. Faith is the third manifestation listed in 1 Corinthians 12.
The biblical definition of faith is “trust,” and we trust things only after they have been proven to us. Jesus never asked anyone to believe he was the Messiah without proof. He healed the sick, raised the dead, and did miracles, such as healing the man born blind (something that had never been done in the history of the world), and he asked people to believe the miracles that he did (John 10:38). Similarly, God does not ask us to believe Him without proof. He has left many evidences that He exists and that His Word is true. Thus, when God asks us to have faith, He is not asking us to believe something without proof. God proves Himself to us, and because of that we trust Him, that is, we have faith.
We must distinguish between faith as it is commonly used in the Bible and the “manifestation of faith.” All of us have “faith” (trust) in a large number of things. In fact, ordinary life would be impossible without trust. A person would not sit down if he did not trust that the chair would hold him. People plan their entire evening based upon faith (trust) in a recorded announcement by a total stranger as to what time the movie they want to see starts. God asks us to trust that Jesus has been raised from the dead because the Bible, history, and life give plenty of evidence for it.
Moses brought water out of a rock by the manifestation of faith (Exod. 17:5 and 6), Gideon defeated the Midianites by the manifestation of faith (Judg. 6:16), Elijah multiplied the oil and bread by the manifestation of faith (1 Kings 17:14–16), and the other great miracles of the Bible were done by the manifestation of faith. When it comes to miracles and gifts of healings, we need the manifestation of faith because we cannot heal the sick or do miracles by our human power. God must give us a message of knowledge and a message of wisdom, letting us know that it is His will for us to heal someone or do a miracle, and then we must have the faith to do it.
Every Christian needs to utilize the manifestation of faith. Christ said that when people received holy spirit they would receive power (Acts 1:8), but no one can operate the power of God without the faith to do so. Since every Christian needs to use the manifestation of faith to bring to pass the revelation that God gives him, every Christian has the ability to manifest faith. Thus, we see that the manifestation of faith, like a message of knowledge and a message of wisdom, is for every Christian, not just certain ones.
We cover these two manifestations together because they are similar in many ways. The “gifts [plural] of healings [plural]” is so called because God does multiple healings, and each of them is a gift, done out of His grace or mercy. Gifts of healings and working of miracles are manifestations of holy spirit because it takes a believer to do them by the power of God that He has been given. It is very important to realize that it is people, empowered by holy spirit within, who do healings and miracles. On rare occasions God heals or does a miracle without human agency, but that is not “the manifestation” of gifts of healings or miracles because the gift of holy spirit inside a Christian was not employed.
To do a healing or miracle, several manifestations come into action. First, the person needs a message of knowledge and/or a message of wisdom to know what the situation is and what to do about it. Second, he needs the manifestation of faith to bring to pass the healing or miracle. Third, he must represent Christ on earth and, via the power of God, bring to pass the miracle as God supplies the energy for it. Notice how Peter raised Tabitha.
Peter spoke the miracle into being. First, Peter prayed. Then, when he had revelation from the Lord to go ahead, he raised her from the dead by the power of God. Once Peter received the revelation to raise Tabitha, he performed the miracle. We believe that there would be more miracles and healings in Christendom today if Christians would step out in faith and do what the Lord tells them to do. Too often we are waiting for God to do what He has given us the spiritual power to do.
It is not our intention to demean the power of prayer in any way. Christians are commanded to pray, and should do so as much as possible. However, when God or the Lord Jesus gives us the revelation to do a healing or miracle, that is not the time to pray, it is the time to step out in faith and boldly do the miracle. If the miracle or healing takes time, the one receiving the revelation must stay in faith and prayer to see it accomplished.
(13) Moses answered the people, “Do not be afraid. Stand firm and you will see the deliverance the Lord will bring you today. The Egyptians you see today you will never see again.
Once God gave the revelation of what to do, it was Moses’ turn to act, using the power God had given him. Moses utilized the manifestation of faith, and performed the miracle of splitting the sea. Had Moses not had faith to raise his staff and do the miracle, Israel would not have escaped from the Egyptians. Likewise, we Christians must recognize the power we have, and then step out and use that power.
The manifestations of gifts of healings and working of miracles are often interwoven. There are certainly miracles that are not healings, such as when Moses parted the sea so the Israelites could escape Egypt. Also, there are healings that are not miracles, when, although the natural power of the body to heal itself is augmented by the healing power of God, the healing is not instantaneous. However, there are many miracles of healing in the Bible, such as the instantaneous healing of Bartimaeus, who was blind (Mark 10:46–52). Also, casting out a demon can be a miracle (Mark 9:38 and 39).
The manifestation of prophecy is speaking, writing, or otherwise communicating a message from God to another person or persons. God or the Lord Jesus gives the Christian a message of knowledge or a message of wisdom via the holy spirit born inside him, and when he gives that message to someone else, it is prophecy. The revelation that is spoken as prophecy can come in the moment, coming almost word‑by‑word as the speaker says them, something we call “inspirational prophecy.” It can also come as a complete revelation given to the speaker before it is spoken as prophecy, and it can come as a combination, with some revelation coming beforehand and some coming as the prophecy is spoken. In the Hebrew Scriptures, when a person had holy spirit, he or she almost always prophesied. That is why Joel said that when holy spirit would be poured out on all Millennial Kingdom believers, they would prophesy (Joel 2:28), and why Peter, in his teaching on the Day of Pentecost, referenced Joel.
(17b) …I [God] will pour out my Spirit [spirit] on all people. Your sons and daughters will prophesy, your young men will see visions, your old men will dream dreams.
(18) Even on my servants, both men and women, I will pour out my Spirit [spirit] in those days, and they will prophesy.
God says His servants will prophesy, so there should be little argument about it. The manifestation of prophecy is to strengthen, encourage, and comfort people (1 Cor. 14:3). It can reveal the secrets of people’s hearts so that they can be closer to God (1 Cor. 14:24 and 25). A study of prophecy in Scripture shows that prophecy is part of the power of God, which is why God places prophecy in the “power” group of the manifestations. Some Bible teachers have placed prophecy in the “worship” group of manifestations, but prophecy is not worship, it is speaking a message from God to people. It is used in a worship service, yes, but that does not make it worship. At any given Christian service all the manifestations may come into play, depending on the needs of the people.
There is a reason why each Christian should covet to prophesy. Bringing God’s messages to His people is not only a tremendous privilege, it is essential for the wellbeing of the Church. A study of the Bible, especially the Hebrew Scriptures, reveals how valuable prophets were in the spiritual wholeness of the people of Israel. Prophecy is not only speaking about the future. Not only can every Christian prophesy, as the Scripture says, but we should want to. That every believer can prophesy gives us more conclusive evidence that each believer can manifest all nine manifestations.
The manifestation of discerning of spirits is necessary if men and women of God are going to deal effectively with the spiritual realities of this fallen world. There are many “spirits” in this world, including angels and the gift of holy spirit.16 Nevertheless, because of the spiritual battle that rages around all of us, the most important aspect of discerning of spirits is dealing with the demonic forces of this world.
The Greek word translated “discerning” (diakrisis) has several meanings. It can mean a “distinguishing” or “differentiation.” Also, it can mean to quarrel.18 One of the definitions in Liddell and Scott’s Greek Lexicon is “decision by battle, quarrel, dispute.”19 Thus diakrisis can be much more than just “discerning,” it has the overtones of quarreling or fighting. Since “discerning of spirits” is a total package of recognizing “spirits” and dealing with them, God places it in the “power” group of manifestations.
The manifestation of discerning of spirits is interwoven with the other manifestations. For example, a believer manifesting discerning of spirits may be simultaneously aware of the presence of the demon, know what to do about the situation, and begin to command it to come out of the person. Receiving the information about the demon and knowing what to do is similar to and interwoven with a message of knowledge and a message of wisdom, while the casting out of the demon can be in the category of a miracle (Mark 9:38 and 39), even as a healing can be a miracle (Acts 4:14 and 16).
The manifestations of speaking in tongues and interpretation of tongues did not exist before the Day of Pentecost. We believe that speaking in tongues is so valuable to Christians that we have dedicated Chapter 10 to it.
The interpretation of tongues is interpreting, or giving the sum and substance, in one’s own language, that which he has just spoken in tongues. The interpretation of tongues, like speaking in tongues itself, is given by the Lord. No one understands what he is saying in a tongue, so no one could give an interpretation of what he is saying. The interpretation comes from the Lord Jesus Christ, just as the tongue does. The manifestation of interpretation of tongues works just like speaking in tongues and prophecy do—the words come from the Lord Jesus Christ to the individual via the gift of holy spirit inside him. When a person speaks in tongues in a believer’s meeting, he should interpret so that the people in the meeting may be edified.
The interpretation of tongues is to be done by the one who spoke in tongues, just as 1 Corinthians 14:5 says. Furthermore, because speaking in tongues is praise and prayer to God, the interpretation will also be to God. That is the big difference between prophecy and the interpretation of tongues. Prophecy is a message to the people (1 Cor. 14:3), while interpretation of tongues is to God (or the Lord Jesus Christ), but is heard by the congregation, who are then edified by it.
This section of the book has shown that each Christian has the spiritual ability to manifest all nine manifestations of holy spirit. Every Christian can talk with the Lord and receive revelation, every Christian can and should have faith and do some of the works of Jesus, every Christian should enter into the spiritual battle and deal with demons, every Christian should prophesy, speak in tongues, and interpret. It is by manifesting holy spirit that Christians can walk in the power that Jesus Christ gave to the Church. We must trust God in order to boldly manifest holy spirit in our daily lives.
In the previous section, we spoke over and over about the “manifestations” of holy spirit. At this point we want to once again make the point that we Christians should use biblical words when we talk about the things of God. Most Christians commonly use the word “gifts” to describe what the Bible calls “manifestations” of the spirit, and this causes problems in Christianity. Why? Because words have definitive meanings, and it is through those meanings that clear communication is made possible. “Manifestation” does not mean “gift.” What’s the difference? A gift is individually given, and no one has a gift unless it was given to him. A manifestation is an evidence, a showing forth, of something that a person already has. There are spiritual gifts, which include holy spirit, God‑given ministries such as that of an apostle or a prophet, and the gift of everlasting life (Rom. 6:23). But, the nine manifestations are not gifts and calling them “gifts” can have a negative effect on the quality of believers’ lives.
The theology of many Christians, however, reduces the difference between “gifts” and “manifestations” to a non‑issue, which is one reason most commentaries make so little of it. If a person believes that he will be given at most only one of the manifestations (which is the most common teaching about the “gifts of the spirit”), then to him there is no difference between a gift and a manifestation. If the Swiss Army knife has only a knife blade, then there is not much difference between the gift of the knife and the manifestation of the blade. But, if the Swiss Army knife has many blades and tools, there is a huge difference between the knife as a whole and just one blade. The difference between gift and manifestation becomes very clear and very important when one realizes that the one gift of holy spirit has many “manifestations,” or evidences.
The major problem that occurs when the manifestations of holy spirit are thought to be “gifts” is that it causes many Christians to be spiritually passive. Instead of realizing that they can utilize the nine manifestations and walking in faith to speak in tongues, some believers wait on God, hoping that one day He will give them the “gift” of tongues. Other believers who would love to heal people wait for the power to heal. Such people are waiting for something they already have! They may even plead with and beg God, and end up disappointed with Him for not answering their prayers. Christians need to know that they have received the power of holy spirit, and that God is waiting for them to act. They must move their mouths and speak in tongues, or use their voice to prophesy, or stretch forth their hands to heal, all with faith in the power God provided.
The theology of Bible translators is in large part responsible for people thinking that the manifestations of the spirit are gifts. Notice how often the word “gift,” “gifts,” or “gifted” appears in most translations of 1 Corinthians 12–14. Yet not one of these uses of “gift” is in the Greek text.
It is easy to see why the average Christian thinks of prophecy and the other manifestations as “spiritual gifts.” It is difficult to read the Bible and come away with an accurate understanding of it when the translators have allowed their theology to distort the clear reading of the text. What is the Christian to do when he reads a version with “gifts” improperly inserted in the text? He can cross out “gifts” and make an accurate reading in the margin.
One good thing about the King James Version, American Standard Version, and New American Standard Version is that the translators italicized many words that are not in the Hebrew or Greek text, but which they added in an attempt to clarify what a verse says. In today’s English writing, words are sometimes italicized for emphasis. A Christian reading those versions needs to remember that the italicized words are not being emphasized, they were added to the original text.
In each of the above verses, the italics show that the word “gifts” has been added. A better translation than “spiritual gifts” is “spiritual matters” or “spiritual things,” which fits the subject of 1 Corinthians 12–14, which are about spiritual matters, including “gifts” (1 Cor. 12:4), “service” (1 Cor. 12:5), “working” (energizings) (1 Cor. 12:6), and “manifestations” (1 Cor. 12:7–10).
The wide variety of spiritual matters being discussed in 1 Corinthians 12–14 dictates that “matters” or “things” be supplied to complete the sense of “spiritual” in 1 Corinthians 12:1, 14:1, etc. Those chapters in 1 Corinthians are speaking about spiritual matters of many kinds, not just spiritual “gifts.” Adding the word “gifts” obscures what God had so clearly stated in the original text and causes people to be confused about the manifestations of holy spirit.
In conclusion, it is important to use the word “manifestations” rather than “gifts” when referring to speaking in tongues, interpretation, prophecy, message of knowledge, etc., for a number of reasons. That is the wording that God uses, and we are always on solid ground when we use the language of the Bible. Furthermore, the word “manifestations” points to the fact that we are dealing with outward evidences of something, which in this case is the gift of holy spirit. So if speaking in tongues, etc., are manifestations of the gift, then everyone with the gift has the ability to manifest it. Are you a Christian? If so, you have holy spirit, and with it comes the power of its nine manifestations just as Christ said in Acts 1:8.
1. Spiros Zodhiates, The Complete Word Study Dictionary New Testament (AMG Publishers, Chattanooga, TN, 1992), p. 1436.
2. There has been much scholarly discussion about the exact nature of the genitive, “of,” in the phrase, “the manifestation of the spirit.” The confusion is in large part due to the fact that most theologians think the “Spirit” is God. The spirit in this verse is the gift of God, holy spirit, and the genitive is the genitive of origin. The gift of holy spirit is the source of the manifestations. A parallel phrase occurs in 2 Corinthians 4:2, which has “the manifestation of the truth” (KJV, which has the articles accurately placed) [that’s the only other use of “manifestation” in the Bible]. This also is a genitive of origin. One cannot see the “truth” in the Apostles’ minds, but it is there, and it is the origin of their behavior, which can be seen by everyone. The gift of holy spirit and “truth” are invisible in a person, but they produce manifestations that can be clearly seen in the senses world.
3. It is “because of the same spirit,” the gift of holy spirit inside him, that a person can receive revelation. The word kata (because of) has a variety of meanings. Bauer’s Greek Lexicon lists two major concepts, with more specific meanings under those, and even more specific meanings under those. For this verse, he notes “the mng. [meaning] ‘in accordance w. [with]’ can also disappear entirely, so that k. [kata] means simply because of, as a result of, on the basis of….” William Arndt and F. Wilbur Gingrich, A Greek-English Lexicon of the New Testament and Other Early Christian Literature (University of Chicago Press, Chicago, 1979), p. 407.
6. Joseph Free, Archaeology and Bible History (Zondervan Publishing House, Grand Rapids, MI, 1982), p. 108.
7. In the context of this book, “you” refers to you the Christian. The manifestations of holy spirit can be utilized only by people who have holy spirit.
8. Thayer, op. cit., Thayer’s Greek-English Lexicon, p. 380.
10. One example is Joyce Meyer, How to Hear from God (Warner Faith, USA, 2003). Joyce writes in her introduction: “We talk to our children all the time—why wouldn’t our heavenly Father talk to His children?” God does want to talk to us, and He will if we open our spiritual ears and have faith.
12. Merriam-Webster’s Collegiate Dictionary (Merriam-Webster, Incorporated, Springfield, MA, 2003), p. 450.
13. The word “working” is perhaps more properly, “energizing,” and it is plural. However, we felt that saying “energizings of miracles” was unclear. The phrase “working of miracles” is working more than one miracle and thus adequately covers the plural in the Greek.
14. We realize that although the presence of holy spirit gives each Christian the spiritual power to do healings and miracles, not everyone is called to walk in that kind of ministry. There is a difference between inherent spiritual ability and how that ability will actually be evidenced in the life of an individual Christian. Nevertheless, we assert that many more Christians would be doing healings and miracles if they knew they had the ability, and were confident to act on the spiritual power they have.
15. The Greek word translated “discerning” is plural. Nevertheless, we used “discerning” because it has the overtones of plurality. If a person is “discerning,” it is because he has exhibited discernment in a multitude of situations.
16. The word “spirits” in the phrase “discerning of spirits” does not refer to “attitudes.” Although that is one of the meanings of pneuma, it is not the meaning in this context. There are many very gifted people that are very sensitive and can “read” people and situations very well, but many of them are unsaved. That discernment is a natural ability, just as is native intelligence and other natural abilities.
17. We like the KJV because it uses the word “wrestle,” which is literally what the Greek text says. As in any wrestling match, there is an opponent that must be fought and overcome.
18. Arndt and Gingrich, op. cit., A Greek-English Lexicon, p. 185.
19. Henry Liddell and Robert Scott, A Greek-English Lexicon (Oxford University Press, NY, 1992), p. 399.
20. The improper addition of “gifts” to the Greek text is one reason why Christians should purchase and learn to use Bible study helps such as interlinears and lexicons. An “interlinear” is a Bible in the original Greek or Hebrew, with the English in an interlinear (between the lines) form. Looking at an interlinear version of the Greek text shows conclusively that “gifts” was added by translators to the English version. This same thing could be done for all the verses listed where “gifts” was added. Note that, although Greek and English word order are not the same, the sense of the verse can be well followed in the interlinear. Well‑stocked Christian bookstores have Interlinear Bibles or visit www.Christianbook.com or www.Half.com.
2) Peri de ton pneumatikon adelphoi ou thelo humas agnoein.
3) concerning but the spirituals brothers not I want you (plural) ignorant.
4) Now concerning the spiritual things, brothers, I do not want you ignorant. | 2019-04-20T08:13:50Z | https://thelivingtruthfellowship.org/the-holy-spirit/walking-in-power-the-manifestations-of-holy-spirit/ |
The Check Point Compliance Blade is a dynamic solution that continuously monitors the Check Point security infrastructure. This unique product examines your Security Gateways, Blades, policies and configuration settings in real time. It compares them with an extensive database of regulatory standards and security best practices. The Check Point Compliance Blade includes many graphical displays and reports that show compliance with the applicable regulatory standards.
The Check Point Compliance Blade has a library of Check Point-defined tests to use as a baseline for good gateway and policy configuration. A Best Practice test is related to specified regulations in different regulatory standards. It describes compliance status and recommends corrective steps.
Global Tests - Examine all applicable configuration settings in the organization.
Object-based Tests - Examine the configuration settings for specified objects (gateways, profiles and other objects).
The Check Point Compliance Blade monitors the status of applicable regulations and shows them in an easy-to-read view. Each line shows the status, compliance score, and best practices for one or more related tests and for related gateways and policies.
The Australian Privacy Principles (APPs), which are contained in schedule 1 of the Privacy Act 1988 (Privacy Act).
Outline how most Australian and Norfolk Island Government agencies, all private sector and not-for-profit organizations with an annual turnover of more than $3 million, all private health service providers and some small businesses (collectively called 'APP entities') must handle, use and manage personal information.
CIPA USA The Children's Internet Protection Act (CIPA) requires that K-12 schools and libraries in the United States use Internet filters and implement other measures to protect children from harmful online content as a condition for federal funding. It was signed into law on December 21, 2000, and was found to be constitutional by the United States Supreme Court on June 23, 2003.
CJIS USA A joint program of the FBI, State Identification Bureaus, and CJIS Systems Agency, the Criminal Justice Information Services (CJIS) Security Policy outlines the security precautions that must be taken to protect sensitive information like fingerprints and criminal backgrounds gathered by local, state, and federal criminal justice and law enforcement agencies.
CobiT 4.1 USA COBIT (Control Objectives for Information and Related Technologies) is a good-practice framework and supporting tool set created by international professional association ISACA for information technology (IT) management and IT governance. COBIT allows managers to bridge the gap between control requirements, technical issues and business risks.
DSD Australia First published in February 2010, and revised for 2014, the Australian Signals Directorate (ASD), also known as the Defense Signals Directorate (DSD), has developed prioritized mitigation strategies to help technical cyber security professionals in all organizations mitigate cyber security incidents. This guidance addresses targeted cyber intrusions, ransomware and external adversaries with destructive intent, malicious insiders, 'business email compromise' and industrial control systems.
This guidance is informed by ASD's experience responding to cyber security incidents and performing vulnerability assessments and penetration testing Australian government organizations.
FIPS 200 USA Federal Information Processing Standard (FIPS) Publication 200. It is the second of the mandatory security standards, FIPS 199 being the first one, defined by the Federal Information and Information Systems of the United States Federal Government. FIPS 200 is the Standards for Security Categorization.
FIPS 200 standard emphases more security during the development, implementation, and operation of more secure information systems.
FIPS 200 defines following 17 security areas covered under confidentiality, integrity, and availability (CIA) of federal information systems and the information processed, stored, and transmitted by those systems.
Firewall STIG International Firewall Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing Firewalls.
GLBA USA Gramm-Leach-Bliley Act. These regulations include financial privacy guidelines and safeguards related to information security.
GPG13 UK Of the 35 guides, the Good Practice Guide 13 (GPG13) defines requirements for 12 Protective Monitoring Controls (PMC), which comprise of tasks such as event log management and use of intrusion detection and prevention systems. Local authorities are required to conform to GPG13 in order to prevent accidental or malicious data loss.
As connection to GCSX encompasses access to sensitive and confidential data, compliance with GPG13 is imperative for protecting privacy and preventing data breaches. It is imperative that log is collected from systems that provide the security mechanisms.
HIPAA Security USA Health Insurance Portability and Accountability Act of 1996. These regulations require government agencies, insurers and health care providers to protect all data that they collect, maintain or use.
ISO 27001 International Standards for the implementation of Information Security Management Systems (ISMS). This standard includes 133 control objectives that cover organizational security architecture.
ISO 27002 International Supplemental controls and best practices for implementation of Information Security Management Systems (ISMS). This standard includes detailed control objectives that are applicable to certain industries.
Katakri 3.0 Finland Katakri 3.0 refers to the Finnish National Security Authority's National Security Auditing Criteria. Katakri is divided into four sub-divisions: Administrative, Personnel, Physical, and Information Assurance. Katakri provides different levels of security requirements. The Check Point Katakri mapping is based on 'Requirements for the base level (IV)'.
MAS TRM Singapore Various Technology Risk Management (TRM) guidelines for Monetary Authority of Singapore (MAS).
NCIPA USA The Neighborhood Children's Internet Protection Act (NCIPA) sets guidelines for a library's "policy of Internet safety". This policy must address: "(I) access by minors to inappropriate matter on the Internet and World Wide Web; (II) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (III) unauthorized access, including so-called 'hacking', and other unlawful activities by minors online; (IV) unauthorized disclosure, use, and dissemination of personal identification information regarding minors; and (V) whether the school or library, as the case may be, is employing hardware, software, or other technological means to limit, monitor, or otherwise control or guide Internet access by minors". NCIPA also requires a library to "...provided reasonable public notice and held at least one public hearing or meeting which addressed the proposed Internet use policy."
NERC CIP USA The NERC CIP (North American Electric Reliability Corporation critical infrastructure protection) plan is a set of requirements designed to secure the assets required for operating North America's bulk electric system.
NERC CIP (v.5) USA The NERC CIP (North American Electric Reliability Corporation critical infrastructure protection) plan is a set of requirements designed to secure the assets required for operating North America's bulk electric system.
On November 22, 2013, FERC approved Version 5 of the critical infrastructure protection cybersecurity standards (CIP Version 5), which represent significant progress in mitigating cyber risks to the bulk power system.
In 2014, NERC initiated a program to help industry transition directly from the currently enforceable CIP Version 3 standards to CIP Version 5. The goal of the transition program is to improve industrys understanding of the technical security requirements for CIP Version 5, as well as the expectations for compliance and enforcement.
NIST 800-41 USA National Institute of Standards and Technology (NIST) guidelines for firewalls and firewall policies.
NIST 800-53 USA National Institute of Standards and Technology (NIST) recommend security controls for federal government information systems and organizations.
PCI DSS 2.0 USA PCI DSS 2.0 (Payment Card Industry Data Security Standard Version 2.0) is the second version of the Payment Card Industry Data Security Standard (PCI DSS) released in October 2010.
PPG 234 Australia Prudential Practice Guide (PPG) aims to assist regulated institutions in the management of security risk in information and information technology (IT). It is designed to provide guidance to senior management, risk management and IT security specialists (management and operational).
The PPG targets areas where APRA continues to identify weaknesses as part of its ongoing supervisory activities. The PPG does not seek to provide an all encompassing framework, or to replace or endorse existing industry standards and guidelines.
Protection of Personal Information Act, 2013 South Africa Protection of Personal Information (POPI) Act governs the way personal information is collected, stored, used, disseminated and deleted.
SOX USA Sarbanes-Oxley (SOX) act is intended to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and to improve the accuracy of corporate disclosures. The act sets deadlines for compliance and publishes rules on requirements.
Statement of Controls (ISAE 3402) International International Standard on Assurance Engagements (ISAE) No. 3402, Assurance Reports on Controls at a Service Organization, was issued in December 2009 by the International Auditing and Assurance Standards Board (IAASB), which is part of the International Federation of Accountants (IFAC). ISAE 3402 was developed to provide an international assurance standard for allowing public accountants to issue a report for use by user organizations and their auditors (user auditors) on the controls at a service organization that are likely to impact or be a part of the user organizations system of internal control over financial reporting.
UK Data Protection Act UK The British Data Protection Act controls how personal information is used by organisations, businesses or the government.
Daily - Automatic scan one time each day, finds changes to gateway and policy configurations made with CLI or scripts.
You can also run a manual scan, as necessary.
If administrator actions cause a degradation of the compliance status, the Check Point Compliance Blade displays an alert with details of the issue. It also generates an action item to monitor corrective steps.
View - Use the Check Point Compliance Blade tools to examine and monitor compliance status.
Plan - Manage Check Point Compliance Blade automatically generated Action Items.
Act - Correct compliance issues as recommended by the Action Items. You can see the updated compliance status when you run Check Point Compliance Blade scans.
Check Point Compliance Blade is supported starting in R77 GA.
For R75.40 and R75.45 versions, a special hotfix can be offered.
See Check Point Compliance Blade R75.40 and R75.45 Release Notes.
You cannot upgrade to higher versions when this hotfix is installed.
If you do this, the Check Point Compliance Blade is not available.
Connect with SmartConsole to Security Management Server / Domain Management Server and go to 'LOGS & MONITOR section > Add new tab > Open Compliance View'.
The 'Overview' pane shows the overall compliance status of your organization.
Security Best Practices Compliance Displays compliance status information for each Best Practice.
To see Best Practices recommendations filtered by status, click a status.
To see all Best Practices, click on 'See All...'.
Gateways Displays Security Status by Gateway - Security Gateways with the highest compliance scores, lowest compliance scores, or a predefined set of Favorites.
To see the results for a specific Security Gateway, click on its name.
Blades Displays Security Status by Blade - the average scores for the five Software Blades with the most Security Best Practices.
To see the results for a specific Software Blade, click on that blade.
To see the results for all Software Blades, click on 'See All...'.
The number of regulatory standards shown is dependent on your screen resolution.
Upcoming items - Action items with due dates in the next 30 days.
Future items - Action items with due dates of more than 30 days.
Unscheduled items - Action items without defined due dates.
Overdue items - Action items that are overdue.
This widget displays compliance status information for each Best Practice.
Gateways, Software Blades, and regulations.
The applicable Software Blade is not installed on the Security Management Server.
The Security Gateway does not support the examined feature.
Many Best Practice tests are boolean: either compliant, or not.
Other Best Practice tests calculate a score based on the degree of compliance.
Active - Select to activate the Best Practice test. Clear to deactivate it.
Blade - Blade related to this Best Practice.
ID - Check Point Compliance Blade ID assigned to the Best Practice.
Name - Name and brief description of the regulatory requirement.
Status - Poor, Medium, Good, Secure, or N/A. We recommend that you resolve "Poor" status items immediately.
Description - What the selected Best Practice test looks for.
Action Item - Steps required to become complaint, which also includes alternative scenarios.
Dependency - Shows when the selected Best Practice is dependent on a different Best Practice. The selected Best Practice test is not performed unless the other Best Practice test is compliant.
Relevant Regulatory Requirements - Link to show list of all regulatory standards that include the Best Practice test that generated the selected action item.
This widget displays Security Status by Gateway - the five Security Gateways with the highest compliance scores, lowest compliance scores, or a predefined set of Favorites.
To see the Best Practice test results for a specific Security Gateway, click on its name.
To see the results for all gateways, click on "See All Gateways".
Click on a Security Gateway / Cluster object in this window to see the details.
Name - Best Practice test name and brief description.
This widget displays Security Status by Blade - the average scores for the five Software Blades with the most Security Best Practices.
To see the results for a specific Blade, click on that blade.
Description - Detailed description of the Best Practice test.
Click the configuration icon in the top right corner of the pane.
In the Select Regulations and Standards window, select the standards to show in the Overview.
". The All Regulatory Requirements window opens.
To see details of a standard, click the name of the standard in the Overview pane or in the All Regulatory Requirements window. The Regulatory Requirements pane for the selected standard opens.
Check Point Compliance Blade ID.
Status (Poor, Medium, Good, Secure, or N/A).
Name of the regulation, taken from the published standard.
Description - What the standard requires.
Relevant Best Practices - Best Practice tests for the selected requirement, and their compliance status.
Overdue items- Action items that are overdue.
Note: It is a best practice to resolve overdue action items immediately.
If you have a high resolution, then the Alert and System messages show in the bottom section of the pane. Use the arrows to scroll through the messages.
If you have a low resolution, then two buttons show in the bottom section of the pane.
To see alert messages, click "Compliance Alerts". They open in the 'Overview' pane.
To see messages about the Check Point Compliance Blade, click "System Messages". They open in the 'Overview' pane.
To open the action items for a status category, click that category. The 'Action Items' pane opens.
Due Date - Optionally assigned due date for resolving this Action Item. A due Date is not automatically assigned when an Action Item is generated.
Action Item Description - Steps required to become complaint, which includes alternative scenarios.
Due Date - Optionally assigned due date for resolving this Action Item. You can assign or change a due date here (see "Working with Action Items").
You can define your own, custom Security Best Practices based on organizational security requirements. This release supports user-defined Security Best Practices. You define user-defined Security Best Practices in the SmartConsole Compliance tab.
In the 'Compliance tab > Security Best Practices pane', click "New".
Name and Description for this Best Practice.
Name and Description for the non-compliance Action Item generated by this best practice.
Note: In this version, you cannot change the Relevant Blade option. It is automatically set to Firewall.
In the "Best Practice Rule Definition" table, enter rule matching criteria in the table cells. Each cell matches one related field or parameter in Security Policy rules. A Security Best Practice match occurs when all table cells match one or more rules in the Rule Base (Logical AND).
Hit Count - Select a Hit Count level. A match occurs when the Hit Count for a rule is equal to or exceeds the specified Hit Count level.
Any - Matches all rules (default).
Blank - Matches all rules that do not have a name (null value).
Not blank - Matches all rules that have a name.
Exact - Enter a text string. A match occurs when the rule name is the same as the specified string.
Starts with - Enter a text string. A match occurs when the rule name starts with the specified string (case sensitive).
Ends with - Enter a text string. A match occurs when the rule name ends with the specified string (case sensitive).
Contains - Enter one or more text strings. A match occurs when a rule name contains the specified strings in the order you enter them (case sensitive).
Source - Select one or more source objects. A match occurs when at least one of the specified objects are included in the Source field of a rule.
Destination - Select one or more destination objects. A match occurs at least one more of the specified objects are included in the Destination field of the rule.
VPN - Select one or more VPN communities. A match occurs when at least one of the specified VPN communities are included in a rule.
Service - Select on or more services. A match occurs when at least one of the specified services are included in a rule.
Action - Select one or more actions. A match occurs when at least one of the specified actions are included in a rule.
Track - Select one or more tracking options. A match occurs when at least one of the specified tracking options are included in a rule.
Install on - Select one or more Gateway, Cluster, or group objects. A match occurs when at least one of the specified objects are included the "Install on" field of a rule.
Time - Select a time option that defines when the system enforces a rule. A match occurs when at least one specified time option is included in a rule.
Blank - Matches all rules that do not contain text in the Comment field (null value).
Not Blank - Matches all rules that contain text in the Comment field.
Starts with - Enter a text string. A match occurs when the Comment field in a rule starts with the specified string (case sensitive).
Ends with - Enter a text string. A match occurs when the Comment field in a rule ends with the specified string (case sensitive).
Negate Cell - Right-click a cell to match all objects except the specified objects. This feature is not available for the Name and Comment cells.
Note: If you use the Negate Cell option on a cell that contains the Any object, no match can occur. This is the same as a blank cell.
Percentage - The percentage of the Rule Base to scan.
For example, select Bottom 30% to scan 30% of the Rule Base starting from the bottom (last rule in the Rule Base).
Last Hit Date greater than - Select to include only rules that have at least one hit on, or after the specified time period. Select the number of time periods and the type of period.
For example, select 2 Months to include only rules that have at least one hit during the last two months.
Define how Compliance Blade creates a violation (Action Item) when a Security Best Practice matches a rule.
Rule found - A violation can occur when a rule matches the Security Best Practice (Default).
Rule not found - A violation can occur when no rules match the Security Best Practice.
Tolerance - A violation occurs when there are more than the specified number of matches (Default = 0). For example, if the tolerance is set to 0, the Compliance Blade creates a violation when the first match occurs. If the tolerance is set to 3, the Compliance Blade creates a violation when the fourth match occurs.
Note: The tolerance option applies only to the Rule found option.
Define when the Rule Index (Rule number) shows in the Relevant Objects pane.
You can configure custom Security Best Practices to show the Rule in specified circumstances. This lets you easily see which rules cause or prevent violations.
Display rules that match - Shows Rules that match the specified criteria in a Security Best Practice.
Display rules that don't match - Shows Rules that do not match the specified criteria in a Security Best Practice.
Don't display rules - Does not show the Rule.
To see the status of your Security Best Practice, click "Preview". This feature runs the new Security Best Practice and shows the results in a window.
In the 'Compliance tab > Security Best Practices pane', double-click a user-defined Security Best Practice.
In the Best Practice Definition window, change the parameters and settings as shown in the above procedure.
If the user is accessing Compliance Blade for the first time, then Navigate to 'LOGS & MONITOR' and click "Open Compliance View".
Click "+" to open New Best Practice dialog.
If the user is not accessing Compliance Blade for the first time, then navigate to 'LOGS & MONITOR > Compliance > Security Best Practices' and click "New".
Enter Best Practice Name, Description, Action Item, Practice Script, Expected Output and click "OK".
Your new Gaia Best Practice will be added to the list of Best Practices.
Navigate to 'MANAGE & SETTINGS'.
Navigate to 'LOGS & MONITOR > Compliance'. The scan resuls for the new Gaia OS Best Practice are displayed.
In the Check Point Compliance Blade panes, enter a string in the search field to filter results.
To group results, select "Blade" or "Status" in the grouping field.
To sort the results by values in field, click that field header.
You use the Alerts and System Message pane to see alerts generated when a configuration change causes compliance status degradation. You can also see messages that are automatically generated by the Check Point Compliance Blade.
To see the details of a system message, double-click it. The Alert Details window opens.
You can activate or deactivate Best Practice enforcement of tests by test (for the organization), by gateway, by Software Blade or by other objects. Activation changes are applied after the next scan.
By default, all Best Practice tests are active.
Select a Best Practice test in the top section, or in the Related Objects section.
In 'Compliance' tab > 'Security Best Practices Compliance' overview, clear the "Active" option for the Best Practice test.
When prompted, enter an explanation. A comment is required to show why it is necessary to stop running this compliance test.
Optional: Define an expiration date. If you define an expiration date, the deactivated test is automatically activated on that date.
Navigate to 'MANAGE & SETTINGS' > 'Blades' > 'Compliance' > Open 'Inactive Objects...'. De-activated Best Practice tests are shown in the Inactive Security Best Practices section.
Select a Best Practice in the list.
Double-click a Best Practice test in the Inactive Objects pane.
Navigate to 'MANAGE & SETTINGS' > 'Blades' > 'Compliance' > Open 'Inactive Objects...'.
In the Inactive Gateways section, click the "Add" icon.
Enter or select a gateway or cluster. The selected gateways show in the Inactive Gateways list.
Click the "Remove" (X Remove) icon.
In 'Compliance' tab > 'Security Best Practices Compliance' overview, select the Best Practice test.
In the Relevant Objects section, clear the "Active" option for the object.
An object can be a gateway, policy, profile or other object.
'. The de-activated Best Practice test is in the "Inactive Security Best Practices on Specific Objects" section.
Select the Best Practice test.
You add objects to your Check Point environment.
You activate or de-activate a Best Practice test.
Navigate to 'MANAGE & SETTINGS' > 'Blades'.
On the Settings page, click "Rescan".
Note: While a scan is running, you cannot work with the Compliance tab.
Regulatory Requirements shows the Check Point Compliance Blade Best Practice tests that examine compliance with the requirements of standards and regulations.
Navigate to 'LOGS & MONITOR'.
Go to the Compliance tab and open in Regulatory Compliance pane 'See All' link.
Click a regulatory standard. The selected regulatory standard pane opens.
You can select the regulatory standards that are applicable to your organization. By default, all supported regulatory standards are active.
Select the regulatory standards that are applicable for your organization.
Clear the regulatory standards that are not applicable for your organization.
Have an XML file saved locally. In order to import a new regulation or standard, you must have it saved locally as an XML file.
Open up the Compliance Settings in the SmartConsole. In the Navigation Toolbar, click on 'Manage & Settings > Blades > Compliance' and click on the "Settings" button.
Import the Regulation XML file. Go to the Actions drop-down list and select "Import".
Select the XML file you want to import. Once selected, import the file. The regulation will now appear in your list of User-defined Regulations.
Save the Regulation. Open the regulation by double-clicking on it. Press save and wait for the process to complete. This could take three to four minutes.
Display the imported Regulation on your Compliance Dashboard. Once the Regulation is imported, you can now add and manage it from your Compliance Dashboard. In the Navigation Toolbar, click "Logs & Monitor" and open the Compliance Tab, or click on the configuration icon in the top right-hand corner of the pane, or select the Regulation you just imported and click "OK" to save.
IMPORTANT NOTE: Remember that to save any SmartConsole changes, you must Publish those changes.
When a Best Practice test finds a deficiency, the Check Point Compliance Blade automatically generates an Action Item. You can assign a due date to an Action Item and monitor corrective steps. Action Items are not assigned a due date when they are generated.
When you complete the corrective steps, the Check Point Compliance Blade deletes the Action Item after the next scan.
Go to the Compliance tab > 'Action Items and Messages' > 'Pending Action Items' > 'Unscheduled items'.
In the Action Item Description section, click "Schedule Now". If the Action Item already has an assigned due date, click on the date link to change it.
In the window that opens, enter or select a due date and then click "OK".
Deactivate the applicable Best Practice test (see "Deactivating Tests").
Run a manual scan: 'Settings' > 'Rescan'.
The Check Point Compliance Blade has features that help you to quickly implement corrective steps in SmartConsole. The Action Items pane shows a helpful description for each Action Item, which gives suggestions to correct the related configuration. You can also correct some issues with the command line.
You can correct issues by using the description to guide you through the configuration steps.
Generate reports for status summary and details of Best Practice tests and Action Items.
To generate a report, navigate to 'LOGS & MONITORS' > new tab > select "Reports" and then select 'Compliance Blade' report. The report shows in a pane with the report name as the title.
Per Regulation - Shows a summary of the regulatory requirements and a detailed list of the Best Practice tests included in each requirement.
To generate a report, navigate to 'LOGS & MONITORS' > Compliance > click on specific regulation > click on: "Generate Report". The report shows in a pane with the report name as the title.
You can export the data shown in the selected pane to a Microsoft Excel® file. This lets you save the results for archiving, auditing, and analysis of historical trends and data relationships.
Open a Check Point Compliance Blade pane.
Go to main page of all reports.
Symptom: In SmartConsole, in the Compliance Blade tab, you see "The compliance blade is not activated" message, and you cannot navigate in the tab's pages, or in 'LOGS & MONITORS' when you open new tab, the "Open Compliance View" is not displayed.
In SmartConsole, check the Security Management Server object. Verify that the "Compliance Blade" box is checked in the Management Blades section.
Symptom: If the Security Management Server IP Address that the customer used to login to the SmartConsole is not identical to the IP Address set on the Management object, there will be problems with connectivity to the Security Management Server.
If that is the case, then the customer may still be able to login and access the Compliance tab, but he will get "The compliance blade is not activated" message.
If no license is installed, the user will probably encounter this error message for the first time, when user will try to access the Compliance Blade tab in SmartConsole.
Customer must purchase a Compliance Blade license according to the number of (supported*) gateway objects.
If you have 3 gateways, you must buy a 5 gateway license.
If you have 10 gateways, you must buy a 25 gateway license.
If you have bought a 5 gateway license, but you have 6 (or more) gateways, the license will not work.
If you have bought a 5 gateway license, and you have 5 gateways, but you later add an additional gateway object, after the next scan, the license will cease to work.
*Supported Objects: The Compliance Blade currently only supports regular Gateways and Clusters.
This means that currently all other objects will not be taken into consideration when counting the licenses.
If a customer has a single Management, with 50 gateways, but only 5 are regular gateways, and the other 45 are Edge gateways, the customer can legitimately attach a 5 gateway license and it will work (because Check Point currently only counts "supported" objects).
For a gateway cluster network object with two gateway cluster members, the compliance blade license count would be for two gateways.
A license must be installed on each Management (assuming the customer wants to install the Compliance Blade on each Management).
If the customer has Management A with 5 gateways, and Management B with 20 gateways, he needs to buy a 5 gateway license for Management A, and a gateway license for Management B that is equal or greater than the numbers of gateways attached to the Management.
He cannot buy a 25 gateway license and split it between his two Managements.
All other comments are the same as for Single Management, above.
Whatever license is installed on the Multi-Domain Management container, is pushed down to all the connected CMAs.
If there is a Multi-Domain Management, with CMA X, CMA Y, and CMA Z, and the customer installs a 5 gateway license on the Multi-Domain Management, a 5 gateway license is pushed down to CMA X, Y and Z.
Likewise, if he installs a 25 gateway license on the Multi-Domain Management, a 25 gateway license is pushed down to all connected CMAs.
If there are 10 supported gateways on the CMA, and the customer received a 5 gateway license from its linked Multi-Domain Management, the license will not work on this CMA.
If a customer has a Multi-Domain Management with 20 CMAs. 19 of the CMAs have 3 gateways each, and 1 CMA has 20 gateways. If he installs a 5 gateway license on the Multi-Domain Management, the license is pushed to all 20 CMAs, but only 19 of them will work.
If he installs a 25 gateway license on the Multi-Domain Management, all the CMAs will work.
The initial full scan begins about 2-3 minutes after the first installation. You will get a notification in the Compliance Blade regarding the need to wait for the full scan to finish.
A full scan can take between 2 - 5 minutes. During this time, the SmartConsole should work as usual.
The Compliance tab will not display any information until the scan is finished. Once the Full scan is finished, the user can access the information in the blade and he should not see a "Full scan is in progress" message in the top of the Overview.
Supported resolutions: Check Point supports 2 different thresholds of resolution: 1366x768 (laptop) and above. There is a slight difference in the Overview page.
1366x768 - "Action Items and Messages" widget displays the actual records. Activate by using 3 buttons.
Above 1366x768 - Action Items and Messages" widget displays all the data with no buttons. The data regarding the "Compliance Alerts & Messages" is a preview (contains short descriptions) and for the full details you need to access the menu items by the link.
Security Best Practice: if the customer has certain constraints that prevent him from configuring a Check Point Software Blade according to the recommendation, we enable to exclude individual Security Best Practices, by unchecking the "Active" field, along with the reason why it should be excluded and for which period of time.
What happens behind the scenes when we "deactivate" a Security Best Practice? Changes will take effect only after a "save" and full scan (either nightly, or manually executed by the user via the Settings screen). These effects are: the Action Item regarding this Best Practice disappears, statistics in the Overview should change accordingly, compliance of Regulations should change, as well.
How is the overall score recalculated? Each Security Best Practice gets a grade (percentage) and is given a status according to the thresholds.
If the Security Best Practice is a Gateways / Profiles Best Practice, the grade is calculated as an average of the grades of each of its corresponding objects.
Each Security Best Practice is assigned to one or more regulatory requirements.
When is it recalculated? Next full scan.
Expiration date for deactivation: Expiration date for deactivation can be set. The status of the Security Best Practice or object in Security Best Practice is not relevant in the calculation until the expiration date has passed. Again, the full scan will check the expiration dates and take this into account for the calculations.
After excluding a gateway, do we need to actively perform a scan or is it automatic?
You need to perform a scan. The gateways status is calculated as the average of all the Security Best Practices running on this gateway. Meaning, Global Properties Security Best Practices are not included in the calculation. Security Best Practices that have been deactivated on a certain gateway are not included in the calculation, as well.
Status of a requirement: Each Security Best Practice is assigned to one or more regulatory requirements. The status of a requirement is calculated as the average score of all the Security Best Practices assigned to this requirement. The score is a percentage and translated into a status according to the same thresholds logic.
How is the Regulation score impacted after a Security Best Practice is excluded? When does it change? After a Security Best Practice is deactivated (and full scan performed), the grade of the Regulation should be based on only the activated assigned Security Best Practices.
After excluding a gateway, do we need to actively perform a scan or is it automatic? After deactivating a gateway, a "save" and full scan is needed in order to recalculate all the Security Best Practice results. After this is done, the Regulation results will change, as well.
Are any processes being generated in the background? No processes are being generated. The system waits for the full scan.
When setting a date, is there a process being run in the background? No process is being run. The only effect of the due date is the distribution of the statistics in the 'Overview' > 'Action Item'.
Date format errors: where is the date format taken from? The dates/time is checked and compared with the server time.
How do the Action Items interact with the daily scan? Once a Security Best Practice becomes 100% secure, its corresponding Action Item should disappear from the Action Items screen (in the menu).
And the mini-scan? Once a Security Best Practice becomes 100% secure, its corresponding Action Item should disappear from the Action Items screen.
When pressing Save, a mini-scan takes place. What is the process? How long should it take? What is normal and what is abnormal (in terms of time range)?
A mini-scan recalculates the relevant Security Best Practice (relevant to the objects changed in the last save). This process should take up to 30 seconds. At the end of the process, the user is notified if any Security Best Practice statuses have gotten worse with Security alerts.
Some actions will require a full scan (no mini scan will be executed after the save): Adding/removing gateway objects, adding/removing blades from gateways, deactivating Security Best Practice or Security Best Practice objects, IP Address changes in Profiles or Protections.
When is "post-save" information updated in the Overview and Security Best Practice windows? After the mini-scan is finished (or full scan, as well), the GUI and data is updated automatically.
Generation of Compliance Alerts - process involved? Part of the mini scan (see above).
How the Save adds and removes Action Items based on the results? See "Action Items".
How is the data generated? Based on the results in the last scan (what is viewed in the system at that moment).
Format issues? - No export to Word. Permissions issue may cause the generation of the report to fail.
Export to PDF issues? Some paging issues still exist.
Export to email client? No issues.
What happens when I export data to Excel? Process involved? The Excel Export is based on the results in the last scan (what is viewed in the system at that moment).
Process when I select / choose my favorites? The favorite gateways are saved on the local machine. Each user has his own favorites.
When editing a comment / timeframe of an Exclusion, is there a process in the background that updates somewhere? Requires a full scan to take effect.
How does the software know when to cancel the exclusion (reached the due date)? Requires a full scan to take effect.
Deleting an Exclusion - Requires a full scan to take effect. See "Exclusions - Deactivating a Best Practice, or object within a Best Practice".
When performing Install Policy, are there any GRC processes running that impact performance? No process is running.
Cancelling the Security Alerts post-install policy: What is the process here? Upon install policy, the user can decide to view the compliance report/view current Security alerts / delete the current Security alerts. If delete Security alerts is chosen, the alerts are deleted from the DB. No special process.
If the help text is not loading, what is it being linked to? Standard SmartConsole help. Not specific to Compliance Blade.
Scoring errors Should not be any.
When a Best Practice is displayed as "NA"
The security product is not enabled on the specific gateway.
Security Best Practices of type "OS" (Operating System) can only run on Check Point devices running the GAIA operating system, except for 61k and 64k appliances. For example, SMB devices run the GAIA Embedded operating system and therefore all OS best practices show N/A for each SMB gateway.
Dependent Best Practice: A Security Best Practice can be dependent on another Security Best Practice status. The current Security Best Practice will be tested only if the dependent Security Best Practice is above a specified threshold. If it is not above that threshold, the current Security Best Practice will be "NA".
' > 'Rescan'), the status changes to "pending ..." and rescan does not start after more than 20 seconds.
Go to 'Other' -> 'grc_test_elements'.
Sort the table by the object name.
Look for an object named "grc_interpreter" (there should be only one) and click on it.
Look for the field_name "status".
Right-click on that field and click "Reset".
On the Security Management Server, run cpstop command.
Edit the file /opt/CPPIgrc-R75.4X/bin/grc.conf: Set the value of debugMode to "1"
Note: Starting from R77, edit the file $FWDIR/conf/grc.conf.
Connect with SmartConsole to Security Management Server / Domain Management Server.
Note: Starting from R77, $FWDIR/log/grc_interpreter.elg*.
In the $FWDIR/log/fwm.elg file, look for the string: "interpreter was requested to rerun".
If you find the string, we should look for additional information about the cause of the problem in the continuation of the log.
Otherwise/If instead you see "no pending requests found" - should coordinate with Contact Check Point Support.
The Compliance blade supports VSX Gateways / VSX Clusters running R77.20 and above. By design, the "Security Best Practices" for "Gaia OS" are not checked on VSX Gateways / VSX Clusters.
The relevant object for APP & URLF practices are the Policies, since you need to handle them per policy (and not layer). As for inline layers, the parent rule of inline layers are usually not Src = 'Any' Dst ='Any' or 'Internet'. Hence, even though the inline layer rule states Src = 'Any' Dst ='Any' or 'Internet' , the traffic that reaches the inline layer for matching may be skipped because of the parent definition.
Related Solution: sk92861 - ATRG: Compliance Blade (Pre-R80.10). | 2019-04-21T12:53:39Z | https://supportcenter.checkpoint.com/supportcenter/?eventSubmit_doGoviewsolutiondetails=&solutionid=sk120256&partition=General&product=Compliance |
CDC4, which encodes an F-box protein that is a member of the Skp1-Cdc53/Cul1-F-box (SCF) ubiquitin E3 ligase, was initially identified in the budding yeast Saccharomyces cerevisiae as an essential gene for progression through G1-S transition of the cell cycle. Although Candida albicans CDC4 (CaCDC4) can release the mitotic defect caused by the loss of CDC4 in S. cerevisiae, CaCDC4 is nonessential and suppresses filamentation.
To further elucidate the function of CaCDC4, a C. albicans strain, with one CaCDC4 allele deleted and the other under the repressible C. albicans MET3 promoter (CaMET3 p) control, was made before introducing cassettes capable of doxycycline (Dox)-induced expression of various C. albicans Cdc4 (Ca Cdc4) domains. Cells from each strain could express a specific Ca Cdc4 domain under Dox-induced, but CaMET3-CaCDC4 repressed conditions. Cells expressing domains without either the F-box or WD40-repeat exhibited filamentation and flocculation similarly to those lacking CaCDC4 expression, indicating the functional essentiality of the F-box and WD40-repeat. Notably, cells expressing the N-terminal 85-amino acid truncated Ca Cdc4 partially reverse the filament-to-yeast and weaken the ability to flocculate compared to those expressing the full-length Ca Cdc4, suggesting that N-terminal 85-amino acid of Ca Cdc4 regulates both morphogenesis and flocculation.
The F-box and the WD40-repeat of Ca Cdc4 are essential in inhibiting yeast-to-filament transition and flocculation. The N-terminal region (1–85) of Ca Cdc4 also has a positive role for its function, lost of which impairs both the ability to flocculate and to reverse filamentous growth in C. albicans.
Candida albicans is a natural diploid without a complete sexual cycle and exists as yeast, pseudohyphal, and hyphal cells . It is capable of a morphological switch induced by environmental stimuli , essentially via cAMP-mediated and MAPK signaling pathways . Importantly, its ability to alter morphology among cell types is associated with virulence to humans . Many cell cycle regulators including cyclins are also known to control morphogenesis in C. albicans.
Recently, an F-box protein encoded C. albicans CDC4 (CaCDC4) has been shown to play a role in filamentous development [6, 7]. Cdc4, originally identified in the budding yeast Saccharomyces cerevisiae, encodes ubiquitin E3 ligases, which belongs to a member of the Skp1-Cdc53/Cul1-F-box (SCF) complex. This complex is known to play a role in ubiquitin-proteasome dependent degradation of regulatory proteins in eukaryotes . A specific SCF complex is designated by its associated F-box protein. This protein is variable with two interacting domains of F-box for Skp1 and WD40-repeat (or LRR) for specific substrates , such that Cdc4 can be named SCFCdc4. To progress through the G1-S transition in S. cerevisiae, SCFCdc4 is required to degrade Sic1 and Far1 , which are the cyclin-dependent kinase inhibitors. Therefore, S. cerevisiae CDC4 (ScCDC4) is essential in S. cerevisiae.
Although Ca Cdc4 is a structural homolog of S. cerevisiae Cdc4 (Sc Cdc4) and is capable of rescuing the mitotic defect caused by the loss of ScCDC4 in S. cerevisiae, the functions of Ca Cdc4 and ScCdc4 are dissimilar as the null Cacdc4 mutant is viable and the depletion of Ca Cdc4 causes the accumulation of Sol1 (Sic1 like) for hyphal development rather than initiation of cell cycle arrest . This verifies that CaCDC4 is nonessential and suppresses filamentation and suggests that controlling the degradation on Sol1 in C. albicans by Ca Cdc4 is important for inhibition of filamentation. Therefore, while C. albicans Sol1 is likely a substrate of SCFCaCdc4, which can be demonstrated by the reduction of Sol1 when Ca Cdc4 is overexpressed , there has not been any direct evidence to support this hypothesis. Additionally, the filamentous properties for mutants of Cacdc4 null and Cacdc4 sol1 double null were comparable. This refutes the idea that Sol1 is the sole target of Ca Cdc4. Indeed, with an affinity-purification approach, we have isolated at least two novel Ca Cdc4-associated proteins that are potential substrates of Ca Cdc4.
To further elucidate the role of CaCDC4 and its mediation through a characteristic F-box protein of SCF ubiquitin E3 ligase in C. albicans, we have sought to dissect the Ca Cdc4 domains associated with filamentation. In this study, we made a C. albicans strain with one deleted CaCDC4 allele and repressed the other by CaMET3 promoter (CaMET3 p) using methionine and cysteine (Met/Cys). We used this strain to introduce plasmids capable of inducing expression of various Ca Cdc4 domains with doxycycline (Dox). We observed the roles of F-box and WD40-repeat for Ca Cdc4 function and the possible role of the N-terminal 85-amino acid for morphogenesis. We also showed that C. albicans cells that lacked Ca Cdc4 triggered flocculation. Moreover, we found that N-terminal 85-amino acid of Ca Cdc4 is required for inhibition of both filamentation and flocculation.
E. coli strain DH5α was used for the routine manipulation of the plasmids. They were grown at 37°C in LB broth medium or on plates containing 1.5% agar (Difco, BD Biosciences), with 50 μg/ml ampicillin or 30 μg/ml kanamycin. All C. albicans strains (Table 1) were derived from auxotrophic strain BWP17 (arg4/arg4 his1/his1 ura3/ura3) . They were grown at 30°C in either yeast extract-peptone-dextrose (YEPD) or supplemented minimal synthetic defined (SD) medium with 2% glucose with or without 2% agar . While Ura+ prototrophs were selected on SD agar plates without uridine, His+ prototrophs were selected on SD plates without histidine. Selection for the loss of the C. albicans URA3 (CaURA3) marker was performed on plates with 50 μg/ml uridine and 1 mg/ml 5-fluoroorotic acid (5-FOA, MD Bio). To repress the CaCDC4 expression that was controlled by CaMET3 p, strains were grown on SD medium or on plates with 2.5 mM Met/Cys, which has been shown to optimally switch off the expression of the CaMET3 p-driven downstream gene . To induce gene expression under the Tet-on system, 40 μg/ml Dox (Sigma) was added to YEPD or SD media.
Plasmid DNA was extracted routinely from E. coli cultures using Gene-SpinTM MiniPrep purification Kit-V2 (PRO TECH, Taipei, Taiwan) and the instructions provided by the manufacturer. E. coli was transformed with plasmid DNA by using CaCl2. The DNA cassettes were introduced into C. albicans by the lithium acetate method as described previously .
Initially, a strain with repressed CaCDC4 expression was made. A mini-Ura-blaster cassette, flanked with 60-bp sequences homologous to CaCDC4, was PCR-amplified using a template of plasmid pDDB57 and long primers of CaCDC4-URA3-F and CaCDC4-URA3-R (Table 1). BWP17 was transformed by integration of the cassette into the CaCDC4 locus to generate Ura+ strain JSCA0018. The plasmid pFA-HIS1-MET3p-CaCDC4, with a partial CaCDC4 coding sequence for N-terminal Ca Cdc4 (1–563), was linearized with Bsp EI and used to transform JSCA0018 to generate His+ JSCA0021 (Figure 1A; Table 1). Cells of JSCA0021 were plated with 5-FOA to induce recombination between two copies of dpl200 flanking the mini-Ura-blaster for a loss of CaURA3 to generate JSCA0022.
Construction of a C. albicans strain for repressibly expressing CaCDC4 . (A) Strain construction (detailed in the Methods). The first CaCDC4 allele on BWP17 was deleted by mini-Ura-blaster to obtain JSCA0018. Plasmid pFA-HIS1-MET3p-CaCDC4 containing partial CaCDC4 coding sequence was linearized at a unique site for introducing into strain JSCA0018 to generate JSCA0021. 5-FOA was used to counter-select CaURA3 removal to obtain JSCA0022 for re-introducing the Tet-on plasmid with a CaURA3 marker. (B) Verification of constructed strains by Southern blotting analysis. Organization of the CaCDC4 locus with respect to Nde I sites is shown. The relative positions of the probe used and the predicted Nde I-digested pattern of the CaCDC4 locus are indicated. Two Nde I-fragments of 14 kb and 8.5 kb, specific to CaCDC4, could be detected in genomic DNA from BWP17 digested with Nde I; two Nde I-fragments of 8.5 kb and 4.5 kb, specific to CaCDC4 and Cacdc4::URA3-dpl200, respectively, could be detected in JCSA0018; two Nde I-fragments of 4.5 kb and 7.4 kb specific to Cacdc4::URA3-dpl200 and Cacdc4::P MET3 -CDC4:HIS1, respectively, could be detected in JSCA0021; and two Nde I-fragments of 13.5 kb and 7.4 kb specific to Cacdc4::dpl200 and Cacdc4::P MET3 -CDC4:HIS1, respectively, could be detected in JSCA0022. A non-specific Nde I-fragment is indicated as “*” can be detected in all strains tested.
To allow the expression of cassettes encoding assorted Ca Cdc4 domains in C. albicans, a Tet-on plasmid, pTET25M , which is derived from pTET25 for inducing gene expression with Dox, has been developed. To regulate CaCDC4 expression by the Tet-on system, the coding sequence of CaCDC4 was PCR-amplified using plasmid CaCDC4-SBTA bearing CaCDC4 (Lai WC, unpublished results), primers CaCDC4-SalI and CaCDC4-BglII (Table 2), and Pfu polymerase (5 U/μl, MD bio), digested with Sal I and Bgl II for cloning into pTET25M, from which pTET25M-CaCDC4 was generated. Moreover, CaCDC4-6HF, which encodes 6×histidine and FLAG (6HF) tags at the C-terminal of Ca Cdc4, was PCR-amplified with primers CaCDC4-6HF SalI and CaCDC4-6HF BglII (Table 2), followed by digestion with Sal I and Bgl II and cloning into pTET25M to obtain pTET25M-CaCDC4-6HF.
a Restriction enzyme sites are in italics.
b Sequences complementary to those encoding 6×His and FLAG are in lower case letters. The italics has been used for restriction enzymes as in note “a”. The underline is new replaced with lower case letters.
To define the function of the distinct Ca Cdc4 domains (Figure 2A), different CaCDC4 portions were used to replace the full length CaCDC4 coding sequence on pTET25M-CaCDC4-6HF. By using the primer sets listed in Table 2, the following constructs were made: pTET25M-ΔNCaCDC4-6HF (with primers CaCDC4 ΔN AatII and CaCDC4 ΔN XhoI), which encodes the N-terminal truncated Ca Cdc4; pTET25M-F-6HF (with primers CaCDC4 F-box AatII and CaCDC4 F-box XhoI), which encodes the F-box domain with flanking regions; pTET25M-WD40-6HF (with primers CaCDC4 WD40 AatII and CaCDC4 ΔN XhoI), which encodes eight copies of WD40-repeat; and pTET25M-ΔNF-6HF (with primers CaCDC4 ΔN AatII and CaCDC4 F-box XhoI), which encodes truncated N-terminal Ca Cdc4 and the F-box domain. All inserts of the constructs were released with Aat II and Xho I to replace the full-length CaCDC4 on pTET25M-CaCDC4-6HF. Consequently, plasmids bearing those CaCDC4 segments flanked with common C. albicans ADH1 (CaADH1) sites were digested with Sac II and Kpn I, each of which was transformed into C. albicans for integration at the CaADH1 locus. All strains were verified by colony PCR with specific primers before subjecting to Southern blotting analysis.
Morphological analysis of the constructed CaCDC4 repressible strains. Cells of strains JSCA0021 and JSCA0022 were grown on SD medium or plates with (+) or without (-) Met/Cys. Colonies were photographed with MEIJI stereoscopic microscope EMZ5 at 40× magnification (top panel). Cells in liquid culture were visualized and recorded with a Nikon 50i microscope at 400× magnification (bottom panel). Bars represent 10 μm.
Genomic DNA from the C. albicans strains was isolated by the MasterPure™ Yeast DNA Purification Kit (Epicentre®, an Illumina company) according to the manufacture’s instruction. Southern blotting was performed with the aid of the Rapid Downward Transfer System (TurboBlotter™, Whatman) using 10 μg of the restriction enzyme-digested genomic DNA. The DNA on the blot was hybridized with a probe amplified by the PCR DIG probe synthesis kit (Roche) with the primers CaCDC4_Probe_F and CaCDC4_Probe_R for CaCDC4 locus or CaADH1 Probe_F and CaADH1 probe_R for ADH1 locus (Table 2) using DIG Easy Hyb (Roche). To reveal the structure of gene locus, the DIG Luminescent Detection Kit (Roche) was used after hybridization, and the luminescent images of blot were captured with the imaging analysis system (ImageQuant LAS4000 mini, GE Healthcare Life Sciences).
Cultured cells were collected, and the total protein from each sample was extracted as described previously . The proteins were resolved by 10% SDS-PAGE and transferred to PVDF membranes (PerkinElmer, Boston, USA). Proteins on the membranes were probed with polyclonal antibody to FLAG (Sigma) in 1:2000 dilution and detected using the SuperSignal West Pico Chemiluminescent Substrate Kit (PIERCE). These were recorded with the Luminescent Image Analyzer (FUJIFILM LAS-1000) and analyzed by ImageGauge 3.46 and L Process v 1.96 (FUJIFILM).
The cells of strains were streaked on YPD agar plate for 3 days and colonies were picked and inoculated into SD medium with required supplements for 48 hrs. Next, the cultures were diluted into fresh SD medium to 0.1 of an initial OD600 with required supplements. To simultaneously repress the expression of CaMET3 p-driven CaCDC4 and to induce the expression of various CaCDC4 segments encoding series of Ca Cdc4 domains, 2.5 mM Met/Cys and 40 μg/ml Dox were also added into the SD medium. After 48 hrs, the cultures were spun down for 1 minute at 500 rpm, and the suspensions of the cultures were sampled to determine their optical density at OD600. Three independent assays were conducted and each sample was assayed in duplication. A paired Student t test with p < 0.05 was considered significance.
The FLO-encoded flocculins are known to be essential for flocculation in S. cerevisiae. Functional homologues of FLO genes have been found in C. albicans. In particular, the important S. cerevisiae gene FLO11 responsible for flocculation has C. albicans functional counterpart ALS1. Since FLO11-associated flocculation is dependent on the presence of Ca2+, we adopted an alternative flocculation assay in which the rate of flocculation is initiated by Ca2+ and the optical density was assessed within a short time-frame . Briefly, to initiate flocculation, an aliquot of 800 μl deflocculated cell suspension was transferred into a 1-ml cuvette, followed by addition of 200 μl of 100 mM CaCl2. The cuvette was mixed robustly by pipetting and the absorbance (OD600) was assessed instantly at 30-s intervals for 5 minutes using a spectrophotometer (DU800, Beckman Coulter, Inc.). All assays were conducted in triplicate.
To establish C. albicans strains capable of expressing CaCDC4 and its domains solely controlled under a Tet promoter directly in C. albicans, BWP17, with both alleles of CaCDC4 deleted, was constructed to accommodate Tet-on plasmid cassettes capable of expressing assorted Ca Cdc4 domains induced by Dox. The first allele of CaCDC4 was deleted in BWP17 by mini-Ura-blaster to generate the JSCA0018 strain (Figure 1A; Table 1). This strain was used to delete the second CaCDC4 allele to obtain a Cacdc4 null mutant. However, Cacdc4 null mutant cells growing as filamentous form with toughened cell walls obstructed transformation.
To overcome this problem, the strain JSCA0021 (Figure 1A; Table 1) was created that had one CaCDC4 allele deleted and the other under CaMET3 control that was Met/Cys repressible. To allow the introduction of Tet-on cassettes with the same CaURA3 selectable marker as the mini-Ura-blaster on JSCA0021, 5-FOA was used as a counter-selection agent to remove CaURA3 from JSCA0021, from which JSCA0022 was obtained (Figure 1A; Table 1). The strains were PCR-confirmed with specific primers before subjecting to Southern blotting analysis. The CaCDC4 locus from BWP17 strain could detect two Nde I-digested fragments with size of 14 kb and 8.5 kb, respectively (Figure 1B). The size shifting of Nde I-fragment flanking CaCDC4 from 14 kb to 4.5 kb demonstrated that one CaCDC4 allele was integrated with the mini-Ura-blaster cassette as in strain JSCA0018 (Figure 1B). The size shifting of Nde I-fragment flanking CaCDC4 from 8.5 kb to 7.4 kb demonstrated that the other CaCDC4 allele integrated with the MET3-diven CaCDC4 plasmid as in strain JSCA0021 (Figure 1B). Strain JSCA0021 could be further popped out the mini-Ura-blaster cassette to obtain strain JSCA0022 in which the size shifting of Nde I-fragment flanking CaCDC4 from 4.5 kb to 13.5 kb (Figure 1B). These results indicate that all strains constructed have expected organizations in their genome.
It has been shown that Ura— auxotrophic mutants are avirulent and other virulence-associated features can be influenced by the level of CaURA3 gene expression . To assess presence of CaURA3 having effect on yeast-to-filament transition, the yeast-to-filament transitions between strain JSCA0021 and JSCA0022 were compared, cells of those strains were assessed under CaMET3 p repressed or de-repressed conditions. Cells of both strains on SD plates without Met/Cys grew as circular colonies with smooth surfaces (Figure 2). By contrast, cells on plates with Met/Cys formed irregular colonies with filaments (Figure 2). Under the microscope, these strains exhibited equivalent filamentous forms, suggesting a comparable ability to deplete CaCDC4 for expression and inability of CaURA3 interfering with yeast-to-filament transition in C. albicans. Subsequently, JSCA0022 was used as a parental strain to introduce the Tet-on cassettes (with CaURA3 marker) that encoded assorted Ca Cdc4 domains.
The filamentous development of JSCA0022 under CaMET3 p-CaCDC4 repressed conditions, with Met/Cys and the Tet-on system, allows us to study the function of the Ca Cdc4 domains. A set of Tet-on cassettes (obtained from pTET25M-CaCDC4-6HF, pTET25M-ΔN-6HF, pTET25M-F-box-6HF, pTET25M-WD40-6HF, and pTET25M-ΔNF-6HF) that encoded each of the assorted domains of Ca Cdc4 (Figure 3A) were used to transform JSCA0022 (which contained a CaMET3 p-repressible CaCDC4) to Ura+ by integration at the CaADH1 locus (Figure 3B). The correctness of the strains was confirmed by yeast colony PCR with specific primers before Southern blotting analysis. The CaADH1 locus from strain JSCA0022 could detect a Spe I-digested fragment with size of 3.3 kb (Figure 3C). The CaADH1 locus from strains JSCA0023 and JSCA0024 detected an increased Spe I-digested fragment of 9.4 kb due to the integration of Tet-on cassettes of either pTET25M-CaCDC4 or pTET25M-CaCDC4-6HF (Figure 3C). The CaADH1 locus from other strains also showed expected alteration in size according to the size of different CaCDC4 domains (Figure 3C). These results confirmed the correctness of the strains.
Construction of C. albicans strains for Dox-inducing the expression of assorted CaCDC4 domains. (A) Schematic representation of Ca Cdc4 domains expressed from the Tet-on system. The strains with which they are derived and predicted Tet-on cassette size are shown (B) Generation of Tet-on cassettes for expressing assorted CaCdc4 domains. Different portions of CaCDC4 were PCR-generated with primer sets (Table 2) containing common Aat II and Xho I sites for replacing full-length CaCDC4 on pTET25M-CaCDC4-6HF as described in the Methods. By digestion with Sac II and Kpn I, each cassette was used to transform C. albicans strain JSCA0022 for integration into the CaADH1 locus. (C) Verification of Tet-on cassettes being integrated into CaADH1 locus by Southern blotting analysis. Organization of the CaADH1 locus with respect to Spe I sites is shown in Figure 3B. The relative positions of the probe used and the predicted Spe I-digested pattern of the CaADHI locus are indicated in Figure 3B. One Spe I-fragment of 3.3 kb specific to CaADH1 locus could be detected in genomic DNA from strain JSCA0022 and its derivatives digested with Spe I. The correctness of integration of the cassette into the CaADH1 locus of various strains was confirmed by alteration of the Spe I-fragment from size of 3.3 kb to 9.4 kb (Figure 3B) or various sizes as indicated in Figure 3A.
The JSCA0022 strain, which expressed the non-tagged and repressible Ca Cdc4, was used as a negative control. The sample obtained from JSCA0022 contained two prominent proteins of approximately 55 kDa and 72 kDa (Figure 4A) which were presumably a result of cross-reactivity to the anti-FLAG antibody. Those two proteins were used as an internal control. The F-box and WD40-repeat proteins from strains JSCA0026 and JSCA0027 migrated to their expected positions of approximately 19 kDa and 43 kDa (Figure 4A), respectively. However, the full-length Ca Cdc4 and the N-terminus truncated Ca Cdc4 (ΔN) from strains JSCA0024 and JSCA0025 exhibited signals at positions corresponding to 100 kDa and over 100 kDa (Figure 4A), respectively, as opposed to 86 kDa and 77 kDa, respectively. Three distinctive signals (Figure 4A) were observed for strain JSCA0030 expressing ΔNF of Ca Cdc4, but none of them matched the expected size of 34 kDa; however, the signal at the lowest position could be meaningful. These patterns of expression were similar to strains expressing each of the domains, with either BWP17 or JSCA0021 as a parental strain (Lai WC, unpublished results). Therefore, even though some of the strains expressed domains with unexpected size, they were unique from the negative control of JSCA0022. We concluded that the Tet-on system functions in JSCA0022 and that Ca Cdc4 might be undergoing undefined modifications.
Morphological analysis of C. albicans strains capable of Dox-inducing the expression of assorted CaCDC4 domains. Cells were grown initially in SD medium without Met/Cys to saturation and were diluted to the same initial concentration. Cells were grown exponentially in SD in the absence of 2.5 mM Met/Cys, with or without 50 μg/ml Dox (-Met/Cys + Dox or -Met/Cys), or in the presence of 2.5 mM Met/Cys, with or without 50 μg/ml Dox (+Met/Cys + Dox or + Met/Cys). (A) The Dox-inducibly expressing assorted Ca Cdc4 protein domains under CaMET3-CaCDC4 repressed conditions was verified by Western blotting with polyclonal antibody to FLAG. The non-specific signals between 72 and 55 kDa, and between 55 and 40 kDa are served as a loading controls. (B) The images were visualized and recorded with a Nikon 50i microscope at 400× magnification. The arrow in white indicates filamentous cells. Bars represent 10 μm. The designations of strains are the same as in Table 1.
To determine the function of the assorted Ca Cdc4 domains, JSCA0022-based strains capable of repressing CaCDC4 and inducing expression of assorted Ca Cdc4 domains were grown in SD medium with or without Met/Cys and in the presence or absence of Dox. Cells from strains in SD medium without Met/Cys grew as yeast in the presence or absence of Dox (Figure 4B). By contrast, cells from strains in medium with Met/Cys grew with filaments (Figure 4B). As expected, cells of JSCA0023 and JSCA0024 growing on medium with Met/Cys and Dox and that expressed the full-length Ca Cdc4 with or without tag grew as yeast. Disregarding the full-length Ca Cdc4, cells from all strains, except JSCA0025 expressing assorted domains, still grew as filaments (Figure 4B). Under Met/Cys and Dox conditions, cells from JSCA0025 expressing the N-terminal 85-amino acid truncated Ca Cdc4 seemed to have an ability to suppress filamentation but not complete back to the yeast form (Figure 4B). This is in consistent with our previous observation in which, comparing with cells capable of expressing the full-length Ca Cdc4 under the CaMET3 p repressible control, those cells expressing the N-terminal 85-amino acid truncated Ca Cdc4 lagged behind in reaching exponential stage (Additional file 1: Figure S1) and converted to filamentous form earlier (Additional file 2: Figure S2) in the repressed condition.
Significant differences in the ability among strains to form suspensions (to resist flocculation) were observed. The extent of flocculation among strains was observed after resuspending the cells in cuvettes, where they remained for 30 seconds. When cells were grown under the Met/Cys and Dox conditions, only those from JSCA0023 and JSCA0024 were somewhat easier to maintain as a suspension. To exclude the possibility that this was a result of increases in cell density, cells from all strains were initially grown to saturation, and the cultures were subsequently diluted to the same initial optical density and grown exponentially to similar optical density. The extent of flocculation among strains was observed after spinning the cells for 1 minute at 500 rpm. The suspended cells were sampled for determination of their optical density. Cells resisted in flocculation would remain in suspension upon centrifugation. Under the CaMET3 p de-repressed condition and in the presence or absence of Dox, all strains exhibited a similar degree of suspension. However, under the CaMET3 p repressed condition, JSCA0026, JSCA0027, and JSCA0030 displayed flocculation similar to JSCA0022 regardless of the presence or absence of Dox (Figure 5A). While more cells of strains JSCA0023, JSCA0024 maintained as suspension, those of JSCA0025 with some filamentous cells, showed comparable extent of flocculation to JSCA0022 under CaMET3 p repressed but Tet-on induced conditions (Figure 5).
Analysis of cell flocculation by low-speed centrifugation. Cultures of the indicated strains were grown in SD medium with histidine, arginine, uridine for 2 days before diluting into the SD medium to an initial OD600 = 0.1 with addition of 2.5 mM Met/Cys to repress the expression of CaMET3 p-driven CaCDC4 and 40 μg/ml Dox to induce the expression of Ca Cdc4 domains tested for 48 hrs to OD600 ≈ 1.6. Cultures were photographed before and after centrifugation. (A). A representative of the cultures. Upper panel: two-day culture. Bottom panel: cultures being spun down with 500 rpm for 1 minute. (B). Quantitative results. Data are represented as means with standard deviation from three independent experiments, each sample was in duplication. The data from JSCA0022 were compared with those of other strains. **: P < 0.01. The designations of strains are the same as in Table 1.
To solidify our observations, an alternative flocculation assay where flocculation is initiated by addition of Ca2+ to the culture medium being depleted with Ca2+ beforehand was used . Only cells of JSCA0023 and JSCA0024 remained resistance in flocculation during the time-frame of 5-minute assay compared with those of the rest of strains (Figure 6), which were consistent with the results shown in Figure 5. However, both strains JSCA0025 and JSCA0027 exhibited greater ability to resist flocculation than that of JCSA 0026 and JSCA0030 when considering the differences in OD600 from the initial to the end points.
Analysis of Ca 2+ initiated cell flocculation. The strains were grown as described in Figure 5 to saturation at OD600 ≈ 1.4. The cultures were harvested and washed twice with deflocculation buffer, followed by initiation of flocculation as described in the Methods. The assays were conducted in triplicate. The name of each strain shows only the last two numbers.
In this study, we aimed to dissect the function of Ca Cdc4 domains by introducing a Tet-on system with cassettes that encoded for a variety of Ca Cdc4 domains in a C. albicans mutant of Cacdc4 null. However, the Cacdc4 null mutant with a filamentous form could not be easily used to introduce the Tet-on cassettes; therefore, we constructed the JSCA0022 strain, where CaURA3 was released from the strain JSCA0021, and CaCDC4 expression was repressible. Under repressed conditions, the JSCA0022 strain showed similar filamentous morphology (Figure 2) to those from previous reports of cells with CaCDC4 repressed strain [6, 7] and of cacdc4 null mutant (Tseng TL, Hsu WH, and Shieh JC, unpublished results). We confirmed that the JSCA0022 strain under repressed conditions was equivalent to a strain that had completely lost CaCDC4 function. Hence, by introduction of the Tet-on cassettes into JCSA0022 strain, each of the strains was capable of expressing individual Ca Cdc4 domains in the presence of Met/Cys and Dox for functional comparisons.
To verify the ability of the Tet-on cassettes in C. albicans, each of the cassettes encoding various Ca Cdc4 domains was transformed into BWP17 and JSCA0021 before introducing them into JSCA0022 at the CaADH1 locus. Individual Ca Cdc4 domains from relevant strains were all detectable, suggesting that the Tet-on system functions in C. albicans. However, while cells expressing the F-box and the WD40 repeat could be detected as their expected sizes, those expressing the full-length Ca Cdc4, the N-terminus truncated Ca Cdc4 (ΔN), and the ΔNF of Ca Cdc4 could be detected at positions higher than anticipated (Figure 4A). In particular, the sample from strain JSCA0030 expressing the ΔNF could be detected three signals (Figure 4A), all of which were greater than the predicted sizes. These results suggest that the N-terminal Ca Cdc4 from residue 85 to 241 (Figure 3A) might be undergoing post-translational modification during the Tet-on-induced expression, although its functional significance is unknown. Interestingly, the region between residue 85 and 241 of Ca Cdc4 contains abundant serine and threonine residues, the majority of which are homologous to S. cerevisiae Cdc4 . This implies possible phosphorylations or other modifications on these residues that is specific to C. albicans. However, the genuine nature of these residues remains to be determined, and their functional significance of this N-terminal Ca Cdc4 requires further study.
With regards to integration of CaADH1 locus by the Tet-on cassette, it is known that C. albicans adh1 homozygous null mutant gains the ability to form biofilm both in vitro and in vivo, suggesting a possible role of CaADH1 in flocculation. However, the heterozygous CaADH1 null mutant with which the homozygous adh1 null mutant is reintegrated a functional copy of CaADH1 to the CaADH1 locus appears to be similar in biofilm formation as its isogenic wild-type strain. In addition, disruption of CaADH1 has no consequence of morphology alteration in C. albicans (Lai WC, unpublished results). Therefore, the possible effect of Tet-on cassette on flocculation and filamentation by integration, hence disruption of a copy of CaADH1 locus can be excluded.
Under the Met/Cys and Dox conditions, cells expressing F-box, WD40 repeat, and the ΔNF of Ca Cdc4 exhibited filamentous forms similar to those of JSCA0022, whose CaCDC4 was repressed, compared to those expressing the full-length Ca Cdc4 without or with tag (JSCA0023 and JSCA0024), which exhibited yeast forms (Figure 4B). These results suggest that both the WD40 repeat and F-box are essential to suppress the yeast-to-filament transition. Cells from strain JSCA0025 expressing the ΔN of Ca Cdc4, which were grown in the presence of Met/Cys and Dox, were only partially able to reverse filamentous cells to yeast cells, suggesting that the N-terminal 85-amino acid of Ca Cdc4 plays a role in the yeast-to-filament transition in C. albicans. The role of the N-terminal 85-amino acid of Ca Cdc4 for growth was observed previously, in which cells expressing N-terminal 85-amino acid truncated Ca Cdc4 lagged slightly in proliferation during the exponential stage (Additional file 1: Figure S1), and repression of the expression of the N-terminal 85-amino acid truncated Ca Cdc4 resulted in prominently lagging behind in growth, which was presumably due to the morphological alteration of cells to filaments in advance (Additional file 2: Figure S2) that delays proliferation as compared to those of yeast cells. Since the N-terminal 85-amino acid of Ca Cdc4 is unique compared to that of the S. cerevisiae Cdc4 , our finding reveals a role of N-terminal 85-amino acid of Ca Cdc4 on morphogenesis, which is unknown previously.
Importantly, cells of all JSCA0022-based strains exhibited flocculation in medium with Met/Cys, but the strains JSCA0023 (CaCDC4) and JSCA0024 (CaCDC4-6HF) exhibited less flocculation by adding Dox simultaneously (Figure 5). Unlike cells of JSCA0023 and JSCA0024, those of JSCA0025 expressing N-terminal 85-amino acid truncated Ca Cdc4 were unable to totally overturn filamentous-to-yeast cells, suggesting that N-terminal 85-amino acid is required for full activity of CaCDC4 function in C. albicans to inhibit filamentation. However, if flocculation is tightly associated with filamentation, we expect to see the extent of flocculation in JCSA0025 (ΔN 6HF) being greater than that of JSCA0022 but less than that of JSCA0023 and JSCA0024 in the presence of Met/Cys and Dox. This was not revealed by the low speed-centrifugation method but by the Ca2+-initiation assay. Importantly, both JSCA0025 and JSCA0027 expressing Ca Cdc4 lacking N-terminal 85-amino acid (Figure 3A) exhibits similar extent of flocculation. Moreover, JSCA0025 that expressing Ca Cdc4 lacking N-terminal 85-amino acid could only partially suppress filamentation yet JSCA0027 that expressing Ca Cdc4 lacking N-terminal 85-amino acid and F-box with flanking regions completely lose the ability to inhibit filamentation (Figure 3A and Figure 4B). These results imply that N-terminal 85-amino acid of Ca Cdc4 has a role in inhibition of cell flocculation in C. albicans and that the F-box and its flanking region in addition to the N-terminal 85-amino acid of Ca Cdc4 might be associated with proper control of both morphogenesis and flocculation.
Therefore, we conclude that F-box and WD40-repeat are important in suppressing yeast-to-filament transition and flocculation and that the N-terminal region (1–85) has a positive role in CaCDC4 function, lost of which impairs reverse of filament-to-yeast and reduces the ability to flocculate in C. albicans. Moreover, the function of Ca Cdc4 for suppressing flocculation that is related to cell-cell adhesion implies a role of CaCDC4 in biofilm formation that is under investigation.
The authors thank Dr. A. Mitchell (Columbia University) for C. albicans strain BWP17 and plasmid pDDB57, Dr. J. Wendland for pFA-HIS1-MET3p (Friedrich-Schiller-University, Jena, Germany), and Dr. J. Morschhäuser for pTET25 (Universität Würzburg University, Würzburg, Germany). We gratefully acknowledge the financial support for this work provided by a grant of a collaborative agreement between the Chung Shan Medical University (Taichung, Taiwan) and the Antai Tian-Sheng Memorial Hospital (Pingdung, Taiwan) (CSMU-TSMH-097-005) and grants from the National Health Research Institutes (NHRI-EX100-9808SI) and National Science Council (NSC 101-2629-B-040-001-MY3 ) of Taiwan, R.O.C.
CC, WCL, JCS, TLL conceived and designed the experiments. CC, WCL, and TLT performed the experiments. CC, WCL, JCS, and TLT analyzed the data. WCL, TLL, and TLT contributed reagents and materials. JCS wrote the paper. All authors read and approved the final manuscript. | 2019-04-19T01:11:14Z | https://jbiomedsci.biomedcentral.com/articles/10.1186/1423-0127-20-97 |
This winter has been very mild so far, with our coldest weather starting this week and expected to last through the first week of January. As I've had an extra day off the last two weeks, I started to go through my gear and see if everything is up to par and ready for the weather. Yes, temperatures in the 30s classifies as cold in California. Deal with it!
My best rain coat, a Goretex Marmot jacket I've owned for the better part of 20, years just had thezipper pull break. This doesn't make the jacket unusable, just not very convenient to use right now. Marmot will service the jacket for free if there is a mechanical problem like the zipper or a snap fails (which they have done for me in the past). I will be sending the jacket in next summer to be fixed, since it is being used right now.
The two inexpensive emergency space blankets that were in my G.H.B. were both damaged by heavier, sharp-edged items shifting around and tearing both the packaging and blankets. This is my fault, as the blankets could have been placed inside a zip-lock bag for extra protection or placed in a side pocket and not allowed to migrate to the bottom of the bag.
The Tylenol, Advil and Triple Antibiotic were all out of date and from being kept in my truck, probably should have been replaced sooner. The band-aids in my kit were also damaged (by heat, I think) since the paper protective wrapper was separated on half the box.
All my other gear looks fine. Cans of chicken and tuna are in good shape, as are the jerky and energy bars. However, the bars were pretty smashed but the wrappers did not tear, so that was a plus.
The small bottle of Dr. Bronner's soap (kept in its own zip-lock bag) is intact. My Life Straw, Sawyer Mini filter and Katadyn Micropur MP1 tablets are fine. Socks, long sleeve polypropylene tee shirt, knit cap and rain hat are in good shape.
If you get an hour or so, take the time to inspect all your gear. You never know what you will find and what shape things are in until you look!
After telling everyone NOT to buy me anything, I recieved several gifts. People don't listen.
The Doan Magnesium is a familiar item but I had no idea what this shovel would look like. The U-Dig-It seems pretty cool, if a bit heavy at 6 ounces, but looks very sturdy. I do not have any other digging tools in my G.H.B. at the moment, so this is a needed addition. A test and evaluation will be coming in the near future.
I also received a $50 Amazon gift card, from my son and his wife. Who was really told not to get me anything, but whose kids ever listen to their parents?
Thank you all for the nice gifts, cards and Christmas Wishes. I hope the New Year sees you never needing your supplies, but always having them ready.
You take care of your car. You maintain it well. You expect it to take care of you. Then one day, when you can least afford it to fail, you put your key in the ignition and are rewarded with only a click. Your battery is flat. Oh, woe! What to do?
As with the rest of life, step one is Don't Panic. The rest of the solution depends on where you are and what help you have.
Jumper Cables: Way back when I talked about my Car Survival Kit, I mentioned carrying a good set of jumper cables in my truck. They are the most basic way to jump start a dead vehicle, assuming you have another car around to jump yours.
Be very careful to not touch the ends of the cables together while they're connected to any battery or car. They can cause a deadly electric shock.
There are two schools of thought with regard to positioning of jumper cables on the dead car side. Some folks advocate attaching the black lead to a bare metal body piece on the car. I, and various others, feel better results are obtained by hooking the black lead to the negative (marked -) terminal. Either one should work.
Next, connect the red/orange/light-colored lead to the positive (marked +) terminal of the battery.
Connect the same colored leads to the same marked terminals on the live car.
Start the engine on the live car, and allow it to run for a few minutes to give a bit of charge to the dead battery.
While the live car is still running and connected, start the dead car.
Disconnect the cables in the reverse order that you connected them.
Plug-In Chargers: If you're at home, or at least near a power outlet, a battery charger gives quick, sure starts, and doesn't require another vehicle. Simply plug it in to the wall, connect the leads to the battery just like jumper cables, and start your car. If you have time, you can allow the charger to actually charge the battery as well.
Jump Starters: Cables require another car and chargers require an outlet, but Jump Start Packs overcome both of those shortcomings. They are a self-contained battery pack with built-in cables and a charging port. The linked unit also contains a light and an air compressor, for inflating tires that may be a bit low. They aren't cheap, but they're invaluable when your battery goes flat in the middle of nowhere. I owned one for several years, and finally wore it out to the point where the battery would no longer hold a charge. They're expensive, but they're very worth it, the first time they save you in the middle of nowhere.
Keep yourself from getting stranded.
Erin Palette talks about fitness for preppers.
Miguel Gonzalez gives you his pick for the best Christmas movie of all time.
Barron B. explains when security updates aren't enough.
and Weer'd breaks down some audio anti-gun hate.
You can listen to the podcast here, and the show notes may be found here.
It's time for Episode 18 of The Gun Blog Variety Cast!
Adam and Sean host in their usual excellent style.
Erin Palette wants you to pay attention to priorities.
Miguel Gonzalez says "Read those Primary Sources!"
Barron B. talks about police using Stingray devices.
and Weer'd Beard offers an epilogue to his "Gun Death" series.
Check it out. Download, listen, and subscribe. And tell a friend!
Video #3! Hopefully (hopefully!) I have fixed the problem with the jerky video that plagued unboxing #2 and made it unwatchable by some.
Audio should also be substantially better, due to a lovely Christmas present of a quality microphone and stand from a dear, dear friend.
I am amused that I already had 3 of the items in this month's box, but I'm not at all upset; I had planned to get seconds of them anyway, and seeing them here reassures me that at least some of my choices are sound.
For those interested, the Piddly Stik may be found here. Through conversations with them on their Facebook page, I've been told that they will soon be posting videos on how to set up, and how to fish with, the P. Stik. I am looking forward to those, as it looks like a quality bit of handmade kit and not a cheap piece of plastic crap like a pocket fisherman, and I want to understand how to use it.
EDIT: Brook West has found a demonstration video of how to use the Piddly Stik. Thanks, Brook!
Enjoy my video, and please, leave comments! I'm always looking for ways to improve!
Pictures of the box's contents may be found here.
I have been asked to do a compare-and-contrast covering the various methods of water treatment available for preppers. Having spent 18 years operating a waste water treatment plant (the same technology as drinking water treatment, just with looser standards), I'm the closest we have to an expert on the subject so I'll give it a shot. This will be just an introduction to water treatment, with more details in future articles. This is a very important subject and I don't want to leave out information, but I also don't want to write a ten page article that nobody is going to finish reading.
Before getting into specific methods or brands of treatment I need to ask a few questions. All of these will come into play when you start looking at filters and other treatment methods.
How clean do you want/need your water? I have worked in labs that required water so pure it would dissolve copper tubing, and I spent many years discharging treated water into a major river that was dirtier than what I was putting into it. Some uses may not require water as clean as others, I'm pretty sure your dog (who drinks out of the toilet and stray mud puddles) doesn't need water treated to the same standards as you'd use for mixing baby formula. The EPA and WHO have established drinking water quality standards, technical data that I'll try to put into layman's language.
Also, not all raw water needs to be treated. Rain water and melted snow would be safe to drink in all cases, unless you're dealing with chemical or nuclear fallout. I grew up drinking water straight from a (fairly deep) well and have never had any issues with it. You can also develop a resistance or immunity to any local microbes that don't immediately kill you, but changing location will change the definition of “local” and you may run into problems until your body adjusts (Montezuma's Revenge).
What's in the water that you need to remove? Unless you have some idea of what you're trying to remove, you'll be lucky to pick the right method of getting it out of your water. A filter that will remove giardia cysts may not be good enough if you're dealing with chemical contaminates. Even without access to a microbiology/chemistry lab, you can do some research before a crisis to get an idea of what to expect. This is where things get personal, because there are too many possibilities for me to list them all. You'll need to think about where you may be when you need a water treatment system and do the research now.
How much water per day are you treating? The standard is one gallon per person per day for drinking and cooking purposes, but what about cleaning your body and clothes? Does your water system need to be cleaned periodically? For how many people are you prepping? Larger demands are going to require larger systems to clean your water or multiple smaller ones.
How long are you going to be treating your water? It's just common sense that a pocket filter might get you through a weekend in Mexico, but it isn't likely to last for several years' worth of daily use. Be wary of the claims made by manufacturers, unless you've thoroughly checked their system out. The filter that you pick for your BOB may be different than what you'll want to use once you get to your safe location, or you may only need to treat your water until the city gets their plants back online and the pipes flushed. Different needs for different plans.
Are you prepared for when your water purification system fails? Nothing lasts forever, so having a back-up plan is essential. It may be as simple as just drinking untreated water for a short period and dealing with the consequences (that weekend in Mexico), or it may be as complex as making another treatment system, but you need to be thinking of redundancy. A good idea for a fixed location would be to store your treated water and rotate through your stocks. That way, when the filter fails, you'll have a buffer supply to give you time to repair it or get another system online.
Are you aware of the indications for when your purification system fails? Do you have a way to test your system and the materials and skills to run those tests? One of the first filters I bought for hiking and camping came with a bottle of blue dye. The instructions were to add a few drops of the dye to some water and run it through the filter. If the dye passed through the filter it was a sign that it had failed. I'll get into specifics for each type of system as I cover them, but you need to be aware that there are simple ways to test water systems and you need to be able to run those tests.
Are you aware of how important maintenance and hygiene are going to be? Some filters require an occasional backwash to flush them clean while others require boiling or chemical cleaning and others just need to be replaced. Be prepared and learn your system before you need it. Make sure everyone who may need to use it is also trained.
Hygiene is an absolute must-have in any crisis situation. Sharing a water bottle with another person is also sharing their diseases. Unless you're comfortable sharing bodily fluids with someone, get them their own bottle. Keeping your water treatment equipment clean will avoid cross contamination. Think about it: if your hands are filthy, do you really want to touch anything that is going into your mouth? It would be wise to pad the numbers in your answer to number 3, above, to allow for some surplus water for hygiene purposes.
Those questions should give you something to think about, and maybe form a few questions of your own. I'll discuss the different methods of water treatment and some of the various types of equipment in the next few articles. If you have questions you would like to see answered here, feel free to leave comments and I will do what I can to find an answer.
This Christmas, I am working on a very short budget and have friends that don't need anything but deserve much. Four of them have expressed more than polite interest in planning for emergencies of and seem serious about it (by that I mean no 'Zombie Apocalypse' nonsense). I am trying to give them some ideas to use as a starting point; namely, directions to Blue Collar Prepping and some books that I have in my small prepping library.
In no way are these books the only ones in my library, the only books on the market or the best for everyone else; they are simply what I recommend for my friends and their needs.
I am not writing a book review or summary, but rather why I chose these titles.
Les Stroud is the host of Survivorman, the best outdoor adventure show on television (in my opinion). His book Survive! uses the skills and techniques learned from his many personal trips into the wilderness,as well as those seen on his television show. The majority of the book is focused on wilderness survival in any climate, in any part of the world, so this would be a good choice for travelers or people not living in the U.S. or North America.
This book is going to friends that hike and camp now that their kids are older.
Arthur T. Bradley has written a book that seriously addresses common emergencies faced by modern societies: Natural, Pandemic, Man-Made, War/Terrorism/Crime, Personal, etc.
The Disaster Preparedness Handbook addresses these topics in a very thorough way, with chapter summaries, checklists, suggested reading lists and diagrams of items that can be made or built. It is written in an easy-to-read style, without being so simple as to be boring to experienced preppers or too intense for those just starting. While most of the book covers 'bugging in' and urban/suburban plans, there are chapters on planning for 'bugging out' as well.
This book is going to friends that have several family members living close by.
Aton Edwards has collected a massive amount of information on survival techniques and sources of information! From emergency heating to improvised hydroponics, this book could be a one-stop shop for the novice to those already well on the way to self-sufficiency. Preparedness Now! has topics ranging from biological hazards, fire, and personal safety, to the more common subjects of food and water storage or bug-out plans. Included in the back of the book are several pages of notes, blank planner pages, an amazing bibliography and a very detailed set of checklists, sourced and linked back to the chapters where the items were first mentioned.
This book is a gift for one of my OCD friends that makes lists for everything.
I hope this has given you food for thought and ideas for last minute gifts for the Holiday season!
Fire is a valuable thing, but sometimes, traditional fires just are not possible. Today, we'll take a look at a couple non-traditional alternatives. Both of them burn non-standard fuel, and are based on the principle of a candle, basically using a natural-fiber wick to carry fuel to the flame. Both can run almost* any liquid fuel that is thin enough to be carried by the wick.
*Warning: Do not use gasoline. It burns too hot and fast and can cause injuries.
Calling this a stove is a bit inaccurate; while it can be used to heat things, there are far too many variables to use it to cook reliably . It does, however, make a dandy reusable candle, and provides a fair bit of heat for its size.
To make a hobo stove, you need a tuna fish can (or similar; any can that is short and wide should do nicely.) and its lid. You'll also need some kind of wick material made of natural fiber. Jute twine, cotton cord, thin strips of cloth; all work well.
Completely remove the lid and rinse the can.
Make a hole or holes in the lid, just large enough to fit your wicks. More wicks mean more flame, but also dramatically increase fuel consumption. You can use a power drill and a small bit for this, but a hammer and nail also works wonderfully.
Bend the sides of the lid down slightly, just enough to give you room for fuel underneath it. 1/4" is plenty.
Pull your wicks through the holes. Leave 3/4" or so on the top side of the lid. Trim the wicks so there are a couple inches below the lid as well.
Insert the lid in the can and add fuel.
Any number of light, flammable liquids will work. Light oils (olive, peanut, etc.) and high-proof alcohols burn quite nicely. The fuel you use will determine how hot and fast your candle burns. Allow the wicks time to soak up fuel before you light them.
We used these when I was in Boy Scouts. All that you need to make them is a roll of toilet paper, two #10 coffee cans, and fuel.
Stand the toilet paper roll on end in the bottom of the coffee can.
When the toilet paper has had a chance to soak up fuel, simply light the top of the roll. It will burn with a flame as tall and hot as a good campfire, so don't light it anyplace you wouldn't light a normal fire.
Putting this fire out is where the second coffee can comes in. Stack the second can on top of the fire, and it will quickly starve for air and put itself out. After the cans have cooled, you can put a lid on top of your fire can, leaving it assembled and ready for use again.
Both of these fire sources work great when there is very little wood, or when it's wet or snowy. There's no need to be cold and dark out there!
We've discussed the planning stages of building the Oven.
We've discussed building the Firebox of the Oven.
We've discussed building the Cob Dome of the Oven.
In today's article, I'm going to briefly go over a few things that we learned along the way while building the oven, and where we'll go from here when we have the time and resources to start planning and building the Mark II Oven.
Frankly, this is something that all preppers should take note of, regardless of what they're trying to be prepared for. There is a huge gulf of difference between Theoretical Knowledge and Practical Knowledge.
Nothing shows this quite as thoroughly as taking a group of people who have practical knowledge in a diverse set of areas, but only theoretical knowledge in the area you need, and asking them to collectively tackle a practical project.
I joke that my main "talent" actually lies in the area of being able to surround myself with extremely talented and knowledgeable people. This project proved to me that I wasn't joking.
One of the first things that I realized was that we should have spent a bit more time considering our placement. While we built the oven in a location that's very convenient to the industrial kitchen on-site, the location we chose is such that the person (or people) manning the oven are fairly removed from the majority of activity taking place out at Knight's Rest Retreat. This has both advantages and its disadvantages.
One advantage is that the cooks manning the oven don't have the opportunity to get distracted by other things going on at Knight's Rest. The disadvantage is that the cooks can easily get bored, and therefore become unwilling to man the oven.
Another issue that I realized could be a problem with our oven is its location in relation to the resources needed to build it. We were fortunate that we had a functional backhoe to use for bringing clay from our clay bank to our location, and our water source was a spigot with a convenient hose to drag closer to where we were building.
Remember that your resources will have to be hauled to your chosen location, so pick a spot where you're not going to wear yourself out before you ever actually start building. The less hauling of resources you have to do, the less energy you're expending. Less energy used = less need to rest and refuel later.
Just how flat is the piece of dirt where you're planning to construct your oven? Have you got a nice, level spot that just happens to have a concrete pad already in place?
If you have a concrete pad available to work on, use it! If you don't, then either build directly on the ground, or make sure you build a platform that is going to be both stable and level, without the possibility of it sinking or caving in.
We've run into difficulties with the long-term viability of the Mark I simply because the earth platform we built for its placement has shifted quite a bit, and some areas have compacted much more than others. There have been a few minor earthquakes (something we never used to experience in Oklahoma!) that have caused portions of the packed earth platform to no longer be completely level.
If you're building directly on the ground, bedrock would be a great choice. At the very least, look for an area that's not going to be making its way out from under what you're building, and make certain it's well packed and solid.
Temperature control has been something of an issue. We still haven't gotten it completely right yet, but we're working on that!
Have a thermometer handy that can withstand the anticipated temperatures inside your oven, and use it as you do your progressive firings to cure out the cob dome. This will give you a much more accurate idea of what size fire you're going to need to achieve specific temperatures.
Having a good in-oven or in-grill thermometer handy during cooking uses will also help you maintain your fire, and know exactly what temperatures your oven space is reaching during the cooking process for specific dishes.
Adjusting recipes is much easier when you actually know what internal temperature your oven happens to achieve.
Eventually - probably in late spring - we will get started on the Mark II Oven build. This will address problems that have arisen with the Mark I either during construction, or since it was finished.
We've chosen a spot not far from where our current Mark I Oven happens to reside, but situated closer to where our Main Hall is being built. This will put its placement more centrally located, which should help keep the boredom factor down.
The change in location will also cut down on the amount of foot work to go between the oven and the Feasting Hall while carrying hot food straight out of the oven, like fresh bread.
We will be taking the time to do a few things to the location chosen for the Mark II prior to starting on the actual building. First, we'll be leveling and grading the area. Once it's leveled and graded, we'll be pouring a single concrete slab of the proper size to accommodate our Mark II, and allowing the poured concrete to cure for several days.
Another major difference between the Mark I and the Mark II will be use the exclusive use of refractory cement, rated for extremely high temperatures, as mortaring for our firebox. We used regular cement mortar on the firebox in the Mark I, and it was a mistake; we've had a lot of cracking and expansion due to the high temperatures in the firebox, and it has caused issues with the stability of the entire structure.
We will also likely have a much longer cure time in firing the cob dome on the Mark II, because we feel like it got slightly rushed for the Mark I.
All in all, it's been both educational and fun, and I'm looking forward to working on the Mark II and other ongoing projects out at Knight's Rest Retreat.
Erin Palette talks about prepping for pet owners.
Nicki Kenyon explores foreign aid to Israel.
Special Guest Ben Berry from The Triangle Tactical Podcast tells us why we should all be shooting competition.
Barron B. tells us about future developments in more secure credit cards.
Weer'd rounds out his "Gun Death" series with the very serious subject of suicide.
Don't miss the show. Download, listen, and subscribe. And make sure to tell your friends!
In Part 1, I talked about what's in the sleeping bag compartment of my bug-out bag. For today's post I'm going to talk about what I have on the outside.
You can see the Klymit Static V air pad, mentioned in last week's post, on the left of the sleeping bag compartment and the Adventure Medical Thermolite Bivvy on the right. Just above the Klymit is a Cold Steel Kukri Machete which I use as a universal chopping & hacking tool (and for $20, one of the best blades I've ever owned -- HIGHLY recommended). In the center is a UVPaqLite UVO Necklace, which I have tied around a fastener on the back so I can easily find my pack in the dark. If necessary, I can remove it to mark something else, like a campsite or a family member.
I've also added some compression straps to keep everything tight so that the center of gravity is closer to my spine.
a Condor MOLLE pouch, filled with things I might need to access quickly without taking off my pack.
Two S-biners (in blue) that secure the "lifting straps", for want of a better term -- basically straps that attach to the top of the frame so that it's easier to stand up with the pack by pulling on them in my hands -- to the plastic D-rings on the shoulder straps. That way, I don't have to go fishing for the straps when I want to stand up, and extra carabiners are always useful.
1) a Hot Shot signal mirror with whistle.
2) a Coughlan's compass with light-up face. It's a fairly cheap compass, but I have a nicer one inside the bag, and this one self-illuminates.
3) two rolls of camper's toilet tissue, for use in the traditional manner, or as kleenex in case I need to blow my nose (and given my allergies, I need to do that a lot.) The third roll, along with the dispenser, is inside my Get Home Bag.
1) a multi-tool from Duluth Trading Company in a cordura pouch the same color and texture as the Condor fabric.
2) a tube of Blistex medicated lip balm/sunscreen.
3) a Sawyer Mini Water Filter (thanks for the Thankmas Present, John Kochan!) with 16-ounce collapsible drinking pouch. Since the filter and the straw are large, I have them outside the pocket and are held in place by the cords that tighten up the gadget pouch.
Left: Attached to a carabiner is a "Bug Out Band": a nifty USB drive integrated into a rubberized slap bracelet that came in the October Apocabox. I use it to store important documents (see my "Scan Your Stuff" post ) and being attached to my pack makes it easy for me to take it off when info needs to be updated.
The sheath of the Kukri machete is held in place by two Nite Ize Figure 9 carabiners hooked over a strap, with the 'biner part running through the sheath's belt loop.
Right: The other side, just for completeness' sake. The odd bits of green are lengths of electrical tape, used to tie down lengths of errant strap.
Next week: What's in the pockets?
To recap the idea behind the Rock Ridge series, not everyone is going to be able to go back to living off of the land after a major catastrophe. There will be those who are not suited to raising their own food, but will have other skills that they can use to make a living. I am using the fictional town of Rock Ridge (ca. 1870) as an example of the skills and services that may be in demand after TSHTF. It doesn't have to be “Mad Max in Thunderdome”; people lived comfortably in small towns and villages for centuries before the invention of electric lighting and automobiles.
First things first: any time you see the word “mill”, you're looking at a facility that takes in a raw material and produces a marketable product, with windmills being the sole exception that proves the rule. Wood (or saw) mills take in logs and put out lumber; cotton mills take raw cotton and turn it into thread; a grain mill will take grain and turn it into flour or meal suitable for use as a cooking ingredient.
If you have a reliable source of energy and grain, you might be able to make a living with a grain mill. Grain mills are simply large versions of the basic stone utensils that have been used to make flour out of grain for as long as humans have been growing grain.
The most basic grain mill is a bowl-shaped stone (called a “mortar”) and a smaller rounded stone that fits inside the bowl (known as a “pestle”). Grain is placed in the mortar and the pestle is either rolled over it with downward pressure or pounded down on the grain to break it up into tiny pieces. Roughly ground grain is called meal, and finely ground grain is called flour.
Hand mills have evolved into steel and plastic kitchen appliances that vary in quality and price. The general rule that “you get what you pay for” holds true for hand mills, so get the best that you can afford. Unless you have a bullet-proof source of electricity, avoid motorized mills that don't also have a manual method of operation.
Grinders like this have been used for decades to mix and grind meats, but if you get the right plates for it you can grind grain. Avoid the cheap ones since they are generally of very poor fit and finish.
While a single person can grind enough grain into flour to keep their family in bread, it is time consuming and not a very efficient use of time. A centralized grain mill will tap into a local source of power and provide the service of producing flour (or meal) for its customers in return for a percentage of the grain. The miller's percentage would be sold or traded to people who didn't grow grain, and provided a source of income for the miller.
A small commercial mill, like those found in villages, was usually made of two discs of stone (often pieces of stone held inside a metal ring). They were placed face to face and the grain was introduced through the center hole of the top stone. The grain was turned into flour as it worked its way out toward the the rim.
A moderately-sized mill, suitable for a small town, would consist of two round stones, one placed flat and the other on edge riding on the top of it. Grain would be added to the top of the base stone as the wheel stone rolls around on top of it and the grain ground between the two.
Power sources for this size of mill would be a water wheel set on a stream or a wind mill with large sails. High torque, low speed power that can be harnessed with the use of mainly wooden gears and shafts is a good fit for this kind of mill.
A large mill, producing flour for a large bakery or a large town, would likely consist of a series of smaller mills in series, with them set to grind the grain into progressively smaller pieces. Larger mills are/were powered by steam engines, electric motors, or some form of internal combustion engine.
Stone grinding wears down the grinders slowly, leaving sand or grit in the flour. This is not normally hazardous to the health of the consumers, but it can lead to increased wear on their teeth. Steel rollers last a lot longer and are easier to replace with modern infrastructure.
Since steel wears slower than stone, it is easier to set and maintain the desired degree of grind you want.
Steel is less porous than stone, so it is easier to keep clean and prevent contamination of new flour from spoiled remnants of previous grindings.
Steel rollers can be run at higher speeds than stone mills, increasing the output for a given size of mill.
Steel rollers generally weigh less than stone ones, so starting and stopping the machinery is easier.
They can be made of locally available materials.
Stone rollers are not as likely to create sparks as metal ones. Dust explosions are a major hazard of any grain handling operation, so sparks are to be avoided as much as possible .
The weight of stone rollers provides enough pressure without requiring tensioners.
Running at a slower speed allows for the use of simpler bearings and shafts, often made of wood instead of metal. Lower speeds also mean less heat, which can damage the grain or contribute to dust explosions.
The mass of stone rollers provides inertia to the operation which will smooth out minor variations in the power source. This is helpful when using wind or some other form of variable power.
Setting up a grain mill is a time-consuming process that will require a source of power, a good supply of materials, a source of grain, storage for grain and flour, and a customer base. Operating it will require a low level of daily supervision, a moderate amount of maintenance, and plenty of customer interaction.
A good miller will work with his customers as much as his machinery, and his reputation can make or break his business. Bookkeeping and an accurate set of scales will help keep both the customers and the miller honest, so plan for them as well.
The holiday season can be a fun time of year to gather with friends and family to share happy times and events, but it can also be a time of stress. Not having enough food on your table, let alone enough money to pay the bills, is an extra stressor that many people have this time of year. While I do not have that problem, many in our communities do, and there is a way that anyone can help: Donate to your local Food Bank!
So by sorting my stored goods with the oldest marked items going out first, I can keep an eye on what is not being used quickly, and then donate the excess to the Food Bank if needed. Not only can I help those less fortunate than myself, I also keep fresh items in my reserve!
These were all dated 'Best By' the middle or late 2015, but it is the perfect time to move some of these out, as I am not using them very quickly all by myself.
Even if you don't have food that is expiring soon or you have long duration stores, this is a good time to consider buying an extra can or two and dropping them into the donation barrels most supermarkets have on display. You will be helping others and also helping yourself.
28% of food distributed is for children under 18. 8% are under the age of 5.
Approximately 18% is for people over 65.
The average family income of recipients is $15,000 per year.
Matches are the gold standard of fire starting: they're cheap, readily available, and reliable, and things that are designed to be lit are usually designed to be lit with matches.
Waterproof cases are the most basic starting point of protecting your matches. A waterproof case will keep your matches together and protected from water and damage, and most of them have a rough surface for striking your match.
If you're equipped to safely melt paraffin wax, it makes a dandy waterproof coating on any number of things, including matches. Simply melt the wax and dip your match heads into it, then let the wax cool and harden. When you're ready to use them, simply scrape the wax off with your fingernail, and strike as normal.
Melting wax has its hazards, though; and is not something to be undertaken lightly: hot wax can burn skin, and can also cause a very serious fire. Don't try it if you're unprepared and don't have the proper gear.
Turpentine is a wonderful, very safe method of waterproofing matches, but it must be renewed about once a year. Simply pour an inch or so of turpentine into the bottom of a small glass (one you don't care for, since you won't want to drink from it after), and stand several matches head-down in the turpentine for five minutes. Then, lay them out on a paper towel or piece of newspaper to dry for about half an hour. Your matches are then ready to go; just strike them as you otherwise would.
Probably my favorite method of waterproofing matches (and sealing various other things) is clear nail polish. It doesn't necessarily have to be clear, but Grandma used clear nail polish for all manner of things, and who am I to argue with Grandma?
Simply open your bottle of nail polish, and dip your match heads into the nail polish. Wipe any excess against the bottle rim, and let your matches dry, with the head not touching anything. As with turpentine, they'll strike as-is. However, nail polish dries hard and durable, and will provide a little extra protection for your matches.
Sealed Pouches: This page has a wonderful guide to sealing your matches in simple waterproof packets. Other things like tinder can also be sealed in this manner, and be safe and ready when you need to crack them open and use them.
Last week, I talked about the work I and others did to make the Firebox portion of our Earth Oven out at Knight's Rest Retreat. Today, I'm going to further expound on that in the visual, and show you what it was like building the baking dome portion, which is the actual cooking area of the oven.
2 Muffins go in, but only 1 Scone emerges victorious!
Anyway, now that I've gotten the cheese outta my system (well, mostly anyway - there are a couple of quiches still awaiting trial runs in the oven to do some more timing/temp tests!), on to the meat (roasted) of this article.
In order to get our dome built on top of the firebox, the first thing we had to do was figure out how to get the actual dome shape built. We set the brick work for our chimney while we were making the final decision, and let our bricklayer do his magic while the rest of us debated about method.
We decided it would be easiest to build up layers of our cob over a positive mold of shaped dirt, which could then be dug out once the cob was dry and solidly stable.
Once we'd decided how we wanted to proceed, we built a simple wooden form in the shape and size of our intended door and set it in place. Then we started building our dome mold at that point, packing the dirt in well and making certain it was absolutely level where we were going to be putting the brick arch support of our entry door.
Once we had our door frame mold in place to use as a guide, our bricklayer went to work again, setting our brick archway in place. This was a much shorter process than laying the bricks for the firebox, but was still labor intensive enough that I was glad I wasn't the one having to do the actual work.
After he'd placed all the bricks into the archway except our keystone (the one at the very top of the arch), things started getting mortared into place. The keystone went in last, and then the mortar was allowed to set while we all took a short break.
After the break, we moved on to rearranging the excess dirt so that our dome mold would be uniform in height and properly align with the door. It was a few hours of work, which included turning the top layers into a thick muddy slurry so that it could be properly smoothed out.
When we finally got everything smoothed and evened out, it was obvious this oven was going to be even larger than we'd originally anticipated. The height of the dome had been lowered, but the overall surface area to cook in was going to be much larger than was first planned.
We needed a means of keeping the cob mix from sticking to the positive mold while the dome was being formed. Our solution was simple: newspapers that were going to be recycled anyway were pulled out and put to use.
A double layer of newspaper was placed over the entire dome (except for the doorway arch), and then a thin layer of straight mud was put in place as the bottom layer of what would become the interior of the dome.
The kids, of course, were more than eager to "help play in the mud"
A helper (right) and I (left) applying the initial mud coat.
Once that was finished, it was time to start mixing our cob to form the dome. Cob has traditionally been a mix of clay, sand, and straw.
Think of it as a sort of rudimentary cross between the basic material for bricks, and a primitive cement, all rolled into one.
Yep, you guessed it. Trevor's kids wanted a chance to play in the mud for that part too! Thankfully it was still pretty warm outside in late September and early October here in Oklahoma, so hosing them off at the end of each day wasn't an issue!
at least we weren't bad enough to need actual hosing down before going in the house to clean up!
Yes, building the dome of the mold took longer than expected, and it was well past twilight by the time we'd finished putting the layer of straight mud over our newspaper barrier and adding the first layer of cob.
Then we needed to allow some time for that layer of cob to set before we added another, but that would require working in the dark.
We called a break for the evening to allow things to start drying, and met again a couple of days later to start slathering on further layers of cob.
As I mentioned a moment ago, traditionally cob is formulated from a mix of clay, sand, and straw. We used a ratio of 70% clay from the high quality clay banks on the property (there are advantages to having a stream running through the middle of your acreage!), 20% sand from the one of the sand banks of the same stream, and 10% high quality grout mix that we happened to have on hand.
We mixed up our mud - that clay/sand/grout mix - in a small bucket until it was the consistency we desired. We originally intended to mix our mud completely by hand, but that proved to be far too labor intensive when we considered Cordless Power Drills and Drywall Mixers!
Once our mud was mixed by one of the guys, he would bring it over to our big mixing bucket - a repurposed and somewhat banged up small feeding trough. The mud would be dumped from its small mix bucket into our larger mix bucket, and we would then add a 50% straw content to add support and help hold the structure of the cob over the long term. This portion was done completely by hand, as we didn't want the straw tangling itself around the mixer bit - and we only had one mixer bit available for use.
This also proved advantages in other ways. Since our Mud Guy could only mix up so much on his end at any one time, we had the lag between mud deliveries to mix in straw, and place the now ready cob onto whichever portion of the dome we were currently concentrating on for that layer.
After getting the initial 2 layers of cob in place, the thought crossed several minds simultaneously that adding some extra internal support structure might be a Good Thing over the long term. To this end, we decided to place a single layer of chicken wire between the cob already in place and what would be going in on top of this.
At this point, we had our positive mold in place, our door arch built, a thin layer of mud without cob mix, 1 thin layer and 2 thick layers of cob, then a layer of chicken wire, and 2 more thick layers of cob over the wire support structure.
And it was back to work placing thick layers of cob mixture over the entire dome.
At this point it was decided to pay a bit of extra attention to the area where the dome was being built up around the base of the chimney. We wanted to make certain we had a good seal between the cob and the brick, so that we wouldn't have to cope with excessive heat loss or unexpected drafts of air through the cooking chamber.
As a group, we spent 6 days of laying in a couple of layers of cob each day, and allowing for a day or two of drying time between sessions. We wanted to give each successive set of layers time to dry somewhat, independently of the whole, so that we could locate and repair cracks without them becoming deep fissures that ran through the whole thickness of our dome structure.
Our final day on the project to build the dome itself, there were only 3 of us out there getting muddy - Jen (the owner of Knight's Rest) myself, and my buddy Vanessa. It's mid-October, and you can see from the photos that it was still warm enough for shorts and t-shirts!
Laying the final layer of cob turned out to be the most time consuming of all the cob layers. We wanted to make certain it was smooth, uniform, and was visually appealing. A lot of smoothing, both by hand and with small bricklayer's hand tools later, and we finally had things looking the way we wanted them to!
Our oven build was complete... almost. We still needed to give it a week to dry out completely. Then we had to dig out the dirt used to form the positive mold for the dome. And build several fires, each one successively hotter and more intense than the last, in the cooking chamber itself to cure out the cob completely and to burn off the remains of the newspaper we used to keep the mold and dome separate.
We're still doing test runs in the Oven, to see how large a fire we need for various temperatures, and how we need to adjust recipes for timing so we don't end up with burnt or undercooked foods. While under-cooking can be salvaged easily enough by simply putting our cooking vessel back into the Dome for a bit longer, burnt bottoms aren't so easily fixed.
Next week, I'll discuss some of the difficulties, tips, and tricks that we learned during this build, our plans for the Oven Mark II, and extra considerations to be taken into account for different areas. Bon appetit! | 2019-04-22T14:47:37Z | http://bluecollarprepping.blogspot.com/2014/12/ |
One of SoMAS’ paramount objectives is to educate and train students to become the next generation of marine and atmospheric scientists, environmental resource managers, and citizens who possess a fundamental grasp of environmental issues and the choices that society faces in handling these issues.
The first undergraduate degree offered through SoMAS was a minor in marine sciences established in 1988. In 1992, an Oceanography and Environmental Studies track was established in the Multidisciplinary Studies undergraduate degree program. Also in that year, the Marine Sciences Research Center (MSRC) offered its first undergraduate major, as the University’s Institute for Terrestrial and Planetary Atmospheres (ITPA) was transferred to MSRC, bringing with it the Atmospheric Sciences/Meteorology BS degree program. Over time, other undergraduate degree programs followed: a BA in Environmental Studies (2001) and a BS in Marine Biology and a BS in Marine Vertebrate Biology (both in 2005). The Environmental Studies major is designed for students anticipating a non-science career but one with a strong environmental bent, e.g., environmental journalism. The Marine Biology and Marine Vertebrate Biology degrees prepare students for a career in the sciences or environmental management. From May 1992 through December 2008, 174 students have graduated from SoMAS with an undergraduate degree.
MSRC’s first graduate degree program, the Marine Environmental Studies Program (MESP), was authorized in April 1970 and produced its first graduate in May 1971. The MESP program was a Masters of Science program designed for practicing professionals and recent college graduates with varied academic backgrounds. Its curriculum offered a strongly interdisciplinary examination of the diverse factors affecting the marine environment and was designed to prepare students for careers in the then-rapidly expanding fields of coastal management, environmental monitoring and protection and resource management. During the 1975-76 academic year, MSRC conducted an internal review of the MESP program. As a result of this review, the program name was changed to “Marine Environmental Sciences Program” and the program’s focus was shifted more towards hard science, with somewhat less emphasis being given to management and specific environmental problem-solving.
In April 1978, the Board of Trustees of the New York State Education Department approved MSRC’s Ph.D. program in coastal oceanography. The following September, the program was approved by New York Governor Hugh Carey. The Ph.D. program graduated its first two students in December, 1981.
In 2007, as MSRC was renamed the School of Marine and Atmospheric Sciences, our graduate programs were re-titled to more properly reflect the unified educational experience within the school that is offered to both marine and atmospheric science students. At present, SoMAS offers both MS and Ph.D. degrees in Marine and Atmospheric Sciences, with concentrations in either the marine or atmospheric sciences.
Since 1971, SoMAS graduate programs have produced 697 graduates; 574 received a MS degree, 184 received a Ph.D. and 61 received both degrees. The alumni profiles below highlight a few of our graduates.
Mark Nepf was an MS student in the Dvarskas Lab of Environmental Economics from 2015 to 2017. During his time at SoMAS, he worked on a hedonic analysis of Suffolk County residential real estate, with a focus on the potential impact of coastal water clarity. By determining if improved water clarity could positively influence housing values, his project aimed to provide an economic measure of the benefits of coastal remediation.
After graduation, Mark accepted a position with Resources For The Future, where he is working on similar environmental valuation studies that look at the impacts of air pollution. He credits his time spent at SoMAS helping him land on the job path he hoped for.
Photo above: Erica Cirino ’15 on a research expedition.
Writer, artist, runner and licensed wildlife rehabilitator — this is how Erica Cirino ’15 identities herself. Perhaps survivor should be added to the description.
Her childhood memories are dominated by discord. Voices escalate in anger and accusations; a door slams, followed by the sound of a woman sobbing. A car starts up in the driveway; a man is bound for who knows where. When the little girl wakes up in the middle of the night, she sees her father on the couch. Again.
The days that follow bring more of the same — ongoing family drama that no child could be capable of stopping or escaping.
This is how Erica remembers parts of her childhood — a painful chapter that will stay with her always but was instrumental in making her the strong woman and successful wildlife journalist that she is today.
While her parents didn’t get along with each other, they did each stand by her side as she grew up. While at times her life wasn’t easy, Erica is grateful for her parents, who offered her their support and resources, cheering her on at track meets, buying her art supplies and encouraging her to pursue her natural talents.
But Erica also dug deep into her personal well and at a very young age found a way to cope with domestic upheaval. She chanced upon an inviting world, just walking distance from where she lived. This haven, Caumsett State Historic Park Preserve in Lloyd Neck, New York, was inhabited by chattering squirrels and nervous rabbits, scolding blue jays and drumming woodpeckers. With a notebook and sketch pad in hand, Erica recorded the wonders of the natural world.
Caumsett was where she could retreat into an alternative reality. As Erica got older, she found the preserve offered her a new kind of escape — running. At first she pursued it to put distance between herself and her pain. Eventually it became a need that she satisfied by becoming a competitive runner in high school.
Cold Spring Harbor High School required seniors to perform 20 hours of community service. Serendipitously, Caumsett had a wildlife hospital, so Erica volunteered there. She found the experience both uplifting and transformative: In the process of rehabilitating sick and injured wildlife, Erica learned how to heal her own emotional wounds.
She worked with opossums, turtles and other small mammals, but especially enjoyed caring for injured hawks and owls. Learning about the creatures’ life histories was soothing, she says, and she came to view them as new family members who depended upon her for their survival and would never abandon her.
Although Erica found the work rewarding, it was not without its challenges.
“It was a dirty job, one in which I was on my feet all day, got kicked and scratched, and was exposed to the elements,” she says. “But it taught me how to deal with loss and death, and perhaps it braced me for the loss of my father from my life,” she says.
Erica says working with wildlife filled a hole in her soul, and she became a licensed wildlife rehabilitator at age 16.
By this time, running had also taken on a greater significance in her life, becoming far more than a coping mechanism. As Erica’s reputation as an athlete grew, 30 colleges lined up to offer her track and cross-country scholarships. She pondered her options, but in the end her love for healing wounded animals won out.
Erica decided to live at home, continue to rehabilitate animals and apply to Stony Brook Southampton, where she could study marine vertebrate biology and further her career in wildlife sciences. Erica was accepted but shortly thereafter, as a result of New York State budget cuts, Stony Brook Southampton relocated its undergraduate programs and students to its main campus where she received her BA in Environmental Studies.
The change in venue did not deter Erica, who immersed herself in her studies. She had loved science and writing and now she looked to combine her thirst for scientific knowledge with her creative nature and become a science writer.
East Setauket, NY; Safina Center: Carl Safina talks with Stony Brook University alumni and freelance science writer and artist Erica Cirino.
It was in Professor Heidi Hutner’s Environmental Writing and Media class in 2012 that Erica met the person who would most influence her academic and professional career, Carl Safina. Safina, a renowned conservationist, author and founding president of the non-profit organization, The Safina Center, was guest lecturing about the human connection to nature.
Little did Erica know at the time that this encounter was the beginning of arguably her strongest and most formative professional relationship —one that would allow her to flex her literary muscles and truly discover both the scientist and the writer within.
Erica thrived at Stony Brook and enjoyed a college career that most students would envy, going on to make dean’s list every semester and winning seven awards. In 2014 alone, she landed three awards — the Sustainability Studies Program Director’s Award for Academic Excellence, the School of Marine and Atmospheric Sciences’ Undergraduate Honors Award, and was named the Stony Brook University Undergraduate College of Leadership and Service Creative Expressions Contest Winner.
Another plus, she says, is that the program required that she would only have to spend a year and a half in the classroom. After some consideration, Erica decided she wanted to become a freelance science writer.
Erica felt confident she could embark on this new course of study, as her competitive running background imbued in her strong time-management skills, self-motivation and drive.
“I can do this,” she remembers thinking.
Through her studies, she honed her photography skills but sought to become a better writer. Her final master’s project, which required her to find and cover a big story, gave her that opportunity.
For her project, Erica highlighted the 2014-2015 avian influenza epidemic. She traveled to Wisconsin, one of the Midwestern states where the poultry industry was adversely affected.
As her full-time freelance writing career took off in 2016, Erica began writing for a greater number of publications, including National Geographic’s Voices blog. She focused heavily on ocean issues, in February 2016 and wrote a piece titled, “More Plastic, Fewer Oysters?” This led to a whole National Geographic blog series on ocean plastics. The blogs included interviews with some of the foremost experts on plastic pollution.
In October 2016, professional artist and photographer Chris Jordan, famous for his shocking photographs of dead albatross filled with ocean plastic, mentioned Erica’s work to a Danish organization working to quell plastic pollution. Jordan was invited on a trip across the Eastern Pacific Ocean and the organization, called Plastic Change, was looking for an American journalist.
Jordan, who knew of Erica through the Safina Center — where he was a Fellow and Erica was a freelance writer — recommended the group bring her on the voyage. Last spring Erica attended one of Jordan’s art shows in New York City and introduced herself. The two talked for hours about art and potential future collaborations.
In November, Erica and Jordan embarked on the 54-foot S/Y Christianshavn with members of Plastic Change in an effort to generate publicity about the group’s fact-finding expedition.
The vessel used trawling nets to determine the quantity, type and current state of plastic pollution on the Pacific Ocean Gyre, a swirling ocean current sometimes referred to as the Great Pacific Garbage Patch.
Aboard the ship, Erica focused on still photography and writing, and Jordan concentrated on filming plastic and the crew at work. Climbing into a patched-up old inflatable dinghy that was launched from the main vessel, Erica and Jordan were set adrift for a half-hour or so. They were entrusted with a waterproof camera bag containing thousands of dollars’ worth of equipment and dealt with setbacks — such as a slow leak that sprayed water everywhere, drenching them.
Erica did more than sharpen her journalism skills on the ocean voyage, however.
Hytting, or “Ras” as Erica now refers to him, is a Danish carpenter and boat builder with more than three decades of sailing experience. While Hytting was considered to be a stern taskmaster and judge of his crewmembers’ sailing techniques, Erica’s quickness to learn garnered his respect, laying the foundation for a friendship they shared during the six weeks they spent together.
Erica adds that even when the ship experienced an engine malfunction and a snapped rudder en route to Hawaii, she never felt that she was in danger because she trusted the crew completely.
Even before this ocean assignment, Erica’s writing has appeared in prestigious publications such as The Atlantic and Scientific American. A sampling of her stories in those publications follows.
Her work has not gone unnoticed. None other than environmentalist humanitarian movie star Leonardo DeCaprio shared her Scientific American plastics story on his Facebook page; that led to a huge spike in readers and visitors to her own web site. Erica is eagerly bringing her message to the community, which has led to a speaking tour.
Although Erica is largely responsible for who she has become, she recognizes that every aspiring trailblazer needs assistance from an established professional, and Erica is grateful for the connections and opportunities Safina gave her.
Mentorships are relationships after all, and the mentee must also recognize their value.
In the Fall of 2015, Emily Markowitz was a senior graduating with a major Marine Sciences with minors in Coastal Environmental Science, Geospatial Science and Theatre. She was accepted into the Accelerated BS/MS degree program with Dr. Janet Nye in her Fisheries Ecology Lab. Emily is very excited to start doing real, meaningful research and contribute to the scientific community.
Emily had a variety of experiences during her time at Stony Brook. She received the Stony Brook Mote Marine Lab Scholarship during the summer of 2015 and spent 10 weeks doing research in a snook release project at the Laboratory’s Aquaculture Park in Sarasota, Florida. She served as the president of the Stony Brook Undergraduate Marine Science Club for two years, and lead the group on activities that included trawling and whale watching trips out of Southampton, seal walks, and volunteering with various organizations such as Coastal Steward and Cornell Cooperative Extension’s Marine Meadow Restoration Program. These organizations have also been included at events like Earthstock. The club also participated in the Pew Charitable Trusts’ Bluefin Tuna Initiative and won a trip to meet with Pew and the head of NOAA fisheries, Sam Raunch, to talk about the Pew initiative. The club continues to provide our community with talks and public screenings of documentaries. For many of the students in the club, these events are their introduction to research and conservation issues in Marine Science. In 2014, Emily also headed a major outreach program in which Marine Science Club members gave presentations (with valuable assistance from Dr. Larry Swanson) to two local middle schools about marine pollution and how it affects Long Island’s local biodiversity.
Emily’s experiences as a crew member on the R/V Seawolf, including trips to assist the New Jersey DEP in doing trawls and collecting data for their quarterly stock assessment program allowed her to see, first-hand, the distribution and density of our coastal waters and how a program like this works.
Emily’s undergraduate research experiences have allowed her in a number of labs on campus, including those of Drs. Janet Nye, Brad Peterson, and Joe Warren. While each lab pursued different questions and had different approaches and specialties, each experience provided her with greater insight into laboratory structure and methodology. While studying abroad in New Zealand, she also worked for Dr. Steven Wing in his lab. Wing is exploring isotope markers in fish populations.
Everything that Emily learned at Stony Brook and all of the extracurricular activities she participated in made her a better candidate for the BS/MS accelerated program and better prepared to write her thesis and, she hopes, “to pursue my Ph.D”.
Everyone talks about the weather, but Michael Colbert has more than a casual interest in that topic — he studied it at Stony Brook University. To be sure, the atmospheric and oceanic sciences major can’t remember a time when he wasn’t passionate about the weather. “My mother says that as a baby, there were times when I wouldn’t fall asleep unless she took me outside to look up at the sky first,” Michael said.
Michael said that growing up in a waterfront home on the Neguntatogue Creek in Lindenhurst, New York — which gave him a front-row seat to view nature’s full force — influenced his decision to pursue atmospheric and oceanic sciences.
The Internet has made it easy for Michael to watch the weather unfold minute by minute on satellite and radar. As early as his freshman year in high school, he paid special attention to weather trends, which led to him posting forecasts on Facebook.
When Michael arrived at Stony Brook, he created SBUWeather, a Facebook page managed by the Meteorology Club, which provides forecasts to more than 700 students, staff and faculty on campus and to surrounding communities. Posting through social media helped provide more exposure for the Stony Brook Meteorology Club which enabled it to grow its current membership to 40 weather buffs. After he was elected president, he and his expanded club created a Web page on which they post forecasts.
Under Michael’s leadership, the club made its debut at the Involvement Fair, wearing T-shirts the members created. Feeding on a growing interest in the club, Michael began organizing field trips to regional conferences; the National Weather Service in Upton, New York; and local news stations to observe live forecasts. In 2013 “we visited ABC in New York City, and” in fall 2014 “we took a trip to News 12,” he said. To further increase its exposure, Michael initiated the club’s participation in Earthstock the past two years. The club competed in the 2014 Roth Regatta with a boat named “Hurricane Force.” Regatta.
In 2014 Michael served an internship at the Upton National Weather Service facility, where he collected data using instruments called radiosondes, which are battery-powered devices carried into the atmosphere that transmit findings by radio to a ground receiver. He is also the proud recipient of the Timothy Magnussen Memorial Scholarship for undergraduate students majoring in atmospheric sciences. During the summer of 2014, he conducted research at Colorado State University, exploring the volume of hail in thunderstorms and associated lightning flash rates. These findings were presented at the American Meteorological Society annual meeting in Phoenix, AZ, in January 2015.
Michael helped coordinate a joint effort with the School of Journalism to provide broadcast experience to atmospheric and oceanic science majors.
“Even though the National Weather Service is my first choice to start my career path, every time I’m in a newsroom I get an overwhelming feeling of excitement, so I hope I get that opportunity to do that at some point in my life,” he said. Michael started his graduate studies at Penn State in the fall of 2015.
“The weather is something that affects everyone every day. It never stops changing, so I can never stop watching it,” he said.
According to Danica Warns, “the Marine Conservation and Policy program is a very unique and fast-track graduate program that helped launch my career in environmental conservation.” She appreciated the flexibility to select the classes she wanted to take and how she could “design (her) capstone project to match (her) career goals” that allowed her “to tailor the program to get the most out of my degree.” As she knew she was interested in a career in environmental outreach, Danica chose to take several courses in the Alda Center for Communicating Science. The classes “were so valuable and enhanced my communication skills greatly,” she says.
If it weren’t for the flexibility of this program, it would have been difficult for me to meet my goals in such a short period of time. The strong background in current marine conservation issues and communication skills I learned put me in a competitive position for pursuing a career in environmental outreach.
She credits the MCP program for helping her get to her current position, working for the NYC Parks Department engaging volunteers in wetland restoration projects.
Christopher Martinez may be a marine biologist from California, but he didn’t grow up near the ocean. Visalia, his hometown, is a small farming city in the San Joaquin Valley. His family of migrant workers traveled the West picking crops. “Because of their hard work, I was able to pursue my dream,” said Christopher, who earned his PhD in 2014.
As an undergraduate at the University of California at Santa Barbara, his passion for marine sciences solidified. Christopher became research diver certified and was listed as co-author of a study, published in 2011 in Marine Biology, for his research in French Polynesia.
When Christopher applied to the graduate program at Stony Brook, the School of Marine and Atmospheric Sciences (SoMAS) awarded him a Turner Fellowship.
The W. Burghardt Turner Fellowship helps qualified underrepresented graduate students seeking certain degrees. Since 1987, the Fellowship has graduated more than 400 degree recipients.
The Center for Inclusive Education (CIE), which provides Turner Fellowship funding, became Christopher’s second home. “The CIE offered me a support system and a sense of family,” he said. After losing outside funding, the CIE helped Christopher pay for flounder movement pattern research in Long Island bays.
Michael Frisk, associate professor in SoMAS and Christopher’s PhD advisor, helped him redirect his research. “Mike told me to design a project that truly reflected my academic interests,” said Christopher.
After studying geometric morphometrics with Distinguished Professor emeritus F. James Rohlf, Christopher pursued ecological morphology of skates and rays and spatial modeling of marine communities in the Northwest Atlantic with a grant Frisk helped him secure.
Sarah Schaefer is currently the Program Coordinator for the Peconic Estuary Program (PEP). In this job she facilitates the Peconic Estuary watershed protection and restoration projects, monitoring and research. She also assists municipalities and not-for-profits to form partnerships, secure funding and plan and implement water quality improvement and habitat restoration projects. The PEP is a partnership comprised of stakeholders within the estuary. The program is responsible for creating and implementing a management plan to protect the estuary.
The Peconic Estuary is one of twenty-eight (28) estuaries in the National Estuary Program (NEP), administered by the United States Environmental Protection Agency (USEPA) under the auspices of Sec. 320 of the Clean Water Act to protect and preserve nationally significant estuaries which are threatened by pollution, development, or overuse. The Peconic Estuary was accepted into the program as an “estuary of national significance” in 1992 after citizen groups formed in response to the Brown Tide algal bloom events in the mid 1980’s and early 1990’s. At that time, it became the 20th National Estuary Program in the country.
The Peconic Estuary is located between the North and South Forks of Long Island, and consists of over one-hundred (100) harbors, embayments and tributaries which span more than 125,000 acres of land and 158,000 acres of surface water.
Sarah believes that the Marine Conservation and Policy (MCP) Program prepares students for real world careers because you are provided experience in many different areas like environmental/marine policy, marine research, field work, communicating science. The program provides the experience to be competitive for marine conservation and policy programs. She says that “everyone in my graduating class had slightly different interests and the program gave everyone the freedom to pursue those interests.
Former Marine Conservation and Policy Masters student Kenneth Lang (fall 2013) was recently selected for the prestigious John A. Knauss Marine Policy Fellowship. The competitive fellowship recruits students from 33 Sea Grant programs nationwide to complete a one year paid fellowship in either the legislative or executive branch of the U.S. government in Washington D.C. Ken’s placement in the program is with NOAA’s International Affairs Office where he will focus on research in Europe, Russia, and the Arctic beginning in February.
While in Stony Brook’s Marine Conservation and Policy program, Lang completed an internship with the United Nations Development Programme (UNDP) and the Global Environment Facility (GEF) International Waters Programme, where he studied three dozen transboundary water environmental remediation projects. Lang felt that his Knauss placement was a perfect fit with the skills and knowledge he obtained during his time in the MCP program.
Cassie Bauer received her BS and MS from SoMAS in 2009 and 2012 respectively. Her thesis research involved the physical processes that contribute to localized, seasonal hypoxic conditions in the bottom waters of Smithtown Bay, Long Island Sound.
In her current role as Fire Island National Seashore’s Public Affairs Specialist, Elizabeth manage press relations, digital media, and lead science communications efforts. She works closely with experts from all divisions within the National Park Service and with researchers and partners to develop communications products for a variety of audiences.
Elizabeth says that she “was fortunate enough to be involved in a student training program with the National Park Service during my time at SoMAS.” While managing my studies and a full-time job was not easy, the two programs prepared her well for the work she does now.
Jake LaBelle, a graduate of the Marine Conservation and Policy (MCP) Master’s program, has found career success at the New York Seascape.
The New York Seascape, a program operated through the Wildlife Conservation Society, seeks to protect habitat and species that rely on New York’s coastal waters. They use a combination of research, education, and policy to achieve this goal. LaBelle works as research coordinator through New York Seascape, a position that helps him engage in his true passion: sharks.
LaBelle got involved with New York Seascape by doing an internship with them during his time working on his MCP degree. He got involved in more and more projects until he became indispensable to the organization, at which point he was offered a job.
Even before that, LaBelle spent time working with sharks. Prior to attending Stony Brook University, he volunteered at the Bimini Biological Field Station. The Field Station gathers data on sharks in the Bahamas, which is then utilized by universities and professors, including SoMAS professor Dr. Demian Chapman, who does genetic studies on the samples gathered there.
These experiences were key for LaBelle, who came from non-scientific background. His undergraduate degree was in International Affairs. A lot of his success came from talking to people involved in the field, who knew some way he could get involved. This included his work in Bimini, and other places as well.
“I always loved aquariums and marine biology, and started by volunteering at the National Zoo,” states LaBelle.
Currently, LaBelle is working on research on Sand Tiger and Shortfin Mako sharks in the Great South Bay. By tracking these sharks, he is hoping to get more information to construct maps of essential habitat for these species. LaBelle feels that GIS courses taken as an MCP student were indispensable to this work, and that these and other experiences as an MCP student will continue to be useful in his chosen career path.
Laura Picariello, former MCP student, is busy pursuing a career in Louisiana with the Gulf United for Lasting Fisheries, part of the Audubon Nature Institute. As a Research Assistant working with a wide variety of audiences, she says the Marine Conservation and Policy program really helped her find her career.
The fact that the program focuses not only on science coursework, but communication, environmental law, and policy creates an environment where students can about a vast amount of topics in a short amount of time. This leaves them better prepared to find a career, maybe not even one they had expected.
Picariello was traditionally trained as a musician, but found that she couldn’t live away from the ocean. She choose the Marine Conservation and Policy program in order to change her career pathway and improve her job satisfaction. What other advice does she have for current or prospective students wishing to do the same?
Christopher Lang, a graduate of the Marine Conservation and Policy (MCP) Master’s Program, is using his degree to make a difference in environmental policy.
Lang, who graduated from the MCP program in 2012, works as a Legislative Fellow in the New York Senate. The prestigious Legislative Fellowship Program, which accepts graduate students from a variety of programs, pairs students with New York Senators to do legislative research and write policy. Lang is working with Senator Catharine Young whose work in agriculture and environmental policy is a good match for Lang’s interests and abilities.
Lang hopes to focus on aquaculture policy during his time in the New York Senate, and attributes much of his professional success to the MCP program and to the courses he took during his time at Stony Brook University.
“I definitely wouldn’t be in a position to get this job without the MCP program,” says Lang.
The MCP program allows students to tailor their degree, offering courses in environmental law and policy, science communication, and other more traditional science-based conservation classes. After students complete their coursework, they complete a capstone project or internship, where they apply the skills developed in classes to real-life scenarios in the workplace. Lang chose to participate in an internship with the Mystic Aquarium as an educator, a position that gave him some extra experience in communication. “I never dreamed this was where it would take me. Use the diversity of the program to your advantage,” Lang advises current and prospective students.
Lang certainly has done that. Having received a Bachelor’s degree in Biology from Providence College, he took Environmental Law classes as an MCP student, which helped him understand and become familiar with court and law documents. However, Lang believes the science communication courses were the most beneficial for him.
“Those courses can prepare you for anything. I had a lot of fun in my improvisation course, and learned so much as well,” states Lang.
Looking forward, Lang plans to use the connections and skills he gains as a Legislative Fellow to his advantage in future work with environmental policy, either in a state or federal agency or in a private firm.
John Holden aboard a lobster boat in Long Island Sound, bespattered with mud but still smiling.
John transferred to Stony Brook-Southampton campus for the fall 2007 semester as a Marine Science major and graduated in spring 2011 with a Bachelor of Science degree. As an undergraduate, he took a suite of marine-related courses – all of Physical, Biological, and Coastal Oceanography, as well as Long Island Marine Habitats and Experimental Marine Biology. These experiential classes gave John the opportunity to get out on the water and gain practical experience to compliment what he was learning in the traditional classroom setting.
While a student, John also became involved in a number of research projects. In 2010, he was an intern in Dr. Chris Gobler’s lab at Southampton working on mesocosm experiments pertaining to the Shinnecock Bay Restoration Project (ShiRP). During that summer, he also participated on the Southampton Blue Oyster Project (S-BOP), where he worked for Drs. Kurt Bretsch and Joe Warren monitoring oyster growth and water quality conditions at several locations within the Shinnecock and Peconic Bays. After graduation, he continued working as a technician on the ShiRP project, as well as crewing on the research vessels out of the SoMAS Southampton Marine Station and on SoMAS’s R/V Seawolf out of Port Jefferson.
John is currently working for the Marine Program of Cornell Cooperative Extension of Suffolk County as a fisheries technician. He is working on two different projects. John works on the lobster pot retrieval project in Long Island Sound, working with local fishermen to retrieve derelict lobster pots. The second project involves testing new fishing gear aimed at reducing by-catch. He has worked on ocean trawlers testing out new gear for the summer flounder fishery aimed at reducing sea turtle by-catch, as well as new gear for the squid fishery.
Morgan Gelinas (MS, 2011) studied ship wakes in the Venice Lagoon, Italy. Here, very large ships routinely navigate a deep dredged channel cut through a shallow lagoon. The wakes they create propagate over the adjacent shoals for long distances, resuspending sediment as they go. Morgan described these wakes as Bernoulli waves, or non-linear N-waves, using the same equations that govern the propagation of tsunamis over the deep-ocean basins (Gelinas, M, H. Bokuniewicz, J. Rapaglia, and K.M.M. Lwiza, 2013. Sediment Resuspension by Ship Wakes in the Venice Lagoon Journal of Coastal Research: Volume 29, Issue 1: 8-17. doi: http://dx.doi.org/10.2112/JCOASTRES-D-11-00213.1).
She is now a scientist specializing in marine geology and hydrodynamic processes working for EA Engineering, Science and Technology, Inc. EA has offices from Guam to Maryland and Morgan is leading many of their field efforts. Her professional duties include such a diverse array of studies such as sediment testing, ocean permitting, marine bathymetric surveys, aquatic site characterizations, interpreting ecotoxicological and bioaccumulation/tissue testing and analysis. Morgan is currently working on a site characterization study in Duluth, MN in the St. Louis River/Lake Superior area, but she has been in most of the Great Lakes in the past two summers on EPA projects. She routinely pilots the boat for bathymetric work or coring all over in the Chesapeake Bay, Gulf of Mexico and greater NYC area.
Graduates from the Marine Conservation and Policy Program are prepared for a variety of careers, including jobs in the government, non-profit, and private sectors. One recent MCP graduate, Hazel Wodehouse, is training the next generation of ocean scientists at Suffolk Community College on Long Island.
Since graduating from the MCP program, Wodehouse has been teaching courses such as Environmental Issues and Introduction to Oceanography as an adjunct professor. Wodehouse finds that after taking her courses, her students have a deeper connection with the environment and the marine habitats that surround them. She described a particular experience about a year ago when she took students to see a whale necropsy.
Wodehouse attributes the MCP program for helping her being successful in her career. Courses required by the program in communicating science were among her favorite, and got her interested in teaching. The one-year program allowed her to get a quality education in a short amount of time. What is her advice to the current class?
“Take advantage of as many opportunities as you can. Even if you don’t initially think you’ll be interested in something, you might surprise yourself,” says Wodehouse.
KESTREL PEREZ graduated in 2011 with her PhD in marine and atmospheric sciences. Under the advisement of Professor Stephan Munch, Kestrel’s dissertation examined the evolution of size in fish and evaluated the strength of natural selection and the presence of prolonged trade-offs from an early period of fast growth to better understand the evolution of size. She joined the School of Marine and Atmospheric Sciences in 2005 as a scholar in the Alliance for Graduate Education and the Professoriate, and is a recipient of the Dr. W. Burghardt Turner Fellowship. Upon completing her PhD, Kestrel went on to a postdoctoral position at the University of Texas at Austin in the Department of Marine Sciences.
Kestrel is an assistant professor of biology at St. Joseph’s College in Brooklyn, N.Y., where she is teaching courses in marine biology and evolution and ecology, and mentoring undergrad researchers. Her research centers on marine biology. Specifically, she focuses on fish and invertebrate evolutionary ecology, the study of life history traits and maternal investments, and how variation in these areas influences larval fitness and recruitment.
Katie’s advice for current students in SoMAS are to meet with your professors outside of class, find a good physical space for studying, conduct research that you are passionate about and take advantage of the SoMAS advisers expertise.
Tim Davis graduated from SoMAS in 2009 with his Ph.D. Before he came to SoMAS, Tim attended Southampton College of Long Island University, where he received his Bachelor of Science degree in marine science-biology. It was at Southampton that Tim first worked with Professor Chris Gobler investigating harmful algal blooms as an undergraduate. After taking a year off upon graduation, Tim decided to attend SoMAS so he could work with Gobler again. This time, Tim would be investigating the environmental factors that influence toxic and non-toxic strains of freshwater cyanobacterium, Microcystis spp., throughout the northeast USA.
For the past two years, Tim has been working as a Research Fellow with the Australian Rivers Institute at Griffith University where he investigated how different environmental factors promote the production of a toxin by a harmful algal species, Cylindrospermopsis raciborskii. He was recently awarded a prestigious Queensland Smart Futures Fellowship to use an advanced molecular technique to further investigate how toxic cyanobacteria communities respond to a changing climate. He is ever grateful for his time at SoMAS.
Tom Di Liberto grew up on Long Island and has been fascinated by the weather since he was a young child. At SoMAS, Tom studied under professor Brian Colle of the Institute for Terrerstrial and Planetary Atmospheres (ITPA) and worked with the School’s Storm Surge Research Group. His thesis dealt with storm surges affecting the New York metropolitan region. After earning his Masters degree in Atmospheric Science/Meteorology in 2009, he joined the Climate Prediction Center of the National Oceanic and Atmospheric Administration (NOAA), where he works as a meteorologist forecasting the weather for Africa, Central America, Hispaniola, and Central Asia with a focus on weather hazards that could affect food security. In addition, Tom conducts research on the use of satellite-derived rainfall estimates in these regions. His research group’s studies took on a whole new level of importance during the past year due to Super Storm Sandy. In 2013, Tom won the “America’s Science Idol” competition.
The “America’s Science Idol” competition was sponsored by the National Science Foundation’s Office of Legislative and Public Affairs, Discover Magazine,Popular Science and the Point of Inquiry Podcast. Patterned a bit after “American Idol”, the fun and engaging workshop was designed to help scientists and engineers communicate with non-technical colleagues and audiences. In winning, Tom brought home some nice loot, viz.: 1-year subscriptions to Discover and Popular Science; a live guest appearance on the Point of Inquiry podcast and the Discover DVD, as well as a variety of opportunities to visit and link with science communication groups around the country.
The Science and Resilience Institute at Jamaica Bay (SRIJB) and New York Sea Grant are happy to announce the arrival of Helen Cheng as the Specialist for the New York Sea Grant’s Jamaica Bay Coastal Resilience. Helen will be designing outreach programs to support community engagement and research efforts to enhance resilience for the communities within the Jamaica Bay Watershed.
Cheng comes to SRJIB from a yearlong stint as a John D. Knauss 2015 Marine Policy Fellow at the National Oceanic and Atmospheric Administration (NOAA) Sea Grant, a highly competitive fellowship program among the nation’s highest qualified graduate students. She was the Coastal Communities Specialist working in the National Sea Grant Office in Silver Spring, Maryland, where she synthesized Sea Grant Network research and extension activities surrounding coastal community sustainable development, hazard resilience, and climate change adaptation. She was on the NOAA Coastal Hazards Resilience Workshop Planning and Support team, and assessed institutional and network research portfolios from the 33 programs of the Sea Grant Network to help identify priorities of the National Sea Grant College Program.
Helen was selected a Knauss Fellow from the New Hampshire Sea Grant program. At the University of New Hampshire she earned her M.S. in Zoology with her research on horseshoe crabs. In New England, she also worked with lobsters and scallops, was a UNH teaching assistant, and a naturalist at the nearby Seacoast Science Center. Helen earned her B.S. in Biology from Stony Brook University in 2009 where she was selected for the first-ever Stony Brook Mote Marine Laboratory internship.
David Novak is the Director of the National Weather Service’s Weather Prediction Center in College Park, Maryland where he oversees national forecasts for heavy rainfall, snowfall, and hazardous weather. He received a PhD from SoMAS where his research involved numerical models to understand hazardous weather conditions and predict their occurrence.
David’s interest in weather has been life-long. “Growing up in the extremes of Minnesota, I’ve been fascinated with the weather, and in particular, snowstorms.” His dissertation work was an extension of this passion, where he studied localized heavy snowfall events, also known as mesoscale snowbands.
David was pushed to “think even bigger, work even harder, and achieve even more” at SOMAS. His advice for students is to seize opportunities that take us out the our comfort zones and expand our thinking.
Early on in her training as a dancer, Carolyn Hall ’09 had to learn to be able to pivot quickly.
Who knew it would have such valuable application as a life skill?
Hall, who holds an MS in Marine Science from Stony Brook University’s School of Marine and Atmospheric Sciences (SoMAS), conducts her own historical marine ecology research, has been part of a team studying the ecosystem of the Gulf of Maine under Adrian Jordaan of the University of Massachusetts, works as the research assistant and fact-checker to New York Times best-selling author Paul Greenberg, and leads workshops for the Alan Alda Center for Communicating Science at Stony Brook. As if that weren’t enough, she continues to perform as a contemporary dancer, having recently completed a residency on Governors Island with Works on Water and performed in a New York Times-featured piece by choreographer Carrie Ahern. A winner of the New York Dance and Performance “Bessie” Award for performance in 2002, she also serves on the boards of the Interdisciplinary Laboratory for Art Nature and Dance (iLAND) and Culture Push.
Hall recently took a few moments to breathe at her home in Brooklyn – where she lives with her husband, actor Kelly AuCoin (best known as “Dollar” Bill Stearn on Billions and Pastor Tim on The Americans) – and discuss her multifaceted career.
The best place to start is probably your work with the Alda Center. Tell us a bit about the kinds of programs you run and what you’re doing.
This is my fourth year teaching at the Alda Center, and officially, I’m a message design or “Distilling Your Message” instructor. I work with graduate students, post-graduates, and some professors, taking them through a five-week course where they work on talking about their science and their research in a way that’s for audiences who aren’t academic, and aren’t in their specialized field. It’s really fun, actually. We work on one-minute pitches or talks, conversations, storytelling, get them in front of a camera to be interviewed by journalists, and we do writing exercises, too. It’s pretty intense, but it’s only once a week. I also work with the Alda Center and go on the road to various organizations and institutions – other academic institutions, or NASA and other government institutions – and work with professionals and faculty members and undergraduates and graduates, and we do the same thing, but we team teach with acting improvisation instructors as well.
And because the Alda MethodTM is based on Alan Alda’s experience as an actor and as host of Scientific American Frontiers, does it help that you approach this with an arts background of your own?
That’s certainly what drew me to it. I thought, “I have both halves!” I wasn’t trained in acting improvisation, but in dance improvisation; I’ve done a lot, and still do. So yes, I think having a performance background made me interested in communicating my research differently. I wanted to be able to talk to the random people who came up while I was in the field, asking what I was doing. I wanted to be able to explain it to them. I wanted that audience to have access to what I was doing, because I was excited about it. It felt very connected to being a dancer, being a performer, and wanting your audience to come along with you. Even though dance doesn’t necessarily use verbal language, there’s a desire to have the audience physically or tangibly follow you and have some sort of interpretation of it that you’ve helped communicate to them.
Obviously, you had already been here for your graduate degree, but what was your path from graduating and doing the research that you’ve been working on to coming back here to work with the Alda Center?
Christine O’Connell was one of the designing founders who worked with Alan for the Alda Center. We were colleagues at SoMAS and friends already, and she was going through the initial sessions with Alan when he was testing out the improv and “Distilling the Message” exercises in tandem. For years, she was saying, “You should do this, you should do this, you should do this. You’re a scientist and a dancer, a scientist and an artist.” I finally found myself with a window of time where I said, “I could go explore and train in this.” As soon as I did, it felt like something I had to do.
You mentioned the difference between improvising as a dancer and as an actor. Your husband is something of an “in-house consultant,” so to speak, when it comes to acting. Are there things you work on where you find you want an actor’s perspective and you consult Kelly?
Kelly does know the kind of acting exercises we use – he’s done them at one point or another – but honestly, I consult the improv instructors who are part of the Alda Center, because they know how we’re applying it to working with scientists and working in communication beyond acting.
Working in the Alda Center, and being married to a prominent actor yourself, have you ever had the opportunity to bring them together?
Because I only work with the Alda Center part-time, I haven’t had that many interactions with Alan, but I did bring Kelly to a mixer in New York City, and I got to introduce them. There were a lot of people around, but they had a nice warm, brief chat about acting. Alan is one of those spectacular actors that Kelly has watched and admired since he was a child – so meeting him was meeting one of those icons of the acting world. It was really fun for them to meet, and I was just standing there beaming at the fact that this was happening, because Kelly was really excited to meet him, and Alan was very warm. He’s a very nice and approachable person, and they definitely connected over acting and the theatre world.
At the Alda Center, you bring your arts background into science, but you also have this other component to your career, where you bring your science background into the arts. That seems like a very different process. How does it work?
It’s different with each organization and each project. I think that the artist brain and the science brain work very similarly. There’s experimentation, there’s failure, and there are many trials. There’s an innate curiosity in your own practice or research, and also in the world around you, whether it’s a specific microscopic world, or a world of movement, or a world of sculpture, or whatever the art may be. The practices of being a scientist and being an artist are not so dissimilar, and what’s interesting is that when approaching a scientific topic from an artist’s point of view, there’s a different way of questioning, a way of representing the topic that, to me, is rather freeing: “What does it feel like?” That gives a different lens of looking at the science. So, you might start digging into deeper details of the science from an angle you didn’t expect, which is fascinating.
You talked a little bit about the process that brought you to the Alda Center. Can you tell us a bit more about the journey that led you to this amazingly varied career?
I grew up in Los Angeles, and although I wasn’t right on the coast, I loved going to the beach and I loved tide pools. So, I’d say that tide pools were my first fascination having to do with marine life and the marine environment, but I didn’t think I was going to pursue that at a young age. When I went to Oberlin College as an undergraduate, I was more interested in human physiology. I was already a dancer, and ran track, and they fit very nicely hand in hand, and so my degree was in biology with a focus on human physiology. Then, because it’s easier to pursue a career in dance when you’re young than when you’re older, I did work in physical therapy for a number of years, but I was becoming a professional dancer, in LA first, and then in New York.
After ten years of that, I was missing digging into the science side of my brain, and I spoke to professors at UC Santa Cruz, because their marine biology program was in my mind from high school as the place to go. One of them said, “You know, there’s a really good marine science program in New York.” I said, “Really?” They said, “Yeah, at Stony Brook.” I had not heard of it, but that’s because on the East Coast, I wasn’t exploring that as a real option.
I went out to Stony Brook and took a couple of upper-level undergraduate marine science courses at SoMAS, and I loved them both for very different reasons, and I thought, “this is what I’m going to do.” However, I still felt like I needed a little more exposure, so I did an internship at the Southwest Fisheries Science Center in La Jolla. That was the first place where I thought, “This is what being in the field is. This is what being among the public doing marine research is. This is what a full-time commitment to research that’s on computers, that’s on equipment, that’s talking to your colleagues, in the field, on a boat, is about,” and I was hooked, no pun intended. When I applied for grad school and hoped to get in, I wrote about that internship experience, and realized that sort of public interaction with research was fascinating to me.
I thought I would stop dancing, and for the first semester of graduate school, I couldn’t dance, because it was so intense, and I’d been out of school for so long that my learning curve was super-steep. But then, the dancing side of my brain still needed to be attended to, so I do both.
Having been here as a grad student, gone out to do your research, and then come back to work with the Alda Center, are there things you appreciate about Stony Brook now that you didn’t necessarily see as a student?
I think what’s most impactful about teaching a course that sees scientific researchers from many departments at Stony Brook is realizing what a deep community of scientists and research and study there is at Stony Brook. Sometimes, there are misconceptions about state schools and what they can offer in terms of excellence in various departments. Some schools are known for business, or known for chemistry, but I feel like at Stony Brook, not only is there this incredible medical school – which I think we are known for – but the rigorous pursuit of all the different sciences that I see reflected in the graduate students and the postdocs, is really impressive, and I feel lucky that I get to talk to such a really great cross-section of them through this scientific communication class.
Obviously, there’s something that you bring to these students when you work with them in these communication classes. How much do you find yourself taking back with you in terms of learning about their research?
That’s the beauty of having the Alda Center at Stony Brook. Because I am working with these scientists, these engineers, these medical students, who are gaining expertise in these fields – and they’re learning how to talk about it – they have to break down what their research is. They are so skilled at saying what their work is academically. I don’t understand all the words or all the processes, but because I get to work with them on understanding it, so that someone like me, who’s not in their field can understand it, I actually can walk away with an understanding: “Wow, you’re really working on trying to understand why people with schizophrenia often hear voices. Where’s that coming from? If we can figure out where it’s coming from in the brain, then maybe we can find a way to reduce it or help control it better.” I can walk away with an understanding of what cutting-edge research these students and their labs and their professors are working on, and that’s exciting.
You talk about the two sides of your brain that need attention, the science side and the dance side. What would you say to current students who may have their own seemingly divergent passions about how you manage to serve both, indulge both, and use both in your career?
There are so many multidisciplinary folks out there now, or hybrids, and I think more and more collaborations between scientists and people in other disciplines are happening. I encourage students to entertain their hybrid interests, partly because it makes them relatable to more audiences, but I also think that it’s important to remember that as a scientist you have all these different sides of you that are equally rich.
How do you have a career that way? That’s a tricky thing. If you’re going to try to do what I do, I’m freelance everything, but I have other friends who are full-time researchers and they create theatre pieces, solo shows, that aren’t about science…or maybe they are, but not necessarily. It is possible. You just have to figure out what your main goal is, what you want from each discipline. I think that’s the key. That’s the question to ask yourself, but it is possible.
Did you check the weather report today? Then you probably know Katherine Rojowsky’s work. Katherine, an Atmospheric and Oceanic Sciences major, credits “amazing internships” with helping her mature as a meteorologist.
At WCBS-TV, Katherine prepared weather graphics and forecasts that were broadcast to millions of viewers and used by the Weather Channel. Private forecasting companies MetroWeather and Weather 2000 Inc. asked her to make weather predictions used by film and television production companies, golf courses, and local sports teams like the Mets and Long Island Ducks.
Jae Lee received both her PhD and MS from SoMAS, graduating in 2008. For her master’s thesis, Jae looked at radiative transfer modeling with Professor Bob Cess to estimate the earth’s radiation balance. Her PhD conducted under the direction of Professor Sultan Hameed focused on how the sun can influence Earth’s climate.
Lora Clarke received her Ph.D. from SoMAS in 2007. She also has a Bachelor of Science degree from Christopher Newport University in Virginia and a Master of Science from the University of Massachusetts. At SoMAS, she worked with former Dean David Conover on numerous fish ecology studies involving Atlantic silversides, Menidia menidia. Lora’s research concentrated on the population dynamics and connectivity of subpopulations of this species along the east coast of the United States.
After she graduated, Lora was awarded a prestigious John A. Knauss Marine Policy Fellowship by NOAA in 2008 and began working with the NOAA Fisheries Office of Science and Technology in Silver Spring, Maryland, where she served as the Ecosystems Project Coordinator. Her duties included assisting Dr. Steve Murawski, then NOAA’s Chief Scientist and Head of Scientific Programs, on programs related to ecosystem-based management. She also prepared international policy briefs and reports for Congress and helped administer CAMEO (Comparative Analysis of Marine Ecosystem Organization) – a new grant program co-sponsored by NOAA and the National Science Foundation.
After her one year fellowship ended, Lora was hired to stay on at NOAA to work on CAMEO. Currently, Lora develops goals and priorities for interdisciplinary ecosystem research, coordinates scientific review of research proposals and creates outreach plans to help promote the CAMEO program. In addition, Lora works with JSOST, the Joint Subcommittee for Ocean Science and Technology. JSOST is a group of 25 federal agencies organized under the White House Office of Science and Technology Policy that sets the national priorities for ocean science and technology research. Lora is one of two executive secretaries for the group.
Lynn Abramson has a forged a career path that began in marine science and now influences environmental policy on a national level. She was a Ph.D student at SoMAS from 2001 to 2007 working with Bob Aller and Cindy Lee on the biological carbon pump and related biogeochemical processes. Her dissertation focused on how mineral interactions influenced the decomposition of sinking particulate organic matter, using pigments and amino acids as tracers. She recalls knowing early in her time at SoMAS, that she wanted to apply her scientific knowledge in a way that could benefit others.
Upon graduation, Lynn received the prestigious John Knauss Marine Policy Fellowship sponsored by the National Oceanic and Atmospheric Administration’s Sea Grant program. Her one year fellowship morphed into more than five years of work on oceans, public lands, water resources, energy, and transportation issues when she joined the staff of U.S. Senator Barbara Boxer (D-CA). After leaving Senator Boxer’s staff Lynn joined the Clean Energy Initiative with The Pew Charitable Trusts where she coordinates their Clean Energy Business Network, that informs and engages over 3,000 clean energy business leaders. At this non-profit, non-partisan organization, she currently conducts research and works on “federal policies to promote cleaner and more efficient sources of energy.
Lynn applies her scientific understanding of complex environmental problems to practical solutions that can be implemented by businesses across the nation. According to Lynn “having a strong foundation in science has given me a much deeper, more holistic understanding of the environmental issues I’ve worked on in my policy career. My Ph.D. work trained me in objective thinking—keeping an open mind and weighing conflicting information and perspectives before making a decision.” Lynn is an excellent example of how a rigorous education in the sciences can be applied to a career in environmental policy.
Hudson Roditi received a Ph.D from SoMAS in Coastal Oceanography in 2000, working in Nick Fisher’s lab. His thesis was titled “Rates and routes of trace element uptake in zebra mussels.” The zebra mussel is an exotic invasive freshwater species that was introduced into the Great Lakes accidentally in the mid-1980’s and has since invaded freshwaters in much of North America.
Hudson is the program director of the Urban Advantage Middle School Science Initiative at the American Museum of Natural History in NYC. He now works with over 220 schools, 640 teachers and over 60,000 students at the American Museum of Natural History, the Bronx Zoo, Brooklyn Botanic Garden, New York Aquarium, New York Botanical Garden, New York Hall of Science, Queens Botanical Garden and the Staten Island Zoo. He helps teachers learn how to shift their perceptions of science away from being memorization of facts and more towards a way of explaining the world and gaining new knowledge.
According to Hudson, his success was due in part to his advisers who were “supportive of my choice to explore and find the right path for myself after SoMAS.” He encourages other students to do the same by finding their place at Stony Brook University.
Bees are considered the world’s most important pollinator of food crops. In fact, it’s estimated that one third of the food that we consume each day relies on pollination, mainly by bees. Alumna Laura Klahre, ’97, witnesses the importance of that very fact every day. Laura and her winemaker husband Adam Suprenant own Blossom Meadow Farm, in Southold, New York, where she grows strawberries, raspberries, and blueberries, and cover crops of turnips, canola, and buckwheat. While she got her start in farming with honeybees more than twenty years ago, none are found at the farm anymore. All crops are pollinated by native bees, including the gentle, easy-to-raise mason bee. Klahre is quick to point out that honeybees are an invasive species and that an overwhelming amount of evidence has proven their negative impact on the natural world. “In addition, native bees pollinate two to three times better than honeybees and the resulting fruit is heavier, more well-rounded, and higher quality,”said Klahre.
Blossom Meadow Farm is well known for its red raspberry, black raspberry, strawberry and blueberry jams, as well as selling high-quality mason bee cocoons. Thanks to her efforts, more than 100 families have begun raising mason bees, also known as bee ranching.
Wine-lovers on Long Island’s East End may know Laura as the co-proprietor of Coffee Pot Cellars in Cutchogue, where she runs a Merlot for Monarchs campaign. As part of the campaign, the farm grows a butterfly milkweed plant (Asclepias tuberosa) for each bottle of merlot sold at the winery. She then works with libraries and Girl Scouts to plant and restore monarch butterfly habitat throughout Long Island in June of each year. “Monarch butterflies will only lay their eggs on milkweed and scientists estimate that more than 1.3 billion stems of milkweed will need to be restored for the species to bounce back,” said Klahre. Coffee Pot Cellars also showcases a Cyser, which is a hard cider made from apples pollinated by Klahre’s mason bees and that uses the traditional French Champagne sparkling wine method, méthode Champenoise.
On a cold, windy day in late March, it’s hard to imagine the farm abuzz with bees and brimming with the food they crave. Her husband will join her to tackle farm chores later in the day, but for now her only assistant is Beasley, a pug who follows her everywhere, silently.
One taste of her red raspberry jam is all the proof you need that she heeded her dad’s counsel, and that the world is a better place thanks to pollinators.
“The interdisciplinary emphasis of the marine science program at Stony Brook has been one of its great strengths and prepared me well for my current position as an associate professor of environmental science at Rutgers University. In my research, I have recently been occupied tracking down mercury in some of our urban coastal waters, which as this photo of the New Jersey Meadowlands attests, should not be thought of as beyond repair. I am often struck by the importance of the experiences I had at MSRC that were not directly related to my graduate research.
In 2015 Lisa was was named Head of the Ocean Section Division of Ocean Sciences at the National Science Foundation (NSF). Before this prestigious assignment, Lisa served as the Program Director for Antarctic Integrated System Science in the Division of Polar Programs at NSF. Lisa has served as chair of the UNOLS Arctic Icebreaking Coordinating Committee, and is the recipient of both the Arctic and Antarctic Service Medals, and the Distinguished Public Service Award from the U.S. Coast Guard. Prior to joining NSF Lisa was a faculty member at East Carolina University, also serving as the Associate Vice Chancellor for Research.
“The degree of collaboration between faculty, and the level of respect and camaraderie afforded graduate students by the faculty is what made my project possible, and what makes the MSRC environment truly unique. Since leaving MSRC, I’ve become an actual seagoing oceanographer, and I appreciate my multidisciplinary training all the more. My journeys have taken me to the Arctic Ocean four times in the last six years.
In 1992, Sanjay Gupta obtained his MS degree from Stony Brook in Marine Environmental Science, which he describes as “an excellent research and academic environment consisting of dedicated faculty and great facilities.” His focus was in physical oceanography with a thesis project developing numerical models that coupled biological and physical processes associated with the lifecycle of estuarine copepods, taking into account the impacts of climate change and how they could affect fisheries.
Hans Dam attended SoMAS, known as the Marine Science Research Center (MSRC) at the time, for both his Master’s and Doctoral degrees. After graduating from the University of Washington as an undergraduate in 1982, Hans came to Stony Brook to work with Dr. William Peterson. He received his MS in 1985, but stayed to work on his PhD with Dr. Peterson, finishing in 1989. During his time at the MSRC, Hans studied patterns of copepod abundance and grazing in Long Island Sound.
After leaving SoMAS, Hans spent a year as a post-doc at the University of Maryland’s Horn Point Laboratory. He was hired as an assistant professor at the University of Connecticut in 1991 in both the Department of Marine Sciences and the Department of Ecology and Evolutionary Biology. He has been at UConn ever since, and is currently the Acting Head of the Department of Marine Sciences and the Acting Director of the Marine Science and Technology Center.
Hans’s research interests include plankton ecology and evolution, the role of zooplankton in biogeochemical cycling and fluxes of organic matter. Much of his current research focuses on plankton communities in Long Island Sound, including monitoring zooplankton populations and examining how they can control harmful algal blooms and how they respond to projected changes in temperature in the Sound associated with climate change. Hans also investigates harmful algae such as Alexandrium and how grazers respond to these blooms. He is in charge of the process studies of LISICOS, the Long Island Sound Integrated Coastal Observing System (http://lisicos.uconn.edu/). Several faculty at UCONN are conducting studies dealing with the control of hypoxia in the Sound. The contribution of Hans’ group to LISICOS is the study of downward fluxes of organic matter and grazing in elemental cycling in the Sound.
Greg Marshall is the Executive Director and Producer of Remote Imaging at National Geographic Television and Film. In 1991, Greg began working with National Geographic Television and established the Special Projects Unit, where he developed the technology known as the Crittercam. The Crittercam is a revolutionary tool that has been used to study the behavior of almost 40 different marine and terrestrial species in their natural habitat.
He has received two Emmy Awards for the National Geographic specials Great White Sharks and Sea Monsters: Search for the Giant Squid. Greg also produced the film Tiger Shark and a 13-part series called Crittercam for National Geographic television.
He earned a bachelor’s degree in international relations from Georgetown University. Greg earned his master’s degree (1988) in marine environmental sciences from the Marine Sciences Research Center at Stony Brook University. His research focused on the factors influencing the burying behavior of juvenile queen conch, Strombus gigas.
Greg Marshall returned to SoMAS in 2017 to help us celebrate our 50th Anniversary as the Akira Okubo Distinguished Scholar.
Aquaculture specialist Gregg Rivara has a certain affinity for Long Island. He grew up in Queens, received his Bachelor’s degree from Southampton College of Long Island University (now a satellite campus of Stony Brook) in 1982 and, soon after, began his Master’s degree at the Marine Science Research Center (now SoMAS). When he first arrived at MSRC, he had a research assistantship with Dr. Doug Capone and Dr. Ed Carpenter working with bacteria and microalgae, but Gregg’s true passion was shellfish. That’s when he connected with Dr. Robert Malouf, who helped Gregg receive a Sea Grant scholarship to pursue work with hard clams. His Master’s thesis examined how light and flow affect burrowing of very small, recently-set hard clams.
While Gregg was finishing his thesis, a job became available as a grant-funded lab technician at MSRC, so he remained in the family for a few months after finishing in December of 1985. However, Gregg was getting ready to settle down and decided that he needed to find work that wasn’t based on “soft money”. He took his Civil Service test and, in 1986, was hired by the Town of Islip as a Bay Management Specialist. While there, he participated in a variety of tasks, including buoy placement, planting of adult clams in spawner sanctuaries and building a shellfish nursery system in East Islip, which later became the Town’s shellfish hatchery.
However, Gregg’s stay with Islip was a brief one. After less than a year, he signed on as an Aquaculture Specialist with Cornell Cooperative Extension of Suffolk County (CCE). Gregg, still with CCE, is now Director of the Suffolk County Marine Environmental Learning Center. The Center, located at Cedar Beach in Southold, New York – on the North Fork of Long Island – triples as a working shellfish hatchery, an operational base of bivalve and habitat restoration programs and an educational facility. On any given day, Gregg could deal with a very mixed menu of tasks, from tours, to problems keeping the Center’s boats afloat and running, to assisting prospective shellfish farmers with permitting, to planting shellfish as part of an environmental restoration project. Plus, when he runs out of cool things to do, there’s always the administrivia that comes with the job title, “Director”.
Gene Carl Feldman is an oceanographer at NASA/Goddard Space Flight Center. Currently, he is the project manager of the mission called SeaWiFS (Sea-Viewing Wide Field Sensor). Prior to his work with SeaWiFS, Gene worked with the Nimbus-7 Coastal Zone Color Scanner project.
Gene has contributed to many additional programs, including the Joint Global Ocean Flux Study, Coastal Rhythms Exhibition at the New England Aquarium and the Jason Project. He has participated in several JASON expeditions including the JASON VII expedition when he explored the depths of the sea on board a United States Naval nuclear research submarine.
After earning a bachelor’s degree in biology at Stony Brook University, he spent three years as a Peace Corps volunteer in Western Samoa. Gene worked for the National Marine Fisheries Service and New York Sea Grant before returning to Stony Brook. Gene received his master’s degree (1983) in marine environmental sciences and his Ph.D. (1985) in coastal oceanography from the Marine Sciences Center at Stony Brook University. His doctoral research focused on satellite observations of phytoplankton variability in the eastern equatorial Pacific.
Meteorologist Craig Allen is the most authoritative weather source in the New York tri-state area. Heading WCBS 880’s weather team and CBS 2’s weekend team, Allen’s reports are accurate and authoritative, his manner warm & friendly.
Craig earned his meteorology degree from Stony Brook University in May of 1979 and became chief meteorologist for WCBS 880 the following Spring. The last 20 years have allowed Craig to form a special bond with WCBS listeners. Hundreds of letters to Newsradio 88 over the years confirm that listeners trust the accuracy of his weather reports.
At age 12, Craig Allen lugged a chalkboard to the kitchen table each night and pretended to be a TV weatherman, delivering a forecast to his family while they ate dinner. Today, audiences hear him deliver TV and radio reports locally and nationally, every weekday morning and weekends when the weather is severe and the need to have the best meteorologist in New York City arises.
Despite Craig’s serious outlook, he finds his work to be enthralling. “I love my job. I try to convey my interest in weather to the audience. If there is severe weather. I’ll try not be overly grim but I’ll sure get the sense of urgency across to the listener! And if it is a nice day. I’ll try to make them ‘feel’ the weather; to bring it inside since so many people are indoors looking out the window during their workday”.
“I cherish it by: Sitting outdoors, watching the weather with my son, spending time at the beach, traveling by train and doing all gardening and landscaping around my home”. | 2019-04-20T02:57:35Z | https://www.somas.stonybrook.edu/people/alumni-perspectives/ |
Subsets and Splits